{"title":"Audio Digital Watermarking Algorithm Based on Wavelet Analysis","authors":"Jie-Chang Wen","doi":"10.1109/CIS.WORKSHOPS.2007.133","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.133","url":null,"abstract":"This article mainly researches on the principle of digital audio signal embedded watermarking and the usage of wavelet transform to realize the audio digital watermark embedding and extracting algorithm. This algorithm has good stealth and robustness. The influence of embedded watermarking on the original audio signal can not be found by human perceptual system and can resist the general signal attack.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133844638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RBTN: A Role-Based Trust Negotiation Model","authors":"Yizhu Zhao, Hongwei Lu","doi":"10.1109/CIS.WORKSHOPS.2007.171","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.171","url":null,"abstract":"TN/ATN is a new approach for establishing trust between strangers through the exchange of digital credentials and the use of access control policies. However, in TN/ATN, a user has to negotiate with the server each time he requests several resources or services from it and disclose credentials even if he had disclosed it before. In this paper, a Role-Based Trust Negotiation model (called RBTN) is proposed. RBTN introduces the role concept to trust negotiation, and assigns roles to users according to their credentials, which are disclosed during the previous negotiations. Thus RBTN can reduce the rounds of negotiation when one visits several resources or services one time. In the paper, we have a detailed description of RBTN. Thereto, a use case is given to show how the model works, which illustrates that RBTN is sound and reasonable.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"40 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arithmetic Model Research of IDS Alarm Controlling","authors":"Qu Zhaoyang, Guo Liang, Wu Yan","doi":"10.1109/CIS.WORKSHOPS.2007.230","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.230","url":null,"abstract":"In order to solve the high rate of wrong alarm in IDS, we designed alarm control model by analyzing alarming information. This model which using human olfaction passivation aims at the sustaining high frequency no-action alarming information in order to reduce rate of no-action alarming in IDS, achieve the low wrong alarming of IDS and make it convenient to administrators.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Spam Detection Based on Cognitive Pattern Recognition","authors":"Tiancai Liang, Y. Pi","doi":"10.1109/CIS.WORKSHOPS.2007.103","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.103","url":null,"abstract":"A spam detection method, based on cognitive pattern recognition, had been proposed. The connection between Email category and cognition of Email user interest within life and work, had been analyzed. Under the guidance of cognitive pattern recognition theory, the mechanism of spam detection, based on intelligent cognition of Email user interest within life and work, had been discussed. Then the spam detection algorithm and its concrete implementation was given. Experimental results demonstrate that the spam detection algorithm has a good learning ability, scalability, and a good ability to achieve high recognition accuracy.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and Realization of Text Mining Algorithm on Web","authors":"Shiqun Yin, Yuhui Qiu, Jike Ge","doi":"10.1109/CIS.WORKSHOPS.2007.212","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.212","url":null,"abstract":"It is recognized that text information on Web is growing at an astounding pace. Research and application of text mining on Web is an important branch in the data mining. Now people mainly use information retrieval (IR) or the search engine to look up Web information. But IR focuses on searching for information that is explicitly present but not latent knowledge in some document, the search engine can hardly according to different need of different customers and provide individual service, and it is very difficult to mine data further. However, text mining on Web aims to resolve this problem. This paper discusses an Algorithm of how to follow the appointed website or Web page according to the user's request by using the text mining technique, how to extract and express text characteristic, how to classify the data information with feedback judgement combined with the Web page text contents for later use. We present experiments on different data set that demonstrate more effectiveness of our algorithm than traditional algorithm. The process of Web text mining, information extraction method, mining algorithm and realization technique are discussed in details.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Operation Center Based on Immune System","authors":"Yi Niu, Quan Zhang, Qilun Zheng, Hong Peng","doi":"10.1109/CIS.WORKSHOPS.2007.125","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.125","url":null,"abstract":"With the widespread application of large and complicated network, network safety has become an important issue. In this paper, we design a security operation center (SOC) using an analogy of natural world immunology, We adopt an immune mechanism that distinguishes self from non-self and cooperation among immune cells of the system. This system implements each immune cell as an agent based on our multi-agent language, which his an extension of concurrent logic programming languages. These agents can detect and reject intrusion by cooperating with each other.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132276828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-Contexts Modeling, Organization and Trust Estimation on the Web","authors":"Changli Zhang, Jian Wu, Zhengguo Hu","doi":"10.1109/CIS.WORKSHOPS.2007.104","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.104","url":null,"abstract":"Trust-contexts, computational models of the situational factors of trust behaviors, play important roles in trust decisions, but their researches are still in infancy. In this paper, based on earlier studies, trust- contexts are modeled and organized globally on the Web. Then, the basic ideas and an extension of trust estimation, which is the core step of trust decision, are focused. At last, more extensional topics are presented.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129415273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Detection Arithmetic of Soft Decision Based on Non-ideal Channel in Distributed Detection","authors":"Ying-kun Liu, Xin-xi Feng","doi":"10.1109/CIS.WORKSHOPS.2007.99","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.99","url":null,"abstract":"In this paper we expand the arithmetic of the distributed detection in two aspects. In order to improve the detection performance and use communicated resource rationally, the local decision is extended from hard decision to soft decision. According to N non-ideal independent channels, the local decision and reliability information are transmitted to the fusion center. The non-ideal channel is extended from binary symmetry channel to memorial channel. Then we derive the optimal decision form of the local detectors and fusion center by NP(Neyman pearson) rule. At last stimulation of two detectors shows that using soft decision improves the detection performance and worsen channel depress the detection performance surely.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132061483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending Ontology Language for Semantic Web","authors":"Qing Yu, Jinlin Wang","doi":"10.1109/CIS.WORKSHOPS.2007.211","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.211","url":null,"abstract":"The paper focuses on how to represent and infer the imprecise or fuzzy knowledge in real world. Ontologies are important technology used to describe the semantics of information, which provide a formal specification of a shared conceptualization. OWL is a promising ontology language which is intended to provide a formal description of concepts, terms, and relationships within a given knowledge domain. Although OWL has a powerful expressive ability on knowledge, it has no capability to represent the uncertain and imprecise information. In this paper, we extend OWL by fuzzy logic called FOWL (fuzzy of OWL) for capturing imprecise or uncertain knowledge encountered in real world. In the end, we give an instance which shows that fuzzy information can be expressed well in the proposed ontology language.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114089546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent-Based Distributed Conceptual Design of Virtual Prototyping for Complex Products","authors":"Chen Xi","doi":"10.1109/CIS.WORKSHOPS.2007.189","DOIUrl":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.189","url":null,"abstract":"Integrating and sharing multidisciplinary model data and improving robusticity and validity of product conceptual design system in distributed environment is one of the key technical problems in Virtual Prototype design and simulation of complex products. After long time research on multi-agent systems, an agent-based product conceptual design system combining XML and Web Service technology was proposed, system architecture, communication style and system workflow were illustrated. Further more it discussed product conceptual design development process, decision arithmetic and gave a unified intelligent agent group form for electronic, software and control systems involved in virtual prototyping product conceptual design, realized a service-oriented, supporting distributed, heterogeneous and multi-field collaborative product conceptual design supporting platform.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134021256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}