2020 22nd International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment 瑞利衰落环境下安全约束下无线多跳随机网络的连通性
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061415
L. Dung, Hoa T. K. Tran, S. Choi
{"title":"Connectivity of Wireless Multi-hop Stochastic Networks under the Security Constraints in Rayleigh Fading Environment","authors":"L. Dung, Hoa T. K. Tran, S. Choi","doi":"10.23919/ICACT48636.2020.9061415","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061415","url":null,"abstract":"In this paper, we investigate the probability of existing a secure wireless multi-hop connection between two legitimate users in stochastic wireless networks under the existence of colluding eavesdroppers. Specifically, we introduce a simulation-based analysis that returns the path connectivity by averaging the connection status of a vast number of topology trails with a security-aware routing algorithm is taken into account. The behaviors of the multi-hop connectivity are examined for different network sizes and the numbers of legitimate users and eavesdroppers. The obtained results in this paper show that increasing the number of legitimate users leads to maximum path connectivity of less than one; meanwhile, path connectivity is continuously reduced as the number of eavesdroppers gets higher. Moreover, scaling down the network size does not always help to increase path connectivity.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Family Classification using Active Learning by Learning 基于主动学习的恶意软件分类
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061419
Chin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair
{"title":"Malware Family Classification using Active Learning by Learning","authors":"Chin-Wei Chen, Ching-Hung Su, Kun-Wei Lee, Ping-Hao Bair","doi":"10.23919/ICACT48636.2020.9061419","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061419","url":null,"abstract":"In the past few years, the malware industry has been thriving. Malware variants among the same malware family shared similar behavioural patterns or signatures reflecting their purpose. We propose an approach that combines support vector machine (SVM) classifiers and active learning by learning (ALBL) techniques to deal with insufficient labeled data in terms of the malware classification tasks. The proposed approach is evaluated with the malware family dataset from Microsoft Malware Classification Challenge (BIG 2015) on Kaggle. The results show that ALBL techniques can effectively boost the performance of our machine learning models and improve the quality of labeled samples.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115998967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes 了解台湾ATM劫案:从网路攻击阶段到调查过程
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061354
Da-Yu Kao
{"title":"Comprehending Taiwan ATM Heist: From Cyber-attack Phases to Investigation Processes","authors":"Da-Yu Kao","doi":"10.23919/ICACT48636.2020.9061354","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061354","url":null,"abstract":"Cybercriminals increasingly use sophisticated tools and advanced methods to attack bank systems. Cyber black markets for hacking tools or services are gaining widespread attention as more advanced persistent threat attacks are relevant to such markets. The recent cyber-attacks on banks or financial institutions have increased the technical expertise of cybercriminals. This study reviews ATM threats and highlights the cybercrime investigation of ATM heist. An incident investigation strategy from ISO/IEC 27043:2015 is proposed to embed cyber-attack phases and detect ATM heist. It demonstrates how this strategy can provide investigators with exceptional abilities to interpret evidence. By integrating an effective cybercrime investigation strategy, investigators can minimize the cost of collecting evidence in a forensically sound manner.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"36 45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Effectiveness of Notations for Designing Security Aspects 评估符号在设计安全方面的有效性
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061305
S. Muneer, Muhammad Nadeem, B. Kasi, Mir Hamayoun Yousaf
{"title":"Evaluating the Effectiveness of Notations for Designing Security Aspects","authors":"S. Muneer, Muhammad Nadeem, B. Kasi, Mir Hamayoun Yousaf","doi":"10.23919/ICACT48636.2020.9061305","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061305","url":null,"abstract":"Existing software design approaches used to design security aspects lack notations that can be used to design the security requirements of a system which may result in more complex and dense designs. However, literature review has shown that there are some proposed notations to represent security aspects within a system. Other researchers have proposed evidence-based principles that provide basis for constructing Visual Notations in Software Engineering. The principles include: Graphic Economy, Perceptual Discriminability, Semiotic Clarity, Cognitive Integration, Visual Expressiveness etc. In this research, we have evaluated a set of proposed notations in accordance with principles for designing cognitively accepted graphics by conducting a human subject study. A questionnaire was distributed among a group of graduate and post-graduate students. The goal was to validate the notations based on theory of “How Visual Notations Communicate?”. This study will help researchers in developing cognitively accepted notations and set a course for designing new notations for UMLsec that are perceptually, semantically and visually expressive.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks 面向工作流过程和知识挖掘、预测和分析框架的过程感知事件日志数据库
