Proceedings of the 4th International Conference on Networking, Information Systems & Security最新文献

筛选
英文 中文
TRANSFER LEARNING AND SMOTE ALGORITHM FOR IMAGE-BASED MALWARE CLASSIFICATION 基于图像的恶意软件分类迁移学习和攻击算法
Pr.Nasserdine Bouchaib, M. Bouhorma
{"title":"TRANSFER LEARNING AND SMOTE ALGORITHM FOR IMAGE-BASED MALWARE CLASSIFICATION","authors":"Pr.Nasserdine Bouchaib, M. Bouhorma","doi":"10.1145/3454127.3457631","DOIUrl":"https://doi.org/10.1145/3454127.3457631","url":null,"abstract":"In recent years, the volume and type of malware is growing, which increases the need of improving a detection and classification malware systems. Nowadays, deep convolutional neural networks (CNNs) have recently proven to be very successful for malware classification due to their performance on images classification. However, their effectiveness is degraded with the unbalanced malware families. In this paper, we propose a malware classification framework using CNN-based deep learning architecture, including a SMOTE technique \"Synthetic Minority Oversampling Technique\" to balance the dataset (malwares families). Our proposed method consists to converting the binary files into gray scale images and balancing them by the SMOTE method, and then we use them to train the CNN architecture to detect and identify malware families. We use the Transfer Learning technique based on an existing Deep Learning model VGG16 that has previously trained with the ImageNet dataset (≥ 10 million). For evaluations, an extensive experiment was conducted using Microsoft Malware dataset. The Results show that our approach is efficient with an average accuracy of 98%.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114563031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulation Daily Mobility in Rabat region 模拟拉巴特地区的日常流动性
Khalid Qbouche, K. Rhoulami
{"title":"Simulation Daily Mobility in Rabat region","authors":"Khalid Qbouche, K. Rhoulami","doi":"10.1145/3454127.3454128","DOIUrl":"https://doi.org/10.1145/3454127.3454128","url":null,"abstract":"Nowadays, the world has seen a huge evolution in big cities because of urban development, so the percentage of overcrowding is increased. This problem is influenced by the daily movement, either by private transport or public transport. Therefore, Daily Mobility (DM) is usually interconnected to human urban behavior to give more realistic and effective simulation models. In this paper, we represent a displacement scenario of daily mobility between the place of residence and the workplace of each person who is characterized by the coordinates of GPS (Place_id) by Gama Platform. Besides, we implemented a prototype for the movement of people in the Rabat region.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124773376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Stream clustering for detecting misbehavior in an intelligent transportation system 用于检测智能交通系统中不当行为的数据流聚类
Sara Ftaimi, T. Mazri
{"title":"Data Stream clustering for detecting misbehavior in an intelligent transportation system","authors":"Sara Ftaimi, T. Mazri","doi":"10.1145/3454127.3456574","DOIUrl":"https://doi.org/10.1145/3454127.3456574","url":null,"abstract":"The security aspect represents a major challenge for the intelligent transport system, whether it is securing the system's various components such as the network and communication between the various nodes or securing the nodes themselves. In ITS, data is generated at high speed, and the data shared between the nodes of the network changes over time at a very high speed. Securing the data shared by the nodes is essential to ensure the integrity and reliable communication. In this paper, we will propose a methodology to detect packets' behavior sent between the different nodes using a data stream clustering algorithm since the data shared between the nodes verify the data stream criteria.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks and defenses on autonomous vehicles: a comprehensive Study 自动驾驶汽车的攻击和防御:一项综合研究
Boughanja Manale, T. Mazri
{"title":"Attacks and defenses on autonomous vehicles: a comprehensive Study","authors":"Boughanja Manale, T. Mazri","doi":"10.1145/3454127.3456575","DOIUrl":"https://doi.org/10.1145/3454127.3456575","url":null,"abstract":"Autonomous vehicles are developing at a rapid pace with increasing levels of automation and connectivity, creating new potential for a wide range of cyber attacks to improve security, protection, and detection measures to be implemented at all levels of autonomous vehicles, many efforts are being made to improve resilience to cyberattacks, and many challenges remain unresolved. This article first presents an overview of AV and then some major security attacks on connected vehicles. We review and summarize the available defenses against these attacks and categorize them into four categories, including cryptography, network security, software vulnerability detection, and malware detection.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128871332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Flexible Relational Database Query System 一个灵活的关系数据库查询系统
