Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies最新文献

筛选
英文 中文
An empirical study of financial incentivized question answering in social websites 社交网站财务激励问答的实证研究
Huangxin Wang, Zhonghua Xi, Jean X. Zhang, Fei Li
{"title":"An empirical study of financial incentivized question answering in social websites","authors":"Huangxin Wang, Zhonghua Xi, Jean X. Zhang, Fei Li","doi":"10.1145/3132465.3132471","DOIUrl":"https://doi.org/10.1145/3132465.3132471","url":null,"abstract":"With the rapid growth of online social network sites such as Face-book and Twitter, social question and answering (Q&A) has become an important venue for people to seek and share information. However, due to lack of specific Q&A feature design and users' motivations in answering questions, social Q&A has been reported to have a much lower response rate compared with traditional professional Q&A sites such as Stack Overflow and Yahoo! Answers. Recently, WenDa, an emerging social Q&A product built on top of a leading Chinese social website (Sina WeiBo) has been launched to fill this gap. WenDa employs a novel economic model to motivate users to ask and answer questions. In this paper, we conduct an empirical study to understand the effectiveness of this economic model in motivating users to participate in the social Q&A. Besides, we analyze how this economic model and the social user relationships shape the question types as well as question topics. Our observations and study results are of significant values in providing insights for the design and development of social Q&A.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124380687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding the effectiveness of typosquatting techniques 了解排字技术的有效性
Jeffrey Spaulding, Daehun Nyang, Aziz Mohaisen
{"title":"Understanding the effectiveness of typosquatting techniques","authors":"Jeffrey Spaulding, Daehun Nyang, Aziz Mohaisen","doi":"10.1145/3132465.3132467","DOIUrl":"https://doi.org/10.1145/3132465.3132467","url":null,"abstract":"The nefarious practice of Typosquatting involves deliberately registering Internet domain names containing typographical errors that primarily target popular domain names, in an effort to redirect users to unintended destinations or stealing traffic for monetary gain. Typosquatting has existed for well over two decades and continues to be a credible threat to this day. As recently shown in the online magazine Slate.com [19], cybercriminals have attempted to distribute malware through Netflix.om, a typosquatted variant of the popular streaming site Netflix.com that uses the country code top-level domain (ccTLD) for Oman (.om). While much of the prior work has examined various typosquatting techniques and how they change over time, none have considered how effective they are in deceiving users. In this paper, we attempt to fill in this gap by conducting a user study that exposes subjects to several uniform resource locators (URLs) in an attempt to determine the effectiveness of several typosquatting techniques that are prevalent in the wild. We also attempt to determine if the security education and awareness of cybercrimes such as typosquatting will affect the behavior of Internet users. Ultimately, we found that subjects tend to correctly identify typosquatting which adds characters to the domain names, while the most effective techniques to deceive users involves permutations and substitutions of characters. We also found that subjects generally performed better and faster at identifying typosquatted domain names after being thoroughly educated about them, and that certain attributes such as Age and Education affect their behavior when exposed to them.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131426153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Graph-pubsub: an efficient pub/sub architecture with graph-based information relationship Graph-pubsub:一种高效的基于图的信息关系发布/订阅体系结构
Jiachen Chen, Haoyuan Xu, Yanyong Zhang, D. Raychaudhuri
{"title":"Graph-pubsub: an efficient pub/sub architecture with graph-based information relationship","authors":"Jiachen Chen, Haoyuan Xu, Yanyong Zhang, D. Raychaudhuri","doi":"10.1145/3132465.3132477","DOIUrl":"https://doi.org/10.1145/3132465.3132477","url":null,"abstract":"Publish/Subscribe is a widely adopted communication pattern in the Internet. Yet, supporting rich information structures that are common in real life, such as graph-based relationship, has remained an open problem. In this paper, we address this challenge by proposing Graph-Pubsub, an efficient pub/sub architecture that supports graph-based information relationship. Graph-Pubsub spans across multiple layers to maximize dissemination efficiency. In particular, it achieves efficient delivery using Information-Centric Network (ICN), which is able to deliver content based on identities instead of locations. In order not to over-complicate the network with the graph logic, an information layer that works closely with both network and application layers is adopted to maintain the membership for each topic and the relationship among topics. With case studies, we show that the proposed architecture can support a variety of demanding applications with higher efficiency and better flexibility than existing solutions.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134590716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting web information using representation patterns 使用表示模式提取web信息