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061449
Seong-Hun Ham, Dihn-Lam Pham, Kyoungsook Kim, Kwanghoon Pio Kim
{"title":"Process-aware Event Log Datacubes for Workflow Process and Knowledge Mining, Predicting and Analyzing Frameworks","authors":"Seong-Hun Ham, Dihn-Lam Pham, Kyoungsook Kim, Kwanghoon Pio Kim","doi":"10.23919/ICACT48636.2020.9061449","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061449","url":null,"abstract":"The issue of workflow process mining and analytics is beginning to make its appearance in the workflow-supported enterprise intelligence and systems literature. In order to improve the quality of workflow process intelligence, it is essential for an efficient and effective data center storing workflow enactment event logs to be provisioned in carrying out the workflow process mining and analytics. In this paper, we propose a three-dimensional datacube, which is named as a process-aware dat-acube, for organizing workflow-supported enterprise data centers to efficiently as well as effectively store the workflow process enactment event logs in the IEEE XES format, and also we carry out an experimental process mining and analytics to show how much perfectly the process-aware datacubes are suitable for discovering workflow process patterns and its analytical knowledge, like enacted proportions and enacted work transferences, from the workflow process enactment event histories. From the process-aware datacubes, the workflow process mining must be able to properly discover all the workflow process patterns based upon the four types of control-flow primitives such as linear (sequential) routing, disjunctive (selective) routing, conjunctive (parallel) routing, and iterative (loop) routing patterns, whereas the workflow process analytics is to discover the enacted pro-protions of each of the process pattherns and the enacted work transferences of each of the workflow performers.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127043323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study for Image Expression of Emergency Alert 紧急警报图像表达的研究
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061478
Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee
{"title":"A Study for Image Expression of Emergency Alert","authors":"Yoonkwan Byun, Hyunji Lee, Sek-Jin Jang, S. Choi, Seung-hee Oh, Yong-Tae Lee","doi":"10.23919/ICACT48636.2020.9061478","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061478","url":null,"abstract":"Emergency alert message is effective way to send text information for public alert service in disaster situation. But the textual information has limitations to make people understand. In this paper, we suggest a method to expression image on cell phone device.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132090162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP Network 多业务IP网络中多播IPTV和VoD流的建模与仿真
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061262
M. Barry, J. K. Tamgno, C. Lishou, Ismaël Habou Dere
{"title":"Modeling and Simulation of Multicast IPTV and VoD Streams for a Multiservice IP Network","authors":"M. Barry, J. K. Tamgno, C. Lishou, Ismaël Habou Dere","doi":"10.23919/ICACT48636.2020.9061262","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061262","url":null,"abstract":"This thesis work concerns the modelling and simulation of IPTV and VoD streams in an IP/MPLS network. Video traffic and their protocols are studied. We started from the M/G/∞ model which allowed us to have images (I, B and P). These are the images that were used during the modeling process. Indeed, this model allows to characterize a video sequence by the following parameters: Slot or time to generate a packet; image level or GOP. Image size or GOP distribution: Mixing distribution. Type of correlation: Markov, short-term dependence or long-term dependence. The protocols involved are: MPEG-TS; UDP; RTP; RTSP; IP; IGMPv2; MPLS. In order to find a packet output model, we created a “modeler” in a python environment to estimate multicast and VoD traffic. We have created four (4) functions to materialize this modeling: “Packer”, TS, Sequencer and Transport. The results collected allowed us to determine the law and mathematical model of packet output. And it is the M/M/∞ model that models a video source. We used the RStudio software for this purpose. All these theoretical results could be compared during the simulation of the IPTV and VoD servers.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Composition of Image-Based Ship-type/class Identification System 基于图像的船型/船级识别系统组成研究