R. Mama, M. Machkour, K. Ahkouk, K. Majhadi
{"title":"Towards a Flexible Relational Database Query System","authors":"R. Mama, M. Machkour, K. Ahkouk, K. Majhadi","doi":"10.1145/3454127.3456579","DOIUrl":"https://doi.org/10.1145/3454127.3456579","url":null,"abstract":"In many cases information is found to be naturally fuzzy or imprecise, that's why flexible query systems have become indispensable to represent and manage this information and especially facilitate interrogation to a non-expert user, the problem is that Boolean queries do not allow the user to use vague and imprecise language terms in the qualification criteria of the searched data or to express preferences between these criteria. Nowadays, there are many proposals that allow users to make flexible queries on relational databases. In this paper, we will briefly review the main attempts to find a perfect solution to this problem, highlighting their advantages, disadvantages and difficulties encountered. Finally, as a result of this comparative study, we present an intended model of the flexible relational database query system.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey and a New Taxonomy of Proofs of Retrievability on the Cloud Storage 云存储上可检索性证明的调查与新分类
Abdel Ali Harchaoui, A. Younes, A. E. Hibaoui, A. Bendahmane
{"title":"Survey and a New Taxonomy of Proofs of Retrievability on the Cloud Storage","authors":"Abdel Ali Harchaoui, A. Younes, A. E. Hibaoui, A. Bendahmane","doi":"10.1145/3454127.3457629","DOIUrl":"https://doi.org/10.1145/3454127.3457629","url":null,"abstract":"Proof of Retrievability (PoR) is a technique used to ensure the authenticity of data on outsourced storage services. It improves the soundness and the robustness of the data integrity scheme and allows clients to recover the remote data. Under the circumstance of considering untrusted parties including the Cloud Storage Provider (CSP) and Third Party Authenticator (TPA), incorporating PoR and zero-knowledge Proofs, which is another technique used to allow a prover to convince a verifier that a secret exists without revealing the secret itself, will ensure client integrity verification, strengthen privacy, and improve fairness to both sides. In this paper, we present, on one hand, the state-of-the-art of PoR under zero-knowledge constructs following an existing data integrity scheme taxonomy of cloud storage. We analyze the PoR scheme formalism and its similarities with zero-knowledge concepts, in addition to the techniques used to settle robustness and zero-knowledge proofs methods. On the other hand, we propose our improved taxonomy of proofs of retrievability enriched by the zero-knowledge, the cryptography model, and the cryptographic setup. The proposed taxonomy equips researchers with a tool to think about the PoR scheme from those perspectives. In the end, we state some fruitful lines of works that PoR can take advantage of; i.e Bulletproofs, Interactive Oracle Proofs, and Interactive Oracle Proofs of Proximity For Reed-Solomon.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133948788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of the Text to SQL Frameworks 回顾文本到SQL框架
K. Ahkouk, M. Machkour, K. Majhadi, R. Mama
{"title":"A review of the Text to SQL Frameworks","authors":"K. Ahkouk, M. Machkour, K. Majhadi, R. Mama","doi":"10.1145/3454127.3457619","DOIUrl":"https://doi.org/10.1145/3454127.3457619","url":null,"abstract":"The use of relational databases and the extraction of the stored data are generally carried out using queries expressed in a query language such as SQL (Structured Query Language). In particular, people with limited knowledge on databases are unable to write such requests. To resolve this problem, the use of natural language (NL) to interact with these systems will be the easiest alternative. Using natural language interfaces for databases (NLIDB) is the key solution to make the translation of natural languages like English to SQL queries possible. This can help to generalize access to databases for different types of users regardless their technical level of knowledge on SQL. This paper will present a short review of our already proposed framework that deal with Natural Language translation to Database queries.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125886624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Based Composition using Machine Learning Approaches: A Literature Review 使用机器学习方法的基于Web的作文:文献综述
Yapo Jesus Ekie, Bassirou Gueye, I. Niang, Atse Marcellin Tresor Ekie
