{"title":"Implementation and Evaluation of Flow-level Network Simulator for Large-scale ICN Networks","authors":"Soma Yamamoto, Ryo Nakamura, H. Ohsaki","doi":"10.1109/COMPSAC54236.2022.00113","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00113","url":null,"abstract":"In recent years, ICN (Information-Centric Networking) that focuses on the data being transferred, rather than hosts exchanging the data, has been attracting attention as one of the promising next-generation Internet architectures. It has developed that fluid model of large-scale ICN networks, which is aimed at analyzing the performance of transport layer protocols in ICN networks. In this paper, we present a flow-level ICN sim-ulator called FICNSIM (Fluid-based ICN SIMulator), which is based on the numerical solver for ICN fluid models. In particular, we introduce two types of FICNSIM implementations: a highly customizable implementation in the Python language and a high-performance implementation in the Julia language. Furthermore, through several experiments, we evaluate the effectiveness of our FICNSIM implementation. Consequently, we show that our implemented FICNSIM can perform a high-speed simulation execution compared to a conventional packet-level ICN simulator.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliable Visibility Algorithms for Emergency Stop Systems in Smart Industries","authors":"Gabriele Capannini, Jane F. Carlson, R. Mellander","doi":"10.1109/COMPSAC54236.2022.00021","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00021","url":null,"abstract":"Automated machinery and robots working with humans are the norm in modern smart industries. A previous work in this area proposed a tool for improving the safety of such work places: an emergency system which halts those machines that are visible from an emergency stop button when it is pressed [1]. The solution presented in this paper improves the reliability of the aforementioned one at the expense of a higher computational complexity. Furthermore, two algorithmic optimizations are presented to mitigate the extra computational cost as it is shown by the results collected from the set of experiments conducted.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115083764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing Digital Twin Security Simulations for systematic Cyber Threat Intelligence","authors":"Marietheres Dietz, Daniel Schlette, G. Pernul","doi":"10.1109/COMPSAC54236.2022.00129","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00129","url":null,"abstract":"Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform preventive or re-active measures. Nevertheless, detailed Cyber Threat Intelligence (CTI) is reluctantly shared. Digital twins, the virtual counterparts of real-world assets, offer security simulation capabilities. The simulation of attack scenarios on industrial control systems (ICS) with digital twins yields valuable threat information. In our work, we outline the systematic steps towards a structured threat report starting with digital twin security simulations: We first present the course of action and define formal requirements for framework deployment. We then conduct an attack simulation with a prototypical digital twin application to evaluate our frame-work. Using the STIX2.1 standard, we assist CTI generation by providing utility tools guiding through the process steps. Our experimental results show that a STIX2.1 CTI report can be systematically constructed with the opportunity to customize according to the use case at hand. Adding digital twin security simulations to the list of CTI sources can provide shareable CTI and help organizations improve their security posture.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"60 26","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120825045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 4C Model for Hyflex Classrooms","authors":"Henry C. B. Chan, Yi Dou, Yue Jiang, Ping Li","doi":"10.1109/COMPSAC54236.2022.00029","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00029","url":null,"abstract":"In last two years, universities around the world have been using hyflex teaching due to COVID-19. This allows students to attend physical/online lectures in a flexible manner. A hyflex class comprises classroom students as well as online students. In this paper, we present a model for hyflex classrooms that highlights 4Cs: Content, Collaboration, Community and Communication. Based on the 4C model, a hyflex classroom has been designed and implemented through various teaching/learning tools or elements. These include the effective use of presentation slides, annotations, chatbox, open education resources, multiple choice exercises, group exercises etc. The effectiveness of these tools/elements were evaluated by means of an initial student survey. These results provide valuable insights into hyflex teaching/learning.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121915802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Your Feet In Cybersecurity: A Reddit Text Mining Approach","authors":"Prerit Datta, Moitrayee Chatterjee","doi":"10.1109/COMPSAC54236.2022.00080","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00080","url":null,"abstract":"The International Information System Security Certification Consortium, Inc (ISC)2 Cybersecurity Workforce Study, 2021, underscored the fact that there is a glaring 2.72 million global deficit of cybersecurity talent. Despite the availability of various learning resources, starting or advancing a career in cybersecurity demands extensive time and effort to select the appropriate resources. Individuals need to identify their prior knowledge and interest and map them appropriately to future learning requirements. The task of choosing an appropriate cybersecurity job profile and acquiring the necessary knowledge, ability, and skills across the variety of online information, can be a difficult undertaking. In this work, we explored data from an online community, Reddit, and applied Natural Language Processing techniques to identify the commonly referred skills, roles, and certifications in cybersecurity. This information can then be leveraged to recommend a systematic way on how to navigate a career in cybersecurity.