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061395
Ji Won Lee, Do-Won Nam, Jungsoo Lee, S. Moon, Arum Oh, Wonyoung Yoo
{"title":"A Study on the Composition of Image-Based Ship-type/class Identification System","authors":"Ji Won Lee, Do-Won Nam, Jungsoo Lee, S. Moon, Arum Oh, Wonyoung Yoo","doi":"10.23919/ICACT48636.2020.9061395","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061395","url":null,"abstract":"Ships, coastal posts, and control centers need to verify the information, location, and speed of nearby vessels for various purposes, such as traffic control or maritime warfare. In the field of defense where accurate information on nearby ships is important, radar is used to acquire location information on nearby ships. However, the selection of the opponent's position as well as the high-value units must be more important and prioritized, and image-based warship type/class identification techniques are required in naval warfare. This paper presents a detailed method for system construction that supports detailed identification of warship type/class through structural analysis. Through the development of the proposed system, reliable warship identification can be used for tactical applications in the defense field, thereby contributing to the enhancement of defense capabilities.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on Service model of the Agriculture Information based Convergence Service 基于农业信息融合服务的服务模式研究
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/icact48636.2020.9061288
Heechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, SokPal Cho, Soonghee Lee
{"title":"Study on Service model of the Agriculture Information based Convergence Service","authors":"Heechang Chung, Dongil Kim, Kyoung-Sook Jung, Byeong-Beom Kang, SokPal Cho, Soonghee Lee","doi":"10.23919/icact48636.2020.9061288","DOIUrl":"https://doi.org/10.23919/icact48636.2020.9061288","url":null,"abstract":"Agricultural data is the key foundation for Smart Farm models, in which a wide range of Information and Communication Technology (ICT) such as IoT and Big Data are converged, to be operated and managed. Given the fact that every single stage in Smart Farm models from crop growing to selling requires appropriate data, it is crucial to have a well-established service model for data collection and its provision. This service model should gather and process data before providing it for users to enhance their convenience in farm business. By converging various data collected from each stage of production, the model should ensure higher quality of service. This paper describes the reference architecture of the service model.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131074170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier Approach 利用卷积神经网络从螺旋图和波浪图中检测帕金森病:一种多阶段分类器方法
2020 22nd International Conference on Advanced Communication Technology (ICACT) Pub Date : 2020-02-01 DOI: 10.23919/ICACT48636.2020.9061497
Sabyasachi Chakraborty, S. Aich, J. Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim
{"title":"Parkinson's Disease Detection from Spiral and Wave Drawings using Convolutional Neural Networks: A Multistage Classifier Approach","authors":"Sabyasachi Chakraborty, S. Aich, J. Sim, Eunyoung Han, Jinse Park, Hee-Cheol Kim","doi":"10.23919/ICACT48636.2020.9061497","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061497","url":null,"abstract":"Identification of the correct biomarkers with respect to particular health issues and detection of the same is of paramount importance for the development of clinical decision support systems. For the patients suffering from Parkinson's Disease (PD), it has been duly observed that impairment in the handwriting is directly proportional to the severity of the disease. Also, the speed and pressure applied to the pen while sketching or writing something are also much lower in patients suffering from Parkinson's disease. Therefore, correctly identifying such biomarkers accurately and precisely at the onset of the disease will lead to a better clinical diagnosis. Therefore, in this paper, a system design is proposed for analyzing Spiral drawing patterns and wave drawing patterns in patients suffering from Parkinson's disease and healthy subjects. The system developed in the study leverages two different convolutional neural networks (CNN), for analyzing the drawing patters of both spiral and wave sketches respectively. Further, the prediction probabilities are trained on a metal classifier based on ensemble voting to provide a weighted prediction from both the spiral and wave sketch. The complete model was trained on the data of 55 patients and has achieved an overall accuracy of 93.3%, average recall of 94%, average precision of 93.5% and average f1 score of 93.94%","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信