2022 International Conference on Information Technology Systems and Innovation (ICITSI)最新文献

筛选
英文 中文
CANTool An In-Vehicle Network Data Analyzer CANTool车载网络数据分析仪
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970968
Md Rezanur Islam, Insu Oh, Kangbin Yim
{"title":"CANTool An In-Vehicle Network Data Analyzer","authors":"Md Rezanur Islam, Insu Oh, Kangbin Yim","doi":"10.1109/ICITSI56531.2022.9970968","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970968","url":null,"abstract":"In recent years, IoT devices have drawn attention to big data, complicating connectivity, and daily data processing. The automotive sector is no exception. The right way of vehicle data analysis is becoming essential every day for detecting internal errors, protecting against attackers, and connected vehicle concepts such as V2X. Some researchers use raw data to secure CAN, but that's not enough. On the other hand, deep learning is essential to secure autonomous driving and CAN, and data labeling is an obstacle. So, data analysis played an important role in data labeling. There are major flaws in data analysis, feature extraction, and data labeling for in-vehicle networks. Therefore, we proposed a CAN message analysis tool concept that can provide deep label analysis results and new features. There are many data analysis techniques these days, and we are trying to include suitable CAN message analysis techniques in our tool concept.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121326031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Health Application Security Assesment Based on OWASP Top 10 Mobile Vulnerabilities 基于OWASP的移动医疗应用安全十大漏洞评估
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970949
Dimas Febriyan Priambodo, Guntur Satria Ajie, Hendy Aulia Rahman, Aldi Cahya Fajar Nugraha, Aulia Rachmawati, Marcella Risky Avianti
{"title":"Mobile Health Application Security Assesment Based on OWASP Top 10 Mobile Vulnerabilities","authors":"Dimas Febriyan Priambodo, Guntur Satria Ajie, Hendy Aulia Rahman, Aldi Cahya Fajar Nugraha, Aulia Rachmawati, Marcella Risky Avianti","doi":"10.1109/ICITSI56531.2022.9970949","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970949","url":null,"abstract":"The increase of smartphone users in Indonesia is the reason for various sectors to improve their services through mobile applications, including the healthcare sector. The healthcare sector is considered a critical sector as it stores various health data of its users classified as confidential. This is the basis for the need to conduct a security analysis for mobile health applications, which are widely used in Indonesia. MobSF (Mobile Security Framework) and MARA (Mobile Application Reverse Engineering and Analysis) Framework are mobile application security analysis methods capable of assessing security levels based on OWASP (Open Web Application Security Project) Mobile Top 10 2016 classification, CVSS (Common Vulnerability Scoring System) and CWE (Common Weakness Enumeration). It is expected that the test results with MobSF and MARA can provide a safety metric for mobile health applications as a means of safety information for users and application developers.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125533004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Road Improvement Decision Support System Based on Road Damage Severe Analysis 基于道路损伤严重程度分析的道路改造决策支持系统
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971074
Wita Dewisari Tasya, F. Hidayat
{"title":"Road Improvement Decision Support System Based on Road Damage Severe Analysis","authors":"Wita Dewisari Tasya, F. Hidayat","doi":"10.1109/ICITSI56531.2022.9971074","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971074","url":null,"abstract":"The severity of road damage needs to be known in making decisions about when road repairs will be carried out. The system helps enter a severity measure and finally maps out how severe the damage was. The severity of road damage that has been combined with the classification of road damage can be integrated into a decision support system. The value of the pavement condition index (IKP) can be calculated from the identified damage. The aim of this paper is to improve the pavement condition index calculation with interpolation to calculate the reduction factor and corrected total reduction factor. With a more accurate IKP, it is possible to prioritize road damage that needs to be addressed within the existing budget constraints.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123819353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Requirement for E-government Implementation in Indonesia: A Mixed Method 印尼电子政府实施的知识需求:一种混合方法
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970893
Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Muhammad Vallen Firdaus
{"title":"Knowledge Requirement for E-government Implementation in Indonesia: A Mixed Method","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Muhammad Vallen Firdaus","doi":"10.1109/ICITSI56531.2022.9970893","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970893","url":null,"abstract":"Knowledge is an organizational intangible asset it describes organizational core value. Knowledge defines in individual and organizational artefact. Indonesia began assessing e-government implementation in 2018 and faced various problems and challenges which can be solved by skill and experience in e-government implementation. This research aimed to identify knowledge requirements of e-government implementation in Indonesia and divided it into 4 domains. A mixed methods approach was used to discover some findings related to the required knowledge. Content analysis is used to codify the knowledge require based on the regulation. Then, correspondence analysis is used to analyze the contingency value of each knowledge and domain. The result shows there are 75 knowledge required for e-Government implementation which is divided into 4 domains. BIPLOT diagram represents the association and similarity between each knowledge and the domain.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain-based Traceability System to Achieve the Quality Objectives in the Production Process of A Manufacturing Industry 基于区块链的可追溯系统,实现制造业生产过程中的质量目标