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123993285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BitBooster: Effective Approximation of Distance Metrics via Binary Operations","authors":"Yorick Spenrath, Marwan Hassani, B. van Dongen","doi":"10.1109/COMPSAC54236.2022.00036","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00036","url":null,"abstract":"The Euclidean distance is one of the most commonly used distance metrics. Several approximations have been pro-posed in the literature to reduce the complexity of this metric for high-dimensional or large datasets. In this paper, we propose BitBooster, an approximation to the Euclidean distance that can be efficiently computed using binary operations and which can also be applied to the Manhattan distance. The introduced approximation error is shown to be negligible when BitBooster is used for both convex- and density-based clustering. While obtaining clusters of almost the same quality as those obtained with the exact computation, we require only a fraction of the computation time. We demonstrate the superiority of our method to alternative approximations on 960 synthetic and 13 real-world datasets of varying sizes, dimensions and clusters.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124482281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saroj Gopali, Z. Khan, Bipin Chhetri, Bimal Karki, A. Namin
{"title":"Vulnerability Detection in Smart Contracts Using Deep Learning","authors":"Saroj Gopali, Z. Khan, Bipin Chhetri, Bimal Karki, A. Namin","doi":"10.1109/COMPSAC54236.2022.00197","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00197","url":null,"abstract":"Various decentralized applications have deployed millions of smart contracts (SCs) on the Blockchain networks. SCs enable programmable transactions involving the transfer of monetary assets between peers on a Blockchain network without any need to a central authority. However, similar to any software program, SCs may contain security issues. Software se-curity engineers and researchers have already uncovered several Ethereum BlockChain and SC vulnerabilities. Still, researchers continuously discover many more security flaws in deployed SCs. Indeed, the popularity of SCs attracts adversaries to launch new attack vectors. Thus, efficient vulnerability detection is necessary. This paper lists broad known vulnerabilities in SCs and classifies them based on the multi-class categories such as Suicidal, Prodigal, Greedy, and Normal SCs. The paper adopts artificial recurrent neural network architecture such as Long Short-Term Memory (LSTM) and Temporal Convolutional Network (TCN) used in deep learning to identify and then classify vulnerable Scs.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124648263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mask and respirator detection: analysis and potential solutions for a frequently ill-conditioned problem","authors":"A. C. Marceddu, R. Ferrero, B. Montrucchio","doi":"10.1109/COMPSAC54236.2022.00165","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00165","url":null,"abstract":"During the coronavirus pandemic, the mask detection problem has become of particular interest. Usually, the goal is to create a system that can detect whether or not a person is wearing a mask or respirator. However, this tends to trivialize a problem that hides a greater complexity. In fact, people wear masks or respirators in various ways, many of which are incorrect. This makes the problem ill-conditioned and creates a bias compared to training cases, with the consequence that these systems have a considerably lower accuracy when used in practice. We claim that focusing on the ways in which a mask can be worn and classifying the problem not as binary but at least as ternary, thus adding an intermediate class containing all those ways in which a mask or respirator can be worn incorrectly, could help address this problem. For this reason, this paper describes and puts to the proof the Ways to Wear a Mask or a Respirator Database (WWMR-DB). It has a fine classification of the most common ways in which a mask or respirator is worn, which can be used to test how mask detection systems work in cases that resemble the real ones more. It was used to test a neural network, the ResNet-152, which was trained on less fine databases, like the Face-Mask Label Dataset and the MaskedFace-Net. The mixed results denote the shortcomings of these databases and the need to enhance them or resort to finer databases.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128665820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vamsi Krishna Dhulipalla, Md Abdullah Al Hafiz Khan
{"title":"Mental workload classification from non-invasive fNIRs signals through deep convolutional neural network","authors":"Vamsi Krishna Dhulipalla, Md Abdullah Al Hafiz Khan","doi":"10.1109/COMPSAC54236.2022.00230","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00230","url":null,"abstract":"Classification of mental workload has always been considered a crucial task in the literature related to brain mem-ory. People perform various tasks and have multiple cognitive workloads. This mental workload can be sensed in a non-intrusive way using Functional near-infrared spectroscopy (fNIRS) sig-nals. fNIRS is a photosensitive brain examining method which uses near-infrared spectroscopy to measure aspects of brain functions and activities. In this work, we focus on classifying segmented mental workload from fNIRS signals. We propose a deep convolutional neural (DCNN) network to classify mental workload. We evaluate our model performance using the publicly available large-scale open-access dataset, “Tufts fNIRS to Mental Workload (fNIRS2MW)” that consists of 68 participants per-forming n-back tasks where increased n represents the intensity of the mental workload. Our proposed deep convolutional neural network (DCNN) comprises six convolutional layers. Our DCNN achieves a performance gain of 28 % and 4 % comparing the state-of-the-art models EEGnet and Deep ConvNet, respectively.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129823080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Engineering in Digital Transformation and Diversity: Preliminary Literature Review","authors":"H. Washizaki","doi":"10.1109/COMPSAC54236.2022.00083","DOIUrl":"https://doi.org/10.1109/COMPSAC54236.2022.00083","url":null,"abstract":"With the social awareness of diversity and inclusion, digital transformation (DX) with software engineering is expected to contribute to diversity in digitalized society. We present research and practice trends and future directions of software engineering activities in diversity and DX by summarizing a result of a preliminary literature review.","PeriodicalId":330838,"journal":{"name":"2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC)","volume":"43 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127235282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}