J. C. Roldán, Patricia Jiménez, R. Corchuelo
{"title":"Extracting web information using representation patterns","authors":"J. C. Roldán, Patricia Jiménez, R. Corchuelo","doi":"10.1145/3132465.3133840","DOIUrl":"https://doi.org/10.1145/3132465.3133840","url":null,"abstract":"Feeding decision support systems with Web information typically requires sifting through an unwieldy amount of information that is available in human-friendly formats only. Our focus is on a scalable proposal to extract information from semi-structured documents in a structured format, with an emphasis on it being scalable and open. By semi-structured we mean that it must focus on information that is rendered using regular formats, not free text; by scalable, we mean that the system must require a minimum amount of human intervention and it must not be targeted to extracting information from a particular domain or web site; by open, we mean that it must extract as much useful information as possible and not be subject to any pre-defined data model. In the literature, there is only one open but not scalable proposal, since it requires human supervision on a per-domain basis. In this paper, we present a new proposal that relies on a number of heuristics to identify patterns that are typically used to represent the information in a web document. Our experimental results confirm that our proposal is very competitive in terms of effectiveness and efficiency.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Inference attacks based on neural networks in social networks 社交网络中基于神经网络的推理攻击
Bo Mei, Yinhao Xiao, Hong Li, Xiuzhen Cheng, Yunchuan Sun
{"title":"Inference attacks based on neural networks in social networks","authors":"Bo Mei, Yinhao Xiao, Hong Li, Xiuzhen Cheng, Yunchuan Sun","doi":"10.1145/3132465.3132469","DOIUrl":"https://doi.org/10.1145/3132465.3132469","url":null,"abstract":"In modern society, social networks play an important role for online users. However, one unignorable problem behind the booming of the services is privacy issues. At the same time, neural networks have been swiftly developed in recent years, and are proved to be very effective in inference attack. This paper conducts an extensive study to infer sensitive personal information from public insensitive attributes in social networks by deploying fully connected neural networks. Correlation matrices and the details of constructing neural networks for social networks are elaborated. To show the advantages of neural networks on inference attack, different traditional machine learning algorithms are also studied. The results show that neural networks can achieve about 4 times of the baseline accuracy to classify low-correlation, high-noise dataset to infer sensitive users' attributes. In addition, neural networks outperform all the selected traditional algorithms. Outcomes from the study are deliberately discussed, and the limitations of both neural networks and traditional machine learning algorithms are also illustrated.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132583368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Rethinking information sharing for threat intelligence 重新思考威胁情报的信息共享
Aziz Mohaisen, Omar Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla
{"title":"Rethinking information sharing for threat intelligence","authors":"Aziz Mohaisen, Omar Al-Ibrahim, C. Kamhoua, K. Kwiat, L. Njilla","doi":"10.1145/3132465.3132468","DOIUrl":"https://doi.org/10.1145/3132465.3132468","url":null,"abstract":"In the past decade, the information security and threat landscape has grown significantly making it difficult for a single defender to defend against all attacks at the same time. This called for introducing information sharing, a paradigm in which threat indicators are shared in a community of trust to facilitate defenses. Standards for representation, exchange, and consumption of indicators are proposed in the literature, although various issues are undermined. In this paper, we take the position of rethinking information sharing for actionable intelligence, by highlighting various issues that deserve further exploration. We argue that information sharing can benefit from well-defined use models, threat models, well-understood risk by measurement and robust scoring, well-understood and preserved privacy and quality of indicators and robust mechanism to avoid free riding behavior of selfish agents. We call for using the differential nature of data and community structures for optimizing sharing designs and structures.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Precog: action-based time-shifted prefetching for web applications on mobile devices Precog:移动设备上web应用程序的基于动作的时移预取
Shruti Sanadhya, U. Moravapalle, Kyu-Han Kim, Raghupathy Sivakumar
