2020 13th International Conference on Communications (COMM)最新文献

筛选
英文 中文
Insider Threat Detection Using Natural Language Processing and Personality Profiles 内部威胁检测使用自然语言处理和人格档案
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141964
S. Eftimie, Radu Moinescu, C. Racuciu
{"title":"Insider Threat Detection Using Natural Language Processing and Personality Profiles","authors":"S. Eftimie, Radu Moinescu, C. Racuciu","doi":"10.1109/COMM48946.2020.9141964","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141964","url":null,"abstract":"This work represents an interdisciplinary effort to proactively identify insider threats, using natural language processing and personality profiles. Profiles were developed for the relevant insider threat types using the five-factor model of personality and were used in a proof-of-concept detection system. The system employs a third-party cloud service that uses natural language processing to analyze personality profiles based on personal content. In the end, an assessment was made over the feasibility of the system using a public dataset.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Analysis of Software Defined Radio Platforms for Spectrum Sensing Applications 用于频谱传感应用的软件定义无线电平台的比较分析
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142024
Alexandru Martian, Florin-Lucian Chiper, O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, I. Marghescu
{"title":"Comparative Analysis of Software Defined Radio Platforms for Spectrum Sensing Applications","authors":"Alexandru Martian, Florin-Lucian Chiper, O. Al-Dulaimi, Mahmood Jalal Ahmad Al Sammarraie, C. Vladeanu, I. Marghescu","doi":"10.1109/COMM48946.2020.9142024","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142024","url":null,"abstract":"In the context of trying to obtain a solution for using the limited radio spectrum resources in an efficient way, the design of equipment having flexible RF front ends arose as a necessity. The software defined radio (SDR) approach offered such characteristics and several producers developed such platforms in recent years. In the current paper, several SDR platforms are compared from a RF front end receive performance point of view. Several measurements were performed in different frequency bands using the SDR platforms, using a spectrum analyzer as a reference. The results are analyzed and discussed having in mind the use of such a platform for performing spectrum sensing applications, which is a key necessity for the design of dynamic spectrum access (DSA) capable equipment.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
COMM 2020 Cover Page 《COMM 2020》封面
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/comm48946.2020.9141949
{"title":"COMM 2020 Cover Page","authors":"","doi":"10.1109/comm48946.2020.9141949","DOIUrl":"https://doi.org/10.1109/comm48946.2020.9141949","url":null,"abstract":"","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117327115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint 基于可搜索加密和生物指纹的三因素认证方案
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141956
M. Mihailescu, Stefania Loredana Nita
{"title":"Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint","authors":"M. Mihailescu, Stefania Loredana Nita","doi":"10.1109/COMM48946.2020.9141956","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141956","url":null,"abstract":"The current paper is proposing a three-factor authentication (3FA) scheme based on three components. In the first component a token and a password will be generated (this module represents the kernel of the three-factor authentication scheme - 3FA). In the second component a pass-code will be generated, using to the token resulted in the first phase. We will use RSA for encryption and decryption of the generated values (token and pass-code). For the token ID and passcode the user will use his smartphone. The third component uses a searchable encryption scheme, whose purpose is to retrieve the documents of the user from the cloud server, based on a keyword and his/her fingerprint. The documents are stored encrypted on a mistrust server (cloud environment) and searchable encryption will help us to search specific information and to access those documents in an encrypted content. We will introduce also a software simulation developed in C# 8.0 for our scheme and a source code analysis for the main algorithms.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deploying a Dockerized Application With Kubernetes on Google Cloud Platform 在Google云平台上使用Kubernetes部署Dockerized应用程序
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142014
Robert Botez, Calin-Marian Iurian, I. Ivanciu, V. Dobrota
{"title":"Deploying a Dockerized Application With Kubernetes on Google Cloud Platform","authors":"Robert Botez, Calin-Marian Iurian, I. Ivanciu, V. Dobrota","doi":"10.1109/COMM48946.2020.9142014","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142014","url":null,"abstract":"The fast development of IoT networks and the integration of these scenarios in everyday life has also led to great diversity of SD-WAN solutions. With the advent of 5G, more and more devices will be connected, which requires careful monitoring especially in crucial situations such as transport scenarios. This paper presents the implementation of a web application based on microservices, each of them running in a dedicated Docker container, which gathers information in real-time from two vehicles. These standalone executable packages of software are orchestrated by Kubernetes and hosted on Google Cloud Platform. The data used during the execution of the project is stored into a Cloud SQL instance. All the necessary resources in order to build the project can be monitored with Stackdriver.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"16 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113980221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SDN controller implementation using OpenDaylight: experiments 使用OpenDaylight实现SDN控制器:实验
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142044
Alexandra Eftimie, E. Borcoci
