2022 Cyber Research Conference - Ireland (Cyber-RCI)最新文献

筛选
英文 中文
Improving Resistance of Matrix Factorization Recommenders To Data Poisoning Attacks 提高矩阵分解推荐器对数据中毒攻击的抵抗力
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032671
Sulthana Shams, D. Leith
{"title":"Improving Resistance of Matrix Factorization Recommenders To Data Poisoning Attacks","authors":"Sulthana Shams, D. Leith","doi":"10.1109/Cyber-RCI55324.2022.10032671","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032671","url":null,"abstract":"In this work, we conduct a systematic study on data poisoning attacks to Matrix Factorisation (MF) based Recommender Systems (RS) where a determined attacker injects fake users with false user-item feedback, with an objective to promote a target item by increasing its rating. We explore the capability of a MF based approach to reduce the impact of attack on targeted item in the system. We develop and evaluate multiple techniques to update the user and item feature matrices when incorporating new ratings. We also study the effectiveness of attack under increasing filler items and choice of target item.Our experimental results based on two real-world datasets show that the observations from the study could be used to design a more robust MF based RS.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116250047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of Ireland’s Homecare Companies’ Cookie Practices in terms of GDPR Compliance. 从GDPR合规的角度分析爱尔兰家庭护理公司的Cookie实践。
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032677
Gerard Reynolds, Seamus Dowling
{"title":"An Analysis of Ireland’s Homecare Companies’ Cookie Practices in terms of GDPR Compliance.","authors":"Gerard Reynolds, Seamus Dowling","doi":"10.1109/Cyber-RCI55324.2022.10032677","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032677","url":null,"abstract":"The General Data Protection Regulation (GDPR) 2016, the Data Protection Act 2018 and the e-Privacy Directive 2002 are applicable legal instruments that impose responsibilities on homecare companies as ‘data controllers’. One of these responsibilities is that they provide their clients with information pertaining to their clients’ rights and the data controllers’ responsibilities as set out by the GDPR. Many homecare companies publish their Privacy Policies on the company website to showcase their compliance and make themselves more attractive to potential clients. Many websites use Cookie (or consent) Management Platforms (CMP’s) to manage their cookies and fulfil their legislative obligations. Cookies gather information and must comply with the terms of data protection and e-Privacy legislation. This research evaluates homecare companies’ Cookie Practices to ascertain GDPR compliance and found them to be lacking the substance and detail necessary to be considered compliant. This was achieved by identifying the websites of homecare companies operating in Ireland, accessing their website using a cookie cleared browser and then examining the researcher’s computer immediately afterwards to see what (if any) cookies had been uploaded, in addition to assessing the homecare companies CMP (where present) for compliance. This research found a high level of non-compliance and suggests that Ireland’s Data Protection Commission (DPC) could and should become more involved in creating solutions by evolving their role to that of a Data Protection Service Provider. By doing so they will improve compliance with data protection legislation and enhance the protections afforded to an individual’s right to privacy.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"8 20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129492724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-RCI 2022 Cover Page Cyber-RCI 2022封面
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/cyber-rci55324.2022.10032685
{"title":"Cyber-RCI 2022 Cover Page","authors":"","doi":"10.1109/cyber-rci55324.2022.10032685","DOIUrl":"https://doi.org/10.1109/cyber-rci55324.2022.10032685","url":null,"abstract":"","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121990036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Current State of Cyber Security in Ireland 爱尔兰当前的网络安全状况
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032682
Michael Lang, Seamus Dowling, Ruth G. Lennon
{"title":"The Current State of Cyber Security in Ireland","authors":"Michael Lang, Seamus Dowling, Ruth G. Lennon","doi":"10.1109/Cyber-RCI55324.2022.10032682","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032682","url":null,"abstract":"There is a stark contrast between the state of cyber security of national infrastructure in Ireland and the efforts underway to support cyber security technologists to work in the country. Notable attacks have recently occurred against the national health service, universities, and various other state bodies, prompting an interest in changing the current situation. This paper presents an overview of the security projects, commercial establishments, and policy in Ireland.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131635601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phantom or Menace: User Behaviors in Cybersecurity 幻影还是威胁:网络安全中的用户行为
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032673
T. Acton, P. Datta, Martin Hughes
{"title":"Phantom or Menace: User Behaviors in Cybersecurity","authors":"T. Acton, P. Datta, Martin Hughes","doi":"10.1109/Cyber-RCI55324.2022.10032673","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032673","url":null,"abstract":"This paper proposes a specific process-based approach to a systematic literature review to scope extant research on user behavior in cybersecurity. Focusing on the socio- rather than technical aspects of cybersecurity, and employing a 2016 lens robustly operationalised in a leading information systems journal in 2021, it aims to identify pertinent studies, identify a set of categories of behavioral concern, and propose a set of further studies to investigate these categories. Further, the study will identify user-focused behavioral themes of particular concern to organizations and users. At the conference, the paper seeks active discussion on a) the proposed literature bases, b) search terms and approach, and c) proposed research structure, to help refine and effect a robust study resulting in valuable insights on user behaviors that can impact effective cybersecurity.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122117567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VICSORT - A Virtualised ICS Open-source Research Testbed 一个虚拟化的ICS开源研究试验台