{"title":"Precog: action-based time-shifted prefetching for web applications on mobile devices","authors":"Shruti Sanadhya, U. Moravapalle, Kyu-Han Kim, Raghupathy Sivakumar","doi":"10.1145/3132465.3132473","DOIUrl":"https://doi.org/10.1145/3132465.3132473","url":null,"abstract":"Wireless providers today are highly motivated to improve efficiencies of spectrum usage. One approach to achieve this is to shift the load from expensive cellular networks to cheaper WiFi networks. In this context, we propose Precog, an action-based prefetching solution for time-shifted WiFi offloading. We argue that traditional prefetching solutions, that rely on the URLs visited in the past by a user for predicting future access, are ineffective in today's dynamic, interactive, and personalized web. Precog addresses this issue by remembering, not the exact URL accessed in the past, but the actions performed on a particular website. The actions are remembered as interactions with the content layout, which stays consistent over a long period of time. Unlike prior offloading solutions that require concurrent cellular and WiFi connectivity, Precog offloads cellular content over time-shifted WiFi access. We evaluate Precog over both synthetic and real user datasets to demonstrate its benefits.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124255322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automated least privileges in cloud-based web services 基于云的web服务中的自动最小权限
M. Sanders, Chuan Yue
{"title":"Automated least privileges in cloud-based web services","authors":"M. Sanders, Chuan Yue","doi":"10.1145/3132465.3132470","DOIUrl":"https://doi.org/10.1145/3132465.3132470","url":null,"abstract":"The principle of least privilege is a fundamental guideline for secure computing that restricts privileged entities to only the permissions they need to perform their authorized tasks. Achieving least privileges in an environment composed of many heterogeneous web services provided by a third party is an important but difficult and error prone task for many organizations. This paper explores the challenges that make achieving least privileges uniquely difficult in the cloud environment and the potential benefits of automated methods to assist with creating least privilege policies from audit logs. To accomplish these goals, we implement two frameworks: a Policy Generation Framework for automatically creating policies from audit log data, and an Evaluation Framework to quantify the security provided by generated roles. We apply these frameworks to a real world dataset of audit log data with 4.3 million events from a small company and present results describing the policy generator's effectiveness. Results show that it is possible to significantly reduce over-privilege and administrative burden of permission management.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A knowledge and reasoning toolkit for cognitive applications 认知应用的知识和推理工具包
Mustafa Canim, Cristina Cornelio, Robert G. Farrell, Achille Fokoue, K. Y. Gao, J. Gunnels, A. Iyengar, Ryan Musa, M. Rodriguez-Muro, Rosario A. Uceda-Sosa
{"title":"A knowledge and reasoning toolkit for cognitive applications","authors":"Mustafa Canim, Cristina Cornelio, Robert G. Farrell, Achille Fokoue, K. Y. Gao, J. Gunnels, A. Iyengar, Ryan Musa, M. Rodriguez-Muro, Rosario A. Uceda-Sosa","doi":"10.1145/3132465.3132478","DOIUrl":"https://doi.org/10.1145/3132465.3132478","url":null,"abstract":"This paper presents a knowledge and reasoning toolkit for developing cognitive applications which have significant requirements for managing structured and semi-structured data. Our system provides enhanced querying and reasoning capabilities along with natural language processing support and the ability to automatically extract data from PDF documents. We also have the capability to manage ontologies in a user-friendly way. Our system is implemented as a set of Web services, and we provide enhanced clients to allow applications to easily access our knowledge and reasoning toolkit.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Edge computing enabled smart firefighting: opportunities and challenges 边缘计算实现智能消防:机遇与挑战
Xiaopei Wu, R. Dunne, Qingyang Zhang, Weisong Shi
{"title":"Edge computing enabled smart firefighting: opportunities and challenges","authors":"Xiaopei Wu, R. Dunne, Qingyang Zhang, Weisong Shi","doi":"10.1145/3132465.3132475","DOIUrl":"https://doi.org/10.1145/3132465.3132475","url":null,"abstract":"By collectively leveraging advanced communications systems, sensing, drones, wearable technologies and large-scale data analysis, smart firefighting is envisioned as the next generation firefighting with the capacities of gathering massive real-time scene data, transferring them into useful information and insights for fire responders, and even providing them with more safe and accurate decisions. For smart firefighting, timeliness and accuracy are two foremost system requirements, yet they are unsatisfied in many applications. One reason for such dilemma is due to the underlying used computing architecture (i.e. cloud computing) that can produce extra latency in large-scale data transmission. To address this problem, we explore the firefighting field utilizing edge computing and discuss the overall system architecture, opportunities, challenges, as well as some early technical suggestions on building edge-enabled smart firefighting. To validate the feasibility of edge computing, we simulate the firefighting context and respectively deploy a video-based flame detection algorithm on a local Intel's edge computing platform and a remote Amazon EC2. The preliminary results show that edge computing can significantly increase system's reactive speed, with on average 50% reduction in system latency.","PeriodicalId":411240,"journal":{"name":"Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies","volume":"364 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信