{"title":"Web Based Composition using Machine Learning Approaches: A Literature Review","authors":"Yapo Jesus Ekie, Bassirou Gueye, I. Niang, Atse Marcellin Tresor Ekie","doi":"10.1145/3454127.3457623","DOIUrl":"https://doi.org/10.1145/3454127.3457623","url":null,"abstract":"Web Service Composition technology involves the integration of various atomic web services to perform huge scale tasks. As the number of web services is continuously growing, the need for composite web services also increases simultaneously. Since 2000, academic and systematic research has significantly focused on Web-Based Composition (WBC) in many well-reputed scientific journals and presented insight on several issues related to semantic Web and machine learning. In this paper, we present a review on the main contributions related to WBC using Machine Learning approaches. Our analysis and evaluation of those papers give a remarkable insight into the different approaches and planning models with strategies that were developed by researchers and IT professionals. This literature review paper intends to give researchers, interested in WBC, a valuable source of information and also fast-track their researches towards future technologies related to artificial intelligence and machine learning in WBC. The related work onto WBC, its application, research gap, the current status of WBC, and future challenges are also discussed.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128912099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on architectures of aquaponic systems based on the Internet of Things and artificial intelligence: Comparative study. 基于物联网和人工智能的鱼菜共生系统架构综述:比较研究。
Khaoula Taji, Rachida Ait Abdelouahid, Ibtissame Ezzahoui, A. Marzak
{"title":"Review on architectures of aquaponic systems based on the Internet of Things and artificial intelligence: Comparative study.","authors":"Khaoula Taji, Rachida Ait Abdelouahid, Ibtissame Ezzahoui, A. Marzak","doi":"10.1145/3454127.3457625","DOIUrl":"https://doi.org/10.1145/3454127.3457625","url":null,"abstract":"The aquaponics system is an agricultural production technique that combines aquaculture with hydroponics and reduces the environmental impact by reducing the need for water and nutrients. New technologies such as the Internet of Things and artificial intelligence can be an efficient and reliable application for this purpose. They can help to implement this system in urban areas and to produce organic food. The main objective of this article is to present a comparative study between different existing aquaponic architectures according to different factors such as Security, Interoperability, Renewable energy usability, Cost, and so one, and various technologies used based on Internet of Things and artificial intelligence approaches such as sensors, actuators, gateway, communication technology, storage system, user interface etc., as well as the advantages and limitations of each proposed solution. This paper is an opening towards a new contribution that will be based on an interoperable, secure, scalable, low-cost, fully self-powered, flexible, reliable, intelligent and generic IoT architecture that meets the requirements of aquaponics. This new contribution will also make it possible to optimize the critical parameters in aquaponics, namely water quality, pH, air temperature, humidity, CO2, etc., and predict the state of the system's health to improve its productivity, thanks to artificial intelligence.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Direct modeling method of acoustic streaming using lattice Boltzmann approach 基于晶格玻尔兹曼方法的声流直接建模方法
J. Benhamou, M. Jami, A. Mezrhab
{"title":"Direct modeling method of acoustic streaming using lattice Boltzmann approach","authors":"J. Benhamou, M. Jami, A. Mezrhab","doi":"10.1145/3454127.3458771","DOIUrl":"https://doi.org/10.1145/3454127.3458771","url":null,"abstract":"This paper introduces a numerical analysis of the acoustic streaming phenomenon using the lattice Boltzmann method (LBM). This study aims to investigate the flow created by the sound wave propagation in water. The waves are emitted by a linear source situated in the middle of the left surface of a rectangular cavity. This acoustic streaming study can be applied in the photovoltaic silicon purification field whose final objective is the participation in the manufacture of photovoltaic panels. This work is particularly interested in the study of Eckart streaming produced by the dissipation of the waves acoustic energy in the medium. An analytical analysis is also performed to confirm the validity of the numerical approach.","PeriodicalId":432206,"journal":{"name":"Proceedings of the 4th International Conference on Networking, Information Systems & Security","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信