2014 International Symposium on Biometrics and Security Technologies (ISBAST)最新文献

筛选
英文 中文
Towards managing information security knowledge through metamodelling approach 通过元建模方法管理信息安全知识
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013140
Doaa Saleh Abobakr Baras, S. H. Othman, M. Ahmad, Norafida Ithnin
{"title":"Towards managing information security knowledge through metamodelling approach","authors":"Doaa Saleh Abobakr Baras, S. H. Othman, M. Ahmad, Norafida Ithnin","doi":"10.1109/ISBAST.2014.7013140","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013140","url":null,"abstract":"Security of information systems is becomes a major concern for many organizations nowadays as security risks may have a serious impact on the organization's information assets. Information Security Management (ISM) describes controls that an organization needs to implement to ensure that it is sensibly managing the risks of loss, misuse, disclosure or damage. Thus, it makes ISM knowledge domain is so complex to both its modeling and sharing. The current ISM models do not provide an apparent structure that can be easily reuse to the current situation without an analysis in -depth and this could lead to a waste of time. It is useful to categories and describes the elements, components or aspects of information security management in a unified conceptual model (metamodel) to facilitate knowledge sharing, reuse, modelling and enhancing the communications amongst ISM users. For this purpose, we proposed the Information Security Management Metamodel (ISMM).","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123751632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved method of classification algorithms for crime prediction 犯罪预测分类算法的改进方法
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013130
Abba Babakura, M. N. Sulaiman, Mahmud Yusuf
{"title":"Improved method of classification algorithms for crime prediction","authors":"Abba Babakura, M. N. Sulaiman, Mahmud Yusuf","doi":"10.1109/ISBAST.2014.7013130","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013130","url":null,"abstract":"The growing availability of information technologies has enabled law enforcement agencies to collect detailed data about various crimes. Classification is the procedure of finding a model (or function) that depicts and distinguishes data classes or notions, with the end goal of having the ability to utilize the model to predict the crime labels. In this research classification is applied to crime dataset to predict the “crime category” for diverse states of the United States of America (USA). The crime data set utilized within this research is real in nature, it was gathered from socio-economic data from 1990 US census. Law enforcement data from 1990 US LEMAS survey, and from the 1995 FBI UCR. This paper compares two different classification algorithms namely - Naïve Bayesian and Back Propagation (BP) for predicting “Crime Category” for distinctive states in USA. The result from the analysis demonstrated that Naïve Bayesian calculation out performed BP calculation and attained the accuracy of 90.2207% for group 1 and 94.0822% for group 2. This clearly indicates that Naïve Bayesian calculation is supportive for prediction in diverse states in USA.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134554092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks SECRET:一种安全有效的移动自组织网络证书撤销方案
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013110
Dieynaba Mall, K. Konaté, A. Pathan
{"title":"SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks","authors":"Dieynaba Mall, K. Konaté, A. Pathan","doi":"10.1109/ISBAST.2014.7013110","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013110","url":null,"abstract":"The intent of this paper is to propose an enhanced certificate revocation scheme for Mobile Ad hoc Networks (MANETs). Our approach is built on mainly two previously proposed mechanisms. A combination of the schemes and optimization of certain steps with intelligent choices of parameters could significantly reduce the overhead associated with such mechanism. We prove the efficiency of our approach by performance analysis. Also, we present the security analysis that shows clear gains than the previously proposed schemes.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115842523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Botnet evolution: Network traffic indicators 僵尸网络演化:网络流量指标
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013134
M. R. Rostami, M. Eslahi, Bharanidharan Shanmugam, Z. Ismail
{"title":"Botnet evolution: Network traffic indicators","authors":"M. R. Rostami, M. Eslahi, Bharanidharan Shanmugam, Z. Ismail","doi":"10.1109/ISBAST.2014.7013134","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013134","url":null,"abstract":"In recent years, the HTTP has become dominant protocol among other protocols for the Internet services as it provides a set of rules to manage the data exchange between servers and browsers. On the other hand, this standard protocol has been widely used in the latest generation of botnets to establish their command and control channel and hide their malicious activities among normal Web traffic. Therefore, analyzing HTTP traffic has become a common method in current HTTP-based botnet detection studies. Since the HTTP botnets are a new phenomenon,they have not been fully explored yet. Therefore, in this paper we present an overview of the features and parameters that have been used in existing studies to detect HTTP botnets along with their shortcomings. We also propose a number of HTTP protocol characteristics that can be used for further botnet analysis and detection.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124674072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Pixel-based dispersal scheme for medical image survivability and confidentiality 基于像素的医学图像生存性和保密性分散方案
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013138
Nelmiawati, M. Salleh, Malek Najib Omar
{"title":"Pixel-based dispersal scheme for medical image survivability and confidentiality","authors":"Nelmiawati, M. Salleh, Malek Najib Omar","doi":"10.1109/ISBAST.2014.7013138","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013138","url":null,"abstract":"Medical image survivability and confidentiality is an important concern for digital medical image storing in healthcare institution. Survivability issue arises when a storage server goes down due to unexpected disasters whilst medical image confidentiality issue arises due to disclosed data by third party on a conventional storage. This study explores secret sharing threshold scheme: Rabin's IDA, and Shamir's SSA, as potential approaches to address these issues. Currently, these schemes are widely known for providing data survivability and confidentiality in other fields. However, the aim of this project is to apply these secret sharing schemes through MIaDPACS to provide survivability and confidentiality on digital medical image. Pixels are extracted from the image, encoded and dispersed using Rabin's IDA into distributed storages. In addition, the secret key used in Rabin's IDA is also dispersed through Shamir's SSA. To reconstruct back the original image, it only requires a subset of the dispersed files with numbers equals to a threshold defined during dispersal. Experimental results conducted have shown that MIaDPACS able to provide survivability and confidentiality for digital medical image.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An enhanced fuzzy c-means medical segmentation algorithm 一种增强的模糊c均值医学分割算法