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032670
Conrad Ekisa, D. O. Briain, Y. Kavanagh
{"title":"VICSORT - A Virtualised ICS Open-source Research Testbed","authors":"Conrad Ekisa, D. O. Briain, Y. Kavanagh","doi":"10.1109/Cyber-RCI55324.2022.10032670","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032670","url":null,"abstract":"Industrial Control Systems (ICS) are at the forefront of most, if not all the critical infrastructure and critical service delivery. ICS underpin modern manufacturing and utility processes and greatly contribute to our day-to-day livelihoods. However, there has been a significant increase in the number and complexity of cyberthreats specifically targetted at ICS, facilitated by increased connectivity in an effort to improve production efficiency. Furthermore, the barriers of entry to ICS cybersecurity are still high given the limited skills base, expensive and proprietary hardware and software as well as the inherent dangers of manipulating real physical processes. This greatly inhibits the practical application of cybersecurity tools in ICS environments and therefore the opportunity for practitioners to gain valuable ICS cybersecurity experience. ICS Testbeds are often either expensive and are not necessarily holistic enough to provide learners with the complete breadth of ICS. This paper introduces VICSORT, a open-source virtualised ICS testbed that provides a platform for ICS cybersecurity learners and practitioners to interface with an ICS environment that closely emulates a real-world ICS, as well as explore and practice techniques for attack and consequently defence of an ICS. VICSORT builds upon the Graphical Realism Framework for Industrial Control Systems (GRFICS) to offer an easier to deploy environment with greater flexibility, whilst requiring significantly less resources all reducing the cost to the learner.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gradient Information from Google GBoard NWP LSTM is Sufficient to Reconstruct Words Typed 来自Google GBoard NWP LSTM的梯度信息足以重建输入的单词
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032666
Mohamed Suliman, D. Leith
{"title":"Gradient Information from Google GBoard NWP LSTM is Sufficient to Reconstruct Words Typed","authors":"Mohamed Suliman, D. Leith","doi":"10.1109/Cyber-RCI55324.2022.10032666","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032666","url":null,"abstract":"Federated Learning is now widely deployed by Google on Android handsets for distributed training of neural networks. While Federated Learning aims to avoid sharing sensitive user data with Google, in this paper we show that when used for GBoard next word prediction Federated Learning provides little privacy to users. Namely, we demonstrate that the words typed by a user can be quickly and accurately reconstructed from the gradients of the GBoard LSTM used for next word prediction. Use of mini-batches does not protect against reconstruction.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114237760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Critical Success Factors for Security Education, Training and Awareness (SETA) Programmes 安全教育、培训和意识计划的关键成功因素
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032674
Areej Alyami, David Sammon, K. Neville, Carolanne Mahony
{"title":"The Critical Success Factors for Security Education, Training and Awareness (SETA) Programmes","authors":"Areej Alyami, David Sammon, K. Neville, Carolanne Mahony","doi":"10.1109/Cyber-RCI55324.2022.10032674","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032674","url":null,"abstract":"This study explores the Critical Success Factors (CSFs) for Security Education, Training and Awareness (SETA) programmes. Data is gathered from 20 key informants (using semi-structured interviews) from various geographic locations including the Gulf nations, Middle East, USA, UK, and Ireland. The analysis of these key informant interviews produces eleven CSFs for SETA programmes. These CSFs are mapped along the phases of a SETA programme lifecycle (design, development, implementation, and evaluation).","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124742135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Insecure Software on a Fragmenting Internet 碎片化互联网中的不安全软件
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032675
Ita Ryan, U. Roedig, Klaas-Jan Stol
{"title":"Insecure Software on a Fragmenting Internet","authors":"Ita Ryan, U. Roedig, Klaas-Jan Stol","doi":"10.1109/Cyber-RCI55324.2022.10032675","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032675","url":null,"abstract":"Global geopolitical forces are pushing much of the world towards Internet nationalism, threatening to turn the Internet into a ‘Splinternet.’ In this paper we argue that the crisis in software security will exacerbate this trend. We examine existing moves towards Internet fragmentation on multiple levels. We discuss current trends in online crime, espionage, and warfare. We look at the role of software vulnerabilities, discussing how the prevalence of software security issues could propel nations further apart. We argue that there is an urgent need for a ‘zero tolerance’ attitude to software security issues, and discuss what is needed to create this.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127058881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Penny Wise, Pound Foolish: An Experimental Design of Technology Trust Amongst Organizational Users 一分聪明,一分糊涂:组织用户间技术信任的实验设计
2022 Cyber Research Conference - Ireland (Cyber-RCI) Pub Date : 2022-04-25 DOI: 10.1109/Cyber-RCI55324.2022.10032669
P. Datta, T. Acton, N. Carroll
{"title":"Penny Wise, Pound Foolish: An Experimental Design of Technology Trust Amongst Organizational Users","authors":"P. Datta, T. Acton, N. Carroll","doi":"10.1109/Cyber-RCI55324.2022.10032669","DOIUrl":"https://doi.org/10.1109/Cyber-RCI55324.2022.10032669","url":null,"abstract":"In the face of burgeoning cybersecurity and ransomware attacks, is cybersecurity technology the panacea.7 Building on behavioral economics, particularly moral hazard and Peltzman effects, this research uses a pilot field-experiment to investigate whether cybersecurity technology trust, in departure from general intuition, can make users $zeta$ “penny-wise, pound-foolish,” where technology trust and our growing information needs may erode user-caution, leaving us more vulnerable.","PeriodicalId":378205,"journal":{"name":"2022 Cyber Research Conference - Ireland (Cyber-RCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127131493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信