2014 25th International Workshop on Database and Expert Systems Applications最新文献

筛选
英文 中文
A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems 高度分布式系统的模糊安全投资决策支持模型
Emrah Yasasin, Gerhard Rauchecker, Julian Prester, G. Schryen
{"title":"A Fuzzy Security Investment Decision Support Model for Highly Distributed Systems","authors":"Emrah Yasasin, Gerhard Rauchecker, Julian Prester, G. Schryen","doi":"10.1109/DEXA.2014.65","DOIUrl":"https://doi.org/10.1109/DEXA.2014.65","url":null,"abstract":"The economic aspect of information security is a comparatively new discipline so that there is hardly any extensive research work. This applies in particular to measures in highly distributed systems which have been neglected in previous research. The present paper focuses on the security investments in such systems. We augment an existing research about a fuzzy decision support model by defining appropriate operators in order to applicate this work in practice. The proposed model includes uncertainty with respect to the impact of investments on the achieved security levels of components of the distributed system. We further develop a heuristic to solve the problem and test the heuristic experimentally. The paper concludes with a discussion and gives an outlook to future work in the context of security investments.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131698674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Specifying IT Security Awareness 指定IT安全意识
Norman Hänsch, Z. Benenson
{"title":"Specifying IT Security Awareness","authors":"Norman Hänsch, Z. Benenson","doi":"10.1109/DEXA.2014.71","DOIUrl":"https://doi.org/10.1109/DEXA.2014.71","url":null,"abstract":"IT users are faced with various threats on a daily basis. Unfortunately, not all possible dangers are known to them, such that the users fall an easy victim to attacks. For this reason, IT specialists demand for higher IT security awareness. Although researchers and practitioners exercise ongoing efforts in this area, their work often lacks a concise definition of the term \"security awareness\". Since there is no agreement on the term, different (and sometimes not compatible) ways of raising and measuring security awareness exist. This paper is an effort to give an overview of this phenomenon and to show that awareness in IT security is not standardized yet.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
New Online Hierarchical Feature Extraction Algorithm for Classification of Protein 一种新的蛋白质分类在线层次特征提取算法
M. Kchouk, F. Mhamdi
{"title":"New Online Hierarchical Feature Extraction Algorithm for Classification of Protein","authors":"M. Kchouk, F. Mhamdi","doi":"10.1109/DEXA.2014.20","DOIUrl":"https://doi.org/10.1109/DEXA.2014.20","url":null,"abstract":"Feature extraction from biological data is a very important discipline in bioinformatics. The aim of this work is to classify protein sequences automatically. To do this, it seemed appropriate to use a data mining process: the process of Knowledge Discovery and Data mining (KDD) from biological data. We are interested in the first phase of the KDD, that consists in the preprocessing and we focus on the step: Feature extraction. Feature extraction is translated by the generation of a set of feature that is presented to a supervised learning algorithm for classification. An extraction method that we have adopted is the method of N-grams. The algorithm of n-grams consists in extracting feature of fixed size of length n. In this paper, we propose a hierarchical algorithm of construction of n-grams to obtain feature of variable sizes. This algorithm of extraction is used to meet the needs of biologists. By using the linear classifier SVM, the experiments on real protein banks show the efficiency of our algorithm while presenting a comparison of our work to previous works.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail Markets 电力零售市场双边合约的交易者投资组合优化
H. Algarvio, F. Lopes, J. Sousa, J. Lagarto
{"title":"A Trader Portfolio Optimization of Bilateral Contracts in Electricity Retail Markets","authors":"H. Algarvio, F. Lopes, J. Sousa, J. Lagarto","doi":"10.1109/DEXA.2014.37","DOIUrl":"https://doi.org/10.1109/DEXA.2014.37","url":null,"abstract":"Electricity markets are systems for effecting the purchase and sale of electricity using supply and demand to set energy prices. Two major market models are often distinguished: pools and bilateral contracts. Pool prices tend to change quickly and variations are usually highly unpredictable. In this way, market participants often enter into bilateral contracts to hedge against pool price volatility. This article addresses the challenge of optimizing the portfolio of clients managed by trader agents. Typically, traders buy energy in day-ahead markets and sell it to a set of target clients, by negotiating bilateral contracts involving three-rate tariffs. Traders sell energy by considering the prices of a reference week and five different types of clients. They analyze several tariffs and determine the best share of customers, i.e., the share that maximizes profit.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114439808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Realistic Multi-agent Simulation of Competitive Electricity Markets 竞争电力市场的现实多智能体模拟
T. Pinto, Gabriel Santos, Z. Vale, Isabel Praça, F. Lopes, H. Algarvio
{"title":"Realistic Multi-agent Simulation of Competitive Electricity Markets","authors":"T. Pinto, Gabriel Santos, Z. Vale, Isabel Praça, F. Lopes, H. Algarvio","doi":"10.1109/DEXA.2014.36","DOIUrl":"https://doi.org/10.1109/DEXA.2014.36","url":null,"abstract":"The dynamism and ongoing changes that the electricity markets sector is constantly suffering, enhanced by the huge increase in competitiveness, create the need of using simulation platforms to support operators, regulators, and the involved players in understanding and dealing with this complex environment. This paper presents an enhanced electricity market simulator, based on multi-agent technology, which provides an advanced simulation framework for the study of real electricity markets operation, and the interactions between the involved players. MASCEM (Multi-Agent Simulator of Competitive Electricity Markets) uses real data for the creation of realistic simulation scenarios, which allow the study of the impacts and implications that electricity markets transformations bring to different countries. Also, the development of an upper-ontology to support the communication between participating agents, provides the means for the integration of this simulator with other frameworks, such as MAN-REM (Multi-Agent Negotiation and Risk Management in Electricity Markets). A case study using the enhanced simulation platform that results from the integration of several systems and different tools is presented, with a scenario based on real data, simulating the MIBEL electricity market environment, and comparing the simulation performance with the real electricity market results.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133930935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Multi-agent Coordination Framework for Smart Building Energy Management 智能建筑能源管理的多智能体协调框架
