2016 International Conference on Information Science and Security (ICISS)最新文献

筛选
英文 中文
Multi-Objective Optimization and Decision Making for Greenhouse Climate Control System 温室气候控制系统的多目标优化与决策
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885862
M. Mahdavian, S. Sudeng, N. Wattanapongsakorn
{"title":"Multi-Objective Optimization and Decision Making for Greenhouse Climate Control System","authors":"M. Mahdavian, S. Sudeng, N. Wattanapongsakorn","doi":"10.1109/ICISSEC.2016.7885862","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885862","url":null,"abstract":"Optimization of the real-world problems has been always considered by researchers due to its substantial improvement effect on processes. Modeling, simulation and decision making are three major parts of all optimization approaches. In this paper, Tri-objective optimization of an industrial greenhouse climate control system is investigated. In this regard, the greenhouse is modeled by the real measured data. Optimization and decision making are obtained by MATLAB simulator environment and using evolutionary and pruning algorithms. The simulation results verify the significant improvement of greenhouse climate control system efficiency and performance.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Quantification for Intrusion Detection System Using Discrete Fourier Transform 基于离散傅里叶变换的入侵检测系统量化
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885867
Yusuke Tsuge, Hidema Tanaka
{"title":"Quantification for Intrusion Detection System Using Discrete Fourier Transform","authors":"Yusuke Tsuge, Hidema Tanaka","doi":"10.1109/ICISSEC.2016.7885867","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885867","url":null,"abstract":"An Intrusion Detection System (IDS) is a countermeasure against network attack. There are mainly two types of detections; signature-based and anomaly-based. Since attackers change their technique rapidly, anomaly-based detection draws research interest nowadays. Since some anomaly-based IDS depends on operator's visual identification, it is difficult to define normal behavior effectively. To solve the problem, we propose quantification method using Shannon-Hartley theorem which improves Enkhbold et al. method. This method uses Discrete Fourier Transform to analyze spectrum of each session. They assume fluctuation of spectrum in normal sessions as random and abnormal sessions as biased. To quantify difference between each spectrum and the standard one, we can obtain entropy using Shannon-Hartley theorem. By spectrum analysis based on such assumption, it is possible to create the Detection-table which can be determined either normal or abnormal sessions. And we also find out that our quantification method will discover the feature of unknown attack session.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115111656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Database Security in Private Database Clouds 私有数据库云中的数据库安全
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885847
Onur Cinar, R. H. Guncer, A. Yazıcı
{"title":"Database Security in Private Database Clouds","authors":"Onur Cinar, R. H. Guncer, A. Yazıcı","doi":"10.1109/ICISSEC.2016.7885847","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885847","url":null,"abstract":"Cloud computing and cloud systems are very popular in today's Information Technology (IT) and systems and have grown very quickly. Cloud computing helps organizations solve increasing IT costs such as their licenses, power consumption, physical protection, by providing better standardization, higher benefit, greater performance, and quicker responses of information services. Carrying vital importance for our private and secret information, cloud systems must provide extra security solutions for database systems with organizations. While using firewalls, and intrusion detection systems on the network for external attacks, some improved access controls must be definitely decided for internal attacks as well. Using database transaction logs and audit can be very helpful on developing a database protection system. However, storing these logs may cause some serious storage and performance problems. Another problem is to manage multiple databases at the same time. In this study we introduce a new lightweight cloud-based database security solution by enhancing our previously developed database security solution, InfoFence, while managing many databases at the same time from a central point. The performance of our proposed database security system in a private cloud has been evaluated against one of the most commonly used products on the market, Oracle Audit Vault Server, and we show that our proposed solution has better performance results in our test environment.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Handwritten Music Symbol Classification Using Deep Convolutional Neural Networks 使用深度卷积神经网络的手写音乐符号分类
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885856
Sangkuk Lee, S. Son, Jiyong Oh, Nojun Kwak
{"title":"Handwritten Music Symbol Classification Using Deep Convolutional Neural Networks","authors":"Sangkuk Lee, S. Son, Jiyong Oh, Nojun Kwak","doi":"10.1109/ICISSEC.2016.7885856","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885856","url":null,"abstract":"In this paper, we utilize deep Convolutional Neural Networks (CNNs) to classify handwritten music symbols in HOMUS data set. HOMUS data set is made up of various types of strokes which contain time information and it is expected that online techniques are more appropriate for classification. However, experimental results show that CNN which does not use time information achieved classification accuracy around 94.6% which is way higher than 82% of dynamic time warping (DTW), the prior state-of-the-art online technique. Finally, we achieved the best accuracy around 95.6% with the ensemble of CNNs.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133801390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adaptive Forward Error Correction Scheme to Improve Data Reliability in Solar-Powered Wireless Sensor Networks 提高太阳能无线传感器网络数据可靠性的自适应前向纠错方案
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885838
Jong-kwan Jung, Minjae Kang, Ikjune Yoon, D. Noh
{"title":"Adaptive Forward Error Correction Scheme to Improve Data Reliability in Solar-Powered Wireless Sensor Networks","authors":"Jong-kwan Jung, Minjae Kang, Ikjune Yoon, D. Noh","doi":"10.1109/ICISSEC.2016.7885838","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885838","url":null,"abstract":"The data-link layer takes charge of reliable inter-node communication in open systems interconnection (OSI) reference model. Generally, in the environment of wireless sensor network (WSN) where errors are frequently occurred, the forward error correction (FEC) method is mainly used at this data-link layer. However, the FEC method requires more amount of energy consumption as it has higher ability of error correction rate, thus reducing the network lifetime seriously. Meanwhile, as the energy is regularly recharged in the solar-powered WSN (in contrast with the battery-based WSN), a greater amount of energy than that required for fundamental operation of nodes might exist in the node. By utilizing this surplus energy efficiently, the proposed energy-aware FEC method can reduce the data loss rate without any decrement of network lifetime. This method uses a trade-off relationship between the energy and data loss rate by adjusting the parity length in the FEC method according to a state of energy in each node. The performance of the proposed scheme is verified through the simulation.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132988398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Hybrid Threat Model for Software Security Requirement Specification 软件安全需求规范的混合威胁模型