{"title":"SDN controller implementation using OpenDaylight: experiments","authors":"Alexandra Eftimie, E. Borcoci","doi":"10.1109/COMM48946.2020.9142044","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142044","url":null,"abstract":"Software Defined Networking (SDN) is ment to add flexibility to control-plan implementation choices, allowing one to choose between points on the implementation design axis: centralized to distributed, micro-flow to aggregated-flow, reactive to proactive, virtual to physical, and fully-consistent to eventually-consistent. It should be highlighted that the problem of comparing SDN controllers is an extremely challenging one, mainly because it is a multifaceted problem. Additionally, comparative analysis typically helps in 'selecting' a controller to meet a particular or a set of requirements. This paper aims to present the implementation of one open source controller – OpenDaylight – in a small environment. The experiments described can actually help the implementors to develop SDN oriented systems. Pros and cons with regards to implementation and functionalty will be highlighted.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"85 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Autonomous Driving: A Machine Learning-based Pedestrian Detection System using 16-Layer LiDAR 迈向自动驾驶:基于机器学习的16层激光雷达行人检测系统
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142042
Stefan Mihai, P. Shah, G. Mapp, Huan Nguyen, R. Trestian
{"title":"Towards Autonomous Driving: A Machine Learning-based Pedestrian Detection System using 16-Layer LiDAR","authors":"Stefan Mihai, P. Shah, G. Mapp, Huan Nguyen, R. Trestian","doi":"10.1109/COMM48946.2020.9142042","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142042","url":null,"abstract":"The advent of driverless and automated vehicle technologies opens up a new era of safe and comfortable transportation. However, one of the most important features that an autonomous vehicle requires, is a reliable pedestrian detection mechanism. Many solutions have been proposed in the literature to achieve this technology, ranging from image processing algorithms applied on a camera feed, to filtering LiDAR scans for points that are reflected off pedestrians. To this extent, this paper proposes a machine learning-based pedestrian detection mechanism using a 16-layer Velodyne Puck LITE LiDAR. The proposed mechanism compensates for the low resolution of the LiDAR through the use of linear interpolation between layers, effectively introducing 15 pseudo-layers to help obtain timely detection at practical distances. The pedestrian candidates are then classified using a Support Vector Machine (SVM), and the algorithm is verified by accuracy testing using real LiDAR frames acquired under different road scenarios.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Study of Attacks on Satellite Navigation System Receivers 卫星导航系统接收机攻击研究
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141998
Teodor Mitrea, Vlad-Cosmin Vasile, M. Borda, C. Nafornita, Alexandru Romaniuc
{"title":"Study of Attacks on Satellite Navigation System Receivers","authors":"Teodor Mitrea, Vlad-Cosmin Vasile, M. Borda, C. Nafornita, Alexandru Romaniuc","doi":"10.1109/COMM48946.2020.9141998","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141998","url":null,"abstract":"Nowadays, there are many important areas in which the positioning information provided by the satellite navigation systems is used, systems whose development has accelerated in recent years. Due to this pace, it seems that the measures to ensure the security of these systems have lagged behind. This article presents the results of various tests that targeted the security of the receivers of the most used commercial satellite navigation systems - those of smart phones and cars and how these receivers behave in the event of spoofing.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122762711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic Analysis of Crosstalk in Electronic Digital Modules 电子数字模块串扰的电磁分析
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9142036
Mircea Nicolaescu, V. Croitoru, L. Tuta
{"title":"Electromagnetic Analysis of Crosstalk in Electronic Digital Modules","authors":"Mircea Nicolaescu, V. Croitoru, L. Tuta","doi":"10.1109/COMM48946.2020.9142036","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9142036","url":null,"abstract":"The need for speed and capacity had drawn electronic industry into a race for higher operating frequency. As a result, the dimensions of circuits and the lengths of the connections have become comparable with the wavelengths. As such the transmission line effect must be taken into consideration in the designing process. The paper analyzes one major phenomenon which affects the performances of electronic equipment, namely the crosstalk between two transmission lines which transfer data or control information between two parts of an electronic digital module.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124692119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Vulnerabilities Integrated Management System 软件漏洞综合管理系统
2020 13th International Conference on Communications (COMM) Pub Date : 2020-06-01 DOI: 10.1109/COMM48946.2020.9141970
M. Aldea, Daniel Gheorghica, V. Croitoru
{"title":"Software Vulnerabilities Integrated Management System","authors":"M. Aldea, Daniel Gheorghica, V. Croitoru","doi":"10.1109/COMM48946.2020.9141970","DOIUrl":"https://doi.org/10.1109/COMM48946.2020.9141970","url":null,"abstract":"In simple terms, a vulnerability can be an error or a flaw in code design which can determine malfunction of an application. Software vulnerabilities are the main cause of computer security problems. In order to avoid an attack or to minimize the damages produced by a cyberattack, a good vulnerability management plan should be implemented. This paper proposes a solution for vulnerability management by implementing a software vulnerabilities integrated management system (SV-IMS) that can perform security test in order to detect software vulnerabilities, the results of vulnerability tests being processed and viewed using a dedicated platform. The SV-IMS has a dedicated database for configuration management.","PeriodicalId":405841,"journal":{"name":"2020 13th International Conference on Communications (COMM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信