2019 International Conference on Platform Technology and Service (PlatCon)最新文献

筛选
英文 中文
A Study on Electrocardiogram based Biometrics using Embedded Module 基于嵌入式模块的心电图生物识别技术研究
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8669422
Jin Su Kim, Gyu-Ho Choi, S. Pan
{"title":"A Study on Electrocardiogram based Biometrics using Embedded Module","authors":"Jin Su Kim, Gyu-Ho Choi, S. Pan","doi":"10.1109/PLATCON.2019.8669422","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669422","url":null,"abstract":"Biometrics technology uses bio-signal data, which are unique for each person, as features for identification. Among the biometrics, electrocardiogram (ECG) signals, which are related to the heartbeat, can be used for personal identification as well as disease diagnosis, and also makes it easier to miniaturize measuring devices compared to other bio-signals. In this paper, an ECG-based personal identification system using embedded module is proposed. When an ECG signal is entered, the computer removes noise and segments the signal, after which the signals are transmitted to the embedded module. The embedded module extracts the fiducial point features of the ECG signal and classifies ECG data. Experiment results showed that the segmented drive and the single drive exhibited equal results, and the equal error rate (EER) was the lowest at an average of 0.74% when test data of 6 cycles. To shorten the operating time of the implemented personal identification system, three embedded module optimization methods were used, it decreased by 66.1%. Thereby confirming potential use of the identification system by using ECG signals based small devices.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127524325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient Vulnerability Management Process in the Military 军队中有效的漏洞管理过程
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8669420
Seung-hyun Baek, Young-Gab Kim
{"title":"Efficient Vulnerability Management Process in the Military","authors":"Seung-hyun Baek, Young-Gab Kim","doi":"10.1109/PLATCON.2019.8669420","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669420","url":null,"abstract":"Reducing vulnerabilities is one of the most effective ways to minimize the cyber risks that can occur to information systems. Given the characteristics of the military environment, particularly in operating a wide variety of information systems and dealing with critical information on national security, clear / concise management procedures are needed that enable more realistic and direct action to identify and address vulnerabilities. Also, five requirements for the efficient vulnerability management procedure in the military are proposed as follows: (i) quickness, (ii) continuousness, (iii) clearness, (iv) interdependence, and (v) completeness. By considering all information, this paper suggested 5 phases for the vulnerability management process in military: (i) Framing; (ii) Identification; (iii) Assessment; (iv) Remediation; and (v) Verification. In addition, the three-tiered concept was applied to the efficient management of the vulnerabilities, taking into consideration the characteristics of the organization with clear hierarchical relationships. As a result, it will contribute to reduce the cyber risk in the defense area, by presenting the specific procedures for vulnerability management in each hierarchical organization.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KSI based Sensitive Data Integrity Validation Method for Precision Medicine System 基于KSI的精准医疗系统敏感数据完整性验证方法
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8668964
Deuk-Hun Kim, Jeong-Seok Jo, Jin Kwak
{"title":"KSI based Sensitive Data Integrity Validation Method for Precision Medicine System","authors":"Deuk-Hun Kim, Jeong-Seok Jo, Jin Kwak","doi":"10.1109/PLATCON.2019.8668964","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8668964","url":null,"abstract":"Interest in precision medicine in the medical field is increasing through the United States ‘Precision Medicine Initiative’ announced in 2015. Accordingly, a method for secure and efficient provide of precision medicine services has been continuously studied. Recently, a survey by consulting company shows the importance of verification the integrity of data in decision making is increasing in the analysis of sensitive data of big data size that a key component of precision medicine. Therefore, in this paper, we study integrity validation method of sensitive data by applying signature technology called KSI in precision medicine system.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber attack scenarios on smart city and their ripple effects 智慧城市的网络攻击场景及其连锁反应
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8669431
Joochan Lee, Janghoon Kim, Jungtaek Seo
{"title":"Cyber attack scenarios on smart city and their ripple effects","authors":"Joochan Lee, Janghoon Kim, Jungtaek Seo","doi":"10.1109/PLATCON.2019.8669431","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669431","url":null,"abstract":"In recent years, nations have been establishing policies to construct smart cities and promote their operation at the national level and competing with one another through the support of the required resources. Smart cities are futuristic state-of-the-art cities wherein all components of the urban infrastructure are inter-operated through networks using the core technologies in the Fourth Industrial Revolution and ICT(Information and Communication Technology). Various kinds of on-site state information are collected and monitored by installing sensors that are IoT(Internet of Things) devices in various services, and on-site controlling devices are controlled remotely if needed. Smart cities face increasing cyber security threats compared to existing cities as advanced technologies are utilized, so the importance of cyber security and user privacy has increased. In this study, security threats against the smart city architecture are analyzed, and possible cyber-attack scenarios in the construction of services and operation environment are identified and analyzed. The ripple effects of each attack are also analyzed. The analysis results in this study can be utilized in security technology research and development and applications in the future.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116549930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Analysis of IoT Platform Security: A Survey 物联网平台安全分析:调查
