2021 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

筛选
英文 中文
The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique 联合分析作为快速专家启发技术的应用
2021 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2021-11-02 DOI: 10.1109/ISI53945.2021.9624683
Brett Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin
{"title":"The Utility in Conjoint Analysis as a Fast Expert Elicitation Technique","authors":"Brett Jefferson, Natalie C. Heller, Joseph A. Cottam, Nhuy Van, George Chin","doi":"10.1109/ISI53945.2021.9624683","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624683","url":null,"abstract":"This paper presents an interface and analysis technique for quickly conducting expert elicitation with the goal of determining entity importance. Our interface deploys a two-alternative choice experiment that is capable of representing knowledge graphs in an easy to interpret fashion for users with limited experience with knowledge graphs. Our analysis methodology takes advantage of conjoint analysis techniques and provides entity weights for many SMEs simultaneously. The results largely align with individual participant fits.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133612693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations 对抗扰动攻击基于dnn的跨模态检索哈希框架
2021 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2021-11-02 DOI: 10.1109/ISI53945.2021.9624750
Xingwei Zhang, Xiaolong Zheng, W. Mao
{"title":"Attacking DNN-based Cross-modal Retrieval Hashing Framework with Adversarial Perturbations","authors":"Xingwei Zhang, Xiaolong Zheng, W. Mao","doi":"10.1109/ISI53945.2021.9624750","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624750","url":null,"abstract":"The rapid development of Internet and online data explosions elicit strong aspirations for users to search for semantic relevant information based on available samples. While the data online are always released with different modalities like images, videos or texts, effective retrieval models should discover latent semantic information with different structures. Recently, the state-of-the-art deep cross modal retrieval frameworks have effectively enhanced the performance on commonly-used platforms using the deep neural networks (DNNs). Yet DNNs have been verified to be easily misguided by small perturbations, and there are already several attack generation methods proposed on DNN-based models for real-world tasks, but they are all focused on supervised tasks like classification or object recognition. To effectively evaluate the robustness of deep cross-modal retrieval frameworks, in this paper, we propose a retrieval-based adversarial perturbation generation method, and demonstrate that our perturbation could effectively attack the state-of-the-art deep cross-modal and single image retrieval hashing models.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study 利用开放式威胁交换(OTX)了解网络威胁的时空趋势:Covid-19案例研究
2021 IEEE International Conference on Intelligence and Security Informatics (ISI) Pub Date : 2021-09-03 DOI: 10.1109/ISI53945.2021.9624677
Othmane Cherqi, Hicham Hammouchi, M. Ghogho, H. Benbrahim
{"title":"Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study","authors":"Othmane Cherqi, Hicham Hammouchi, M. Ghogho, H. Benbrahim","doi":"10.1109/ISI53945.2021.9624677","DOIUrl":"https://doi.org/10.1109/ISI53945.2021.9624677","url":null,"abstract":"Understanding the properties exhibited by Spatial-temporal evolution of cyber attacks improve cyber threat intelligence. In addition, better understanding on threats patterns is a key feature for cyber threats prevention, detection, and management and for enhancing defenses. In this work, we study different aspects of emerging threats in the wild shared by 160,000 global participants form all industries. First, we perform an exploratory data analysis of the collected cyber threats. We investigate the most targeted countries, most common malwares and the distribution of attacks frequency by localisation. Second, we extract attacks’ spreading patterns at country level. We model these behaviors using transition graphs decorated with probabilities of switching from a country to another. Finally, we analyse the extent to which cyber threats have been affected by the COVID-19 outbreak and sanitary measures imposed by governments to prevent the virus from spreading.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase 基于知识图谱的数字孪生网络物理系统安全监控——一个智能农业用例
Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, A. Joshi
{"title":"Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase","authors":"Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, A. Joshi","doi":"10.13016/M2XUYO-LZ8V","DOIUrl":"https://doi.org/10.13016/M2XUYO-LZ8V","url":null,"abstract":"Rapid advancements in Cyber-Physical System (CPS) capabilities have motivated farmers to deploy this ecosystem on their farms. However, there is a growing concern among users regarding the security risks associated with CPS. Especially with rising number of cyber-attacks on CPS, such as modifying sensor readings, interrupting operations, etc. Therefore, this paper describes a security surveillance framework to detect deviations in the ecosystem by incorporating a digital twin supported anomaly detection model. The reason for incorporating digital twins is that they add value by enabling real-time monitoring of connected smart farms. We pre-process the collected data from sensors deployed on the smart farm setup. The pre-processed data is fused with our smart farm ontology to populate a knowledge graph. The generated graph is further queried to extract the necessary sensor data. We utilize the extracted normal data to train the anomaly detection model. Further, we tested our model if it identifies abnormal values from sensors by simulating anomalous use case scenarios specific to our ecosystem.","PeriodicalId":347770,"journal":{"name":"2021 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116486649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信