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013136
Iman Omidvar Tehrani, S. Ibrahim
{"title":"An enhanced fuzzy c-means medical segmentation algorithm","authors":"Iman Omidvar Tehrani, S. Ibrahim","doi":"10.1109/ISBAST.2014.7013136","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013136","url":null,"abstract":"Fuzzy-based algorithms have been widely used for medical segmentation. Fuzzy c-means (FCM) is one of the popular algorithms which is being used in this field. However this method of segmentation suffers mainly from two issues. Firstly, noisy images highly reduce the quality of segmentation. Secondly, the edges of the segmented images are not sharp and clear. Therefore the boundary between the two regions cannot clearly be identified. Our goal of this research is to propose a segmentation algorithm that cancels the negative noise effect on the final result and performs the segmentation with high edge accuracy by combining Sobel edge detection with FCM. Our algorithm is evaluated against three brain magnetic resonance image (MRI) datasets of real patients. The obtained analysis indicates that the edges of the segmented images by our method are sharp and accurate.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis 基于网络流量分析的k-means与小批量k-means聚类算法在android恶意软件检测中的比较研究
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013120
Ali Feizollah, N. B. Anuar, R. Salleh, F. Amalina
{"title":"Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis","authors":"Ali Feizollah, N. B. Anuar, R. Salleh, F. Amalina","doi":"10.1109/ISBAST.2014.7013120","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013120","url":null,"abstract":"This paper evaluates performance of two clustering algorithms, namely k-means and mini batch k-means, in the Android malware detection. Network traffic generated by the Android applications, normal and malicious, is analyzed for detection purpose. We have used MalGenome data sample for this work to build the dataset. We chose 800 samples out of 1260 Android malware samples. In addition, we collected numerous normal applications from the official Android market. The results show that mini batch k-means algorithm performs better than k-means algorithm in the Android malware detection.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126776001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
A psychographic framework for online user identification 一个在线用户识别的心理框架
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013121
A. Ikuesan, S. Razak, M. Salleh
{"title":"A psychographic framework for online user identification","authors":"A. Ikuesan, S. Razak, M. Salleh","doi":"10.1109/ISBAST.2014.7013121","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013121","url":null,"abstract":"The borderline separating users on the Internet is limited to the classical object-system identifiers such as users-login-ID, and network parameters, which is assumed to belong to a benign user. These assumptions provide subtle platform for malicious action in addition to exploitation of the vulnerability in online anonymity. The study proposes a human-system identifier framework based on the integration of psychosocial attributes of human into Internet traffic classification process, such that sufficient unique psychographics demography of users can be extracted. Such user psychographic characterization can be complementary method in user identification process. The implication of this paradigm can be adapted for insider investigation process, online transaction authentication process, e-commerce modeling. Further, it finds relevance in network management, especially in a mono-demographical culture.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127601285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
New dedicated measuring devices for intra-palm propagation signals 新的掌内传播信号专用测量装置
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013090
I. Nakanishi, Takashi Inada, Shigang Li
{"title":"New dedicated measuring devices for intra-palm propagation signals","authors":"I. Nakanishi, Takashi Inada, Shigang Li","doi":"10.1109/ISBAST.2014.7013090","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013090","url":null,"abstract":"We investigated the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is an electromagnetic wave that is propagated in the shallow part of the skin of a palm. However, the use of a support vector machine (SVM), which is a powerful machine learning method, does not enable superior verification performance. In this paper, we focus on problems related to measuring devices. The first problem is the contact stability between the electrodes and a palm, the second problem is the variation of the electrode position on a palm, and the third problem is the size of a palm. We develop new measuring devices by considering these problems and perform experiments to evaluate their effects.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DWT+LSB-based fragile watermarking method for digital Quran images 基于DWT+ lsb的古兰经数字图像脆弱水印方法
2014 International Symposium on Biometrics and Security Technologies (ISBAST) Pub Date : 2014-08-01 DOI: 10.1109/ISBAST.2014.7013137
F. Kurniawan, M. Khalil, M. Khan, Y. Alginahi
{"title":"DWT+LSB-based fragile watermarking method for digital Quran images","authors":"F. Kurniawan, M. Khalil, M. Khan, Y. Alginahi","doi":"10.1109/ISBAST.2014.7013137","DOIUrl":"https://doi.org/10.1109/ISBAST.2014.7013137","url":null,"abstract":"In this digital era, the authenticity of digital documents can be doubtful because it may suffer from tampering activity. Looking into Muslim community, the most important book/scripture is the Holy Quran. The Muslim community has put great efforts to ensure the authenticity of the printed Holy Quran. However, such effort is not accompanied for digital Holy Quran. In this paper, we propose a fragile watermarking method to preserve the authenticity of the digital Holy Quran. The Proposed method is considered as fragile watermarking method, which works on wavelet and spatial domains of digital Quran images. The authentication bits are embedded into each block of wavelet-transformed image. Then, the least significant bits of pixels are considered to embed another authentication bits. The experimental results show that the watermarked image is imperceptible and fragile to the common attacks.","PeriodicalId":292333,"journal":{"name":"2014 International Symposium on Biometrics and Security Technologies (ISBAST)","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信