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8669423
Jin-Yong Yu, Young-Gab Kim
{"title":"Analysis of IoT Platform Security: A Survey","authors":"Jin-Yong Yu, Young-Gab Kim","doi":"10.1109/PLATCON.2019.8669423","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669423","url":null,"abstract":"Because the IoT (Internet of Things) is emerging as the next generation growth engine that leads the IT (information technology) industry, many developed countries and companies are developing IoT based technologies to preoccupy the IoT market. Among the core technologies that make up IoT, IoT platform can have a huge impact on future devices. It is attracting attention as one of the most promising technologies of IoT technology, but at the same time concerns about platform security are also increasing. In response to this, Korea (domestic) and international IoT platforms adopt diverse security technologies according to the developed purpose and environment. For most domestic IoT platforms are developed based on platforms on which standardization is underway like oneM2M and OCF. For the international IoT platforms, they were developed in a proprietary method. Not only this, the security method also adopted their own method. But, even though the security methods of domestic and international IoT platforms have a distinct difference like this, studies comparing and analyzing the security elements of domestic and international IoT platforms are not enough. Therefore, in this paper, we analyze and compare security elements of domestic and international IoT platforms so that more secure domestic IoT growth can be achieved. Finally, we propose the development direction of future IoT platform security.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134523571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Proposal of Iterative Consensus Process for Group Decision Making 一种群体决策的迭代共识过程
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8668957
Yosep Lee, Y. B. Park
{"title":"A Proposal of Iterative Consensus Process for Group Decision Making","authors":"Yosep Lee, Y. B. Park","doi":"10.1109/PLATCON.2019.8668957","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8668957","url":null,"abstract":"Consensus is so important that it has always occupied its crucial position in human society. In particular, the meaning and importance of consensus in democratic society is much more special because it is a social system that operates based on the consensus among people. Up to now, human society has reached consensus by using the majority vote, but it is clear that there are several problems in it. Meanwhile, there are lots of researches which have been carried out so far to develop the appropriate methodology and tools for reaching out consensus. However, these researches suggest that measurement to derive the result is difficult for general purpose in that the evaluation is one-time, and that the trust problem arises from delegating the consensus process to the 3-rd party such as information system is not solved. In this paper, we propose an iterative consensus process which can solve the problems above, and general description about this process is included. The proposed process draws consensus in an iterative way, visualize the information generated from iteration, presents it to the participants, and supports the participants’ consensus through structured discussion. In addition, the trust problem, which occurs when a consensus process is delegated to the information system can be solved with utilizing the blockchain technology by conveying and ensuring the reliability of the result, and this proposed process can adopt it.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114455516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection pca尺度对GRU入侵检测性能的影响
2019 International Conference on Platform Technology and Service (PlatCon) Pub Date : 1900-01-01 DOI: 10.1109/PLATCON.2019.8668960
Thi-Thu-Huong Le, Hyeoun Kang, Howon Kim
{"title":"The Impact of PCA-Scale Improving GRU Performance for Intrusion Detection","authors":"Thi-Thu-Huong Le, Hyeoun Kang, Howon Kim","doi":"10.1109/PLATCON.2019.8668960","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8668960","url":null,"abstract":"A device or software appliance monitors a network or systems for malicious activity is an Intrusion Detection System (IDS). Conventional IDS does not detect elaborate cyber-attacks such as a low-rate DoS attack as well as unknown attacks. Machine Learning has attracted more and more interests in recent years to overcome these limitations. In this paper, we propose a novel method to improve intrusion detection accuracy of Gated Recurrent Unit (GRU) by embedding the proposed PCA-Scale with two options including PCA-Standardized and PCA-MinMax into the layer of GRU. Both optional methods explicitly enforce the learned object feature maps by affecting the direction of maximum variance with positive covariance. This approach can be applied to GRU model with negligible additional computation cost. We present experimental results on two real-world datasets such as KDD Cup 99 and NSL-KDD demonstrate that GRU model trained with PCA-Scaled method achieves remarkable performance improvements.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126754697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信