2019 International Conference on Advances in the Emerging Computing Technologies (AECT)最新文献

筛选
英文 中文
An Efficient Key Management Scheme for Secure Demand-Response Communications in Smart Grid 智能电网安全需求响应通信的有效密钥管理方案
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194168
Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid
{"title":"An Efficient Key Management Scheme for Secure Demand-Response Communications in Smart Grid","authors":"Mourad Benmalek, Y. Challal, A. Derhab, Zakaria Gheid","doi":"10.1109/AECT47998.2020.9194168","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194168","url":null,"abstract":"Smart Grid (SG) is considered as the next generation power grid, due to its efficiency, resilience, reliability and sustainability. An important feature that will make the SG more reliable and lead to mutual benefits for both customers and power utilities is the Demand Response (DR). DR refers to a set of actions with the aim of dynamically reducing energy demand at specific times and in specific locations in response to a relative shortage in supply. In this paper, we focus on the security of DR and we propose a new key management scheme for SG to secure DR communications. The proposed scheme is based on a novel multi-group key graph structure that supports the management of multiple and dynamic DR programs simultaneously for each customer. A security and performance analysis is conducted to show the effectiveness of our solution.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Profiling Vulnerabilities Threatening Dual Persona in Android Framework 分析Android框架中威胁双重角色的漏洞
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194151
K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid
{"title":"Profiling Vulnerabilities Threatening Dual Persona in Android Framework","authors":"K. Siddiquie, Narmeen Shafqat, A. Masood, Haider Abbas, W. Shahid","doi":"10.1109/AECT47998.2020.9194151","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194151","url":null,"abstract":"Enterprises round the globe have been searching for a way to securely empower AndroidTM devices for work but have spurned away from the Android platform due to ongoing fragmentation and security concerns. Discrepant vulnerabilities have been reported in Android smartphones since Android Lollipop release. Smartphones can be easily hacked by installing a malicious application, visiting an infectious browser, receiving a crafted MMS, interplaying with plug-ins, certificate forging, checksum collisions, inter-process communication (IPC) abuse and much more. To highlight this issue a manual analysis of Android vulnerabilities is performed, by using data available in National Vulnerability Database NVD and Android Vulnerability website. This paper includes the vulnerabilities that risked the dual persona support in Android 5 and above, till Dec 2017. In our security threat analysis, we have identified a comprehensive list of Android vulnerabilities, vulnerable Android versions, manufacturers, and information regarding complete and partial patches released. So far, there is no published research work that systematically presents all the vulnerabilities and vulnerability assessment for dual persona feature of Android’s smartphone. The data provided in this paper will open ways to future research and present a better Android security model for dual persona.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115568012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things Security Assessment in Healthcare Environment 医疗环境下的物联网安全评估
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194216
D. Ali, Ahmed Mahmoud
{"title":"Internet of Things Security Assessment in Healthcare Environment","authors":"D. Ali, Ahmed Mahmoud","doi":"10.1109/AECT47998.2020.9194216","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194216","url":null,"abstract":"This paper deals with a new generation of the Internet devices which is named Internet of Things (IoT) concerning the health care environment. IoT allows understanding the interconnected devices among them, including gadgets and sensors… etc.Security assessment and security gaps treatment in the healthcare environment is also tackled through the use of secure routing protocol (SecRout) for the protection of wireless sensor networks (WSN) during different types of attacks and security risks. Symmetric encryption is used in SecRout to confirm the validity of the messages and a small cache in each nodes used to record the route of the partial routing (the previous and subsequent nodes) and it ensures that the destination is able to identify or ignore the frivolous messages. Finally, SecRout protocol performance is compared with the performance of unsecured AODV protocol..","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116295408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modified Planar Rectangular Antenna Array for Wideband 5G MIMO Applications 宽带5G MIMO应用的改进平面矩形天线阵列