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885836
Habeeb Omotunde, R. Ibrahim
{"title":"A Hybrid Threat Model for Software Security Requirement Specification","authors":"Habeeb Omotunde, R. Ibrahim","doi":"10.1109/ICISSEC.2016.7885836","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885836","url":null,"abstract":"Security is often treated as secondary or a non- functional feature of software which influences the approach of vendors and developers when describing their products often in terms of what it can do (Use Cases) or offer customers. However, tides are beginning to change as more experienced customers are beginning to demand for more secure and reliable software giving priority to confidentiality, integrity and privacy while using these applications. This paper presents the MOTH (Modeling Threats with Hybrid Techniques) framework designed to help organizations secure their software assets from attackers in order to prevent any instance of SQL Injection Attacks (SQLIAs). By focusing on the attack vectors and vulnerabilities exploited by the attackers and brainstorming over possible attacks, developers and security experts can better strategize and specify security requirements required to create secure software impervious to SQLIAs. A live web application was considered in this research work as a case study and results obtained from the hybrid models extensively exposes the vulnerabilities deep within the application and proposed resolution plans for blocking those security holes exploited by SQLIAs.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116187917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Utilizing a Distributed Publish/Subscribe System for Connecting Online Shopping Services with Social Funding Projects 利用分布式发布/订阅系统将网上购物服务与社会资助项目连接起来
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885871
Hyeon Gyu Kim, S. S. Kim
{"title":"Utilizing a Distributed Publish/Subscribe System for Connecting Online Shopping Services with Social Funding Projects","authors":"Hyeon Gyu Kim, S. S. Kim","doi":"10.1109/ICISSEC.2016.7885871","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885871","url":null,"abstract":"Our previous work suggested a method to connect online shopping services with social funding projects in order to provide a plenty of donating places for users to provide their shopping rewards and to improve the donation culture in our society. In this paper, we discuss the structure to implement the method using Apache Kafka, a well-known distributed publish/subscribe system, and present several issues found in the implementation of our system in terms of accuracy and security in message trans-mission.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121768391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deployment Scenario and Architecture of MANO for NFV Network Services 面向NFV网络业务的MANO部署场景及架构
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885848
Wonhyuk Lee, Hyuncheol Kim
{"title":"Deployment Scenario and Architecture of MANO for NFV Network Services","authors":"Wonhyuk Lee, Hyuncheol Kim","doi":"10.1109/ICISSEC.2016.7885848","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885848","url":null,"abstract":"The continuous evolution of the telecommunication network architecture has made their network functions to become more available and utilizable. With SDN/NFV network service providers can program their own network functions on the standard commercial hardware platform. SDN/NFV enable more efficient utilization of resources and better service agility. It supports new network services faster and less expensively. However, deployment scenario of MANO architecture for end-to-end NFV network services has not been mentioned. This paper gives an overview of effective MANO platform and proposes a deployment scenario and architecture for NFV network services.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121782451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Clustering and Association Rule for Improvement of Visitor Spots in the Lanna 兰纳旅游景点改进的模糊聚类与关联规则
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885855
Jirawat Teyakome, Narissara Eiamkanitchat, Korawan Sangkakorn, Phichit Napook
{"title":"Fuzzy Clustering and Association Rule for Improvement of Visitor Spots in the Lanna","authors":"Jirawat Teyakome, Narissara Eiamkanitchat, Korawan Sangkakorn, Phichit Napook","doi":"10.1109/ICISSEC.2016.7885855","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885855","url":null,"abstract":"This paper proposes the tool for the improvement of visitor spots of the Lanna civilization in the northern part of Thailand. Numbers of traveler are visited surrounding tourist spots in this area because of the identity of the culture, however large portions of the tourist attractions here still need to enhance to support the tourist. The propose tool expect to prescribe the subject to enhance for each individual tourist place. The fuzzy framework is used for clustering the features, and create the new values for each feature. The Apriori algorithm is applied and create the association rules. The outcomes demonstrate the connection of the criteria for the evaluated class of the visitor spots. All considered visitor spots in the Lanna civilization in the experiment are prior assessed by the specialists in the tourist study. Related person can use the experimental results as a guideline to improve their tourist attraction and able to estimate the class of their place as well.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Iterative Method for Fast Data Analysis in Internet of Things Environment 物联网环境下快速数据分析的近似迭代法
2016 International Conference on Information Science and Security (ICISS) Pub Date : 2016-12-01 DOI: 10.1109/ICISSEC.2016.7885844
Yong-Ju Lee, Ok-Gee Min
{"title":"Approximate Iterative Method for Fast Data Analysis in Internet of Things Environment","authors":"Yong-Ju Lee, Ok-Gee Min","doi":"10.1109/ICISSEC.2016.7885844","DOIUrl":"https://doi.org/10.1109/ICISSEC.2016.7885844","url":null,"abstract":"Fast data (the next step after big data) revolution leads to new requirements in data processing platforms. To overcome the fast data bottleneck caused by data in extremely rapid transit, adaptive data approximation is one of the alternative ways to handle incredible data speed. In this paper, we present an approximate iterative method for fast data analysis and investigate what benefits and opportunities might be available in Internet of Things environment.","PeriodicalId":420224,"journal":{"name":"2016 International Conference on Information Science and Security (ICISS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124298154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信