Thanos G. Stavropoulos, E. Rigas, Efstratios Kontopoulos, Nick Bassiliades, I. Vlahavas
{"title":"A Multi-agent Coordination Framework for Smart Building Energy Management","authors":"Thanos G. Stavropoulos, E. Rigas, Efstratios Kontopoulos, Nick Bassiliades, I. Vlahavas","doi":"10.1109/DEXA.2014.39","DOIUrl":"https://doi.org/10.1109/DEXA.2014.39","url":null,"abstract":"This paper presents a novel energy management framework for multi-agent coordination in smart buildings. The framework builds on top of an existing Service-Oriented middleware for Ambient Intelligence, which offers sensor and actuator functions of wireless devices. The middleware also provides a semantics infrastructure that assists in authoring agent policies for reducing energy consumption and maximizing user comfort. Each agent within the framework is responsible for monitoring the environmental context and controlling the electrical appliances of a specific room. However, the collective behavior of the multi-agent system is controlled by a Coordinator Agent that approves or rejects the allocation of building resources in time, aiming at more \"long-term\" goals that are out of the reach and scope of the individual Room Agents. The agents' underlying logic is expressed via defeasible logics, a formalism offering intuitive knowledge representation and advanced conflict resolution mechanisms.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Pure URL-Based Genre Classification of Web Pages 一个纯基于url的网页类型分类
Chaker Jebari
{"title":"A Pure URL-Based Genre Classification of Web Pages","authors":"Chaker Jebari","doi":"10.1109/DEXA.2014.56","DOIUrl":"https://doi.org/10.1109/DEXA.2014.56","url":null,"abstract":"In this paper, we propose a new approach for multi-label genre classification of web pages that exploits character n-grams extracted from the URL of the web page rather than its content. Using only the URL reduces the time needed for feature extraction since it does not need to download the content of the web page. Our approach deals with the complexity of web pages because it uses a multi-label classification where each web page can be assigned to more than one genre. Moreover, our approach implements a new weighting technique that exploits the structure of the URL. Experiments conducted on a known multi-label dataset show that our approach achieves encouraging results.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detectability of Deep Packet Inspection in Common Provider/Consumer Relations 公共提供者/消费者关系中深度包检测的可检测性
C. Roth, Rolf Schillinger
{"title":"Detectability of Deep Packet Inspection in Common Provider/Consumer Relations","authors":"C. Roth, Rolf Schillinger","doi":"10.1109/DEXA.2014.64","DOIUrl":"https://doi.org/10.1109/DEXA.2014.64","url":null,"abstract":"Payload examination using Deep Packet Inspection (DPI) offers (infrastructure) providers a whole new range of use cases, many of them with a potential to eavesdrop on non-public communication. Current research is almost exclusively concerned with raising this capabilities on a technological level. Critical voices about DPI's impact on the Internet with regard to privacy, net neutrality, and its other implications are raised, however often not within research communities but rather by politically interested groups. In fact, no definite method allowing detection of DPI is known. In this paper we present five different approaches targeting this problem. While starting points for DPI detection are given, including leakage of internal data or software errors, not all of of the presented approaches can be simulated or verified at all and none so far has been tested in real world settings.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115927239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Flexible Virtualization-Based Architecture for Malware Detection and Analysis 一种灵活的基于虚拟化的恶意软件检测与分析体系结构
Marius Vlad, Hans P. Reiser
{"title":"Towards a Flexible Virtualization-Based Architecture for Malware Detection and Analysis","authors":"Marius Vlad, Hans P. Reiser","doi":"10.1109/DEXA.2014.67","DOIUrl":"https://doi.org/10.1109/DEXA.2014.67","url":null,"abstract":"The complexity and sophistication of malicious attacks against IT systems have steadily increased over the past decades. Tools used to detect and analyse such attacks need to evolve continuously as well in order to cope with such attacks. In this paper, we identify some limitation of existing approaches and propose a novel architecture for an attack detection and analysis framework. This architecture is based on virtualization technology to execute target systems, supports a broad spectrum of low-level tracing modules and sophisticated, extensible virtual-machine introspection mechanisms, combined with an extensible plug-in interface for specialized detection and analysis mechanisms, and it offers support for deployment in cloud infrastructures.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128958149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Recent Trends in Enterprise Identity Management 企业身份管理的新趋势分析
Michael Kunz, Matthias Hummer, L. Fuchs, M. Netter, G. Pernul
{"title":"Analyzing Recent Trends in Enterprise Identity Management","authors":"Michael Kunz, Matthias Hummer, L. Fuchs, M. Netter, G. Pernul","doi":"10.1109/DEXA.2014.62","DOIUrl":"https://doi.org/10.1109/DEXA.2014.62","url":null,"abstract":"Recent data breaches caused by highly-privileged insiders (e.g. the NSA/Snowden case) as well as the proliferation of mobile and cloud applications in enterprises imposes new challenges for Identity Management. To cope with these challenges, business analysts have predicted a variety of trends for enterprise Identity Management. In this paper, we conduct a thorough literature analysis to examine to which extent the scientific community seizes upon these trends and identify major research areas therein. Results show that despite the analysts' predictions, research stagnates for attribute-based access control and privileged user management, while for cloud-based IdM and bring your own device it corresponds to the analysts' forecast.","PeriodicalId":291899,"journal":{"name":"2014 25th International Workshop on Database and Expert Systems Applications","volume":"493 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信