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194162
U. Rafique, Hisham Khalil
{"title":"Modified Planar Rectangular Antenna Array for Wideband 5G MIMO Applications","authors":"U. Rafique, Hisham Khalil","doi":"10.1109/AECT47998.2020.9194162","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194162","url":null,"abstract":"A modified planar rectangular antenna array design is presented for wideband 5G MIMO applications. The single element of the array comprises of a modified rectangular patch fed using a $50 Omega$ microstrip feed line, and a partial ground plane with a rectangular notch. It is observed from simulation results that the proposed antenna offers wideband characteristics from 26.88 GHz to 61.17 GHz. Furthermore, a four-element MIMO array has been designed for its possible use in 5G enabled communication devices. It is demonstrated that the proposed MIMO antenna array provides high isolation between array elements without disturbing the return loss of an individual element.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125621126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Creating Fair Classification Models in Reality Mining Using Data Resampling Techniques 利用数据重采样技术建立现实挖掘中公平的分类模型
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194174
Ghassan F. Bati
{"title":"Towards Creating Fair Classification Models in Reality Mining Using Data Resampling Techniques","authors":"Ghassan F. Bati","doi":"10.1109/AECT47998.2020.9194174","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194174","url":null,"abstract":"Multiple recent efforts in human-centered computing have used mobile and ubiquitous data to infer propensities of individuals (e.g. to trust others or behave altruistically). Often studied under the umbrella of “Reality Mining” multiple such efforts have reported high accuracies at the considered prediction tasks. However, there has been little work at quantifying the “fairness” of such algorithms in terms of how the quality of the predictions varies over different demographic groups (e.g. across gender). This work takes inspiration from data resampling techniques to create fair classification models. Empirical results suggest that a combination of over and under sampling technique (SmoteTomek) to the sensitive (protected) attribute (e.g. gender) yields improved model’s performance while reducing disparity across genders.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130253020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power Efficient FPGA-based TCAM Architecture by using Segmented Matchline Strategy 基于分段匹配线策略的高效fpga TCAM架构
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194189
Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim
{"title":"Power Efficient FPGA-based TCAM Architecture by using Segmented Matchline Strategy","authors":"Najib Ur Rehman, O. Mujahid, Z. Ullah, Abdul Hafeez, Tama Fouzder, Muhammad Ibrahim","doi":"10.1109/AECT47998.2020.9194189","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194189","url":null,"abstract":"Ternary content-addressable memory (TCAM) is famous for its high-speed search operation but this speed comes at the cost of high-power consumption. The paper presents a power efficient architecture for TCAM on field-programmable gate array (FPGA) by using segmented matchline (ML) strategy. Each ML is divided into four equal segments where each segment has nine bits. The proposed TCAM architecture is implemented on Xilinx Virtex-6 FPGA for the size of $64times 36$. Implementation results show that during search operation, the proposed TCAM results in 13.88% reduction in dynamic power consumption compared to the latest FPGA-based TCAMs while not compromising on speed.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127458423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Overview of Privacy Issues in IoT Environments 物联网环境中的隐私问题概述
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194197
Suha Ibrahim Al-Sharekh, K. Al-Shqeerat
{"title":"An Overview of Privacy Issues in IoT Environments","authors":"Suha Ibrahim Al-Sharekh, K. Al-Shqeerat","doi":"10.1109/AECT47998.2020.9194197","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194197","url":null,"abstract":"Many regions in the world have recently sought to integrate and apply advanced technologies in various aspects of life. IoT applications have become popular in different areas such as smart homes, e-health, smart cities, smart connected devices, and many more. However, the growth and spread of IoT technology increase the security and privacy risks that users may experience. Security and privacy problems cannot be eradicated but can be mitigated. Therefore, it is necessary to explore and update dedicated solutions to alleviate them. This paper aims to provide and identify a comprehensive overview of privacy issues and a set of enhanced solutions to protect user privacy in IoT environments. Moreover, it surveys the opinion of researchers and experts regarding challenges and solutions related to IoT privacy. Finally, a set of recommendations and guidelines are suggested to enhance privacy in IoT environments.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Bug Prediction Employing Feature Selection and Deep Learning 基于特征选择和深度学习的软件Bug预测
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194215
Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal
{"title":"Software Bug Prediction Employing Feature Selection and Deep Learning","authors":"Samar M. Abozeed, Mustafa ElNainay, Soheir A. Fouad, M. Abougabal","doi":"10.1109/AECT47998.2020.9194215","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194215","url":null,"abstract":"It was proven that the cost of fixing errors escalates as a project moves through its life cycle in an exponential fashion. Identifying buggy classes, as soon as they are committed to the Version Control System, would have a significant impact on reducing such cost. Mining in software repositories is a growing research area, where innovative techniques and models are designed to analyze software repositories data and uncover useful information that can help in software bug prediction. Previous studies showed that Deep Learning has achieved remarkable results in many fields and it keeps evolving.In this paper, experiments are carried out to study the effect of feature selection on the performance of bug prediction models and to check if better results can be obtained by using the promising Deep Learning techniques. Results show that applying feature selection, using a simple filter approach, such as selecting the highly ranked 9 and 5 features out of the 17 features, did not enhance the performance measures in most cases. On the other hand, results show that Deep Learning model (DL) achieves higher performance measures than the selected set of base classifiers for small and balanced datasets.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124527503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Implementation of a Secure Email System with ID-based Encryption 基于id加密的安全电子邮件系统的实现
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/AECT47998.2020.9194199
Eltigani B. Abdelsatir, Mohammad H. Alrashdan
{"title":"On the Implementation of a Secure Email System with ID-based Encryption","authors":"Eltigani B. Abdelsatir, Mohammad H. Alrashdan","doi":"10.1109/AECT47998.2020.9194199","DOIUrl":"https://doi.org/10.1109/AECT47998.2020.9194199","url":null,"abstract":"Email continues to be the major business correspondence tool as one of the most regularly used means of communication and collaboration today. The unsecured nature of email, however, can cause unauthorized disclosure of sensitive information. Currently, many email systems are based on schemes such as S/MIME,PGP and PKI to secure communication. However, authentication methods utilized in these systems can become costly with the growing burden of certificate management and pre-enrolment as the number of users increases. In this paper, a secure email framework while taking into account Identity-Based Encryption without pairing is considered. The proposed system provides secure email environment that eliminates PKI hassles with effortless key creation and management.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123868238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Wearable Millimeter Wave MIMO Antenna Design For High Frequency Applications 用于高频应用的可穿戴毫米波MIMO天线设计
2019 International Conference on Advances in the Emerging Computing Technologies (AECT) Pub Date : 2020-02-01 DOI: 10.1109/aect47998.2020.9194218
Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder
{"title":"A Wearable Millimeter Wave MIMO Antenna Design For High Frequency Applications","authors":"Muhammad Shafeeq, Muhammad Ibrahim, Z. Ullah, Abdul Hafeez, Tama Fouzder","doi":"10.1109/aect47998.2020.9194218","DOIUrl":"https://doi.org/10.1109/aect47998.2020.9194218","url":null,"abstract":"In this paper, we propose an improved methodology for the reduction of mutual coupling within millimeter-wave (mmwave) wearable multiple-input and multiple-output (MIMO) antennas. Such approach is crucial for high frequency applications. The important parameters such as return loss (with best matching having $S_{11}, lt -10$ dB with 35 GHz centered frequency), radiation pattern, diversity gain (DG $gt 9.99)$, envelop correlation coefficient (ECC $lt 0.05)$, and mutual coupling evaluate the presented antenna. The main issue that arises in MIMO antenna is mutual coupling. We mitigate this problem by introducing slots on either end of the transmission line. We achieve a reduced mutual coupling even less than -36 dB and it works within a high-frequency range, which is its beauty.","PeriodicalId":331415,"journal":{"name":"2019 International Conference on Advances in the Emerging Computing Technologies (AECT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信