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970822
Anggastya Diah Andita H. P, I. B. Nugraha
{"title":"A Blockchain-based Traceability System to Achieve the Quality Objectives in the Production Process of A Manufacturing Industry","authors":"Anggastya Diah Andita H. P, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9970822","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970822","url":null,"abstract":"ISO 9001 is a standard for an organization that focuses on quality management. In ISO 9001, the organization must implement seven main clauses in achieving the certification or audit if the company has obtained ISO 9001 certification. One of the clauses is clause 6.2, which is related to quality objectives and focuses on process. The organization can achieve this clause if all SOPs in the organization are appropriately implemented. Therefore, if the SOP is well implemented, the process inside also runs well, and the quality objectives will be in line with the expectations. Manufacturing industry will be the case of the organization for this study. This study proposed a tracing system for the procedure in the SOP that used to achieve clause 6.2, quality objectives in ISO 9001. The database has an important role in system development because the system will store all information in it. Databases with conventional method have various weaknesses in data handling, such as centralized data storage and lack of security. Centralized data will make it difficult for each staff in the organization to access data if the main server is down. This study will focus on blockchain applied to traceability system as database technology because it can minimize the shortcomings of the database with conventional method. The results show that the data traceability system can trace procedures well and the data running well according to its function in storing data with blockchain. Based on these results, the traceability system in this study can trace procedures in achieving quality objectives in ISO 9001.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121761546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified RC4 Algorithm for Improve Data Protection in Cloud Environment 改进RC4算法,提高云环境下的数据保护
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971094
Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata
{"title":"Modified RC4 Algorithm for Improve Data Protection in Cloud Environment","authors":"Ethar Abdul Wahhab Hachim, Thekra Abbas, M. Gaata","doi":"10.1109/ICITSI56531.2022.9971094","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971094","url":null,"abstract":"The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper, the focus was placed on improving the RC4 algorithm in both of (KSA) and (PRGA) in order to increase the security level. The performance of our improved RC4 algorithm was tested and evaluated by increasing the randomness of the generated key. The experimental results prove that high security level for output based on the security average of ciphertext with various keys and various files size. Thus, get more security level for the personal data that is stored in the cloud.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134434970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Feature Extraction TF-IDF to Perform Cyberbullying Text Classification: A Literature Review and Future Research Direction 特征提取TF-IDF进行网络欺凌文本分类:文献综述及未来研究方向
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970942
Yudi Setiawan, Dani Gunawan, Rusdi Efendi
{"title":"Feature Extraction TF-IDF to Perform Cyberbullying Text Classification: A Literature Review and Future Research Direction","authors":"Yudi Setiawan, Dani Gunawan, Rusdi Efendi","doi":"10.1109/ICITSI56531.2022.9970942","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970942","url":null,"abstract":"Feature extraction on text documents becomes a challenging task for making natural language and machine learning classifications. A document has a complex wording with various meanings and expressions contained in it. The complexity and variety of perceptions make it difficult to find labels and classify documents. The feature extraction process can be carried out to capture important text, phrases and words contained in a document so that the text classification process can be carried out. Term Frequency-Inverse Document Frequency (TF-IDF) is a feature extraction method by performing a grouping process based on the statistics of the occurrence of words from the data collection used. In this paper, the authors present feature extraction with the TF-IDF method with variations of the model approach. Such as; weighting on the occurrence of the word, the filter process on the words in the document, creation rules on term documents, extraction for two or more syllables, and combination with other extraction methods, to improve the text classification process in cyberbullying detection. This paper also opens up opportunities that can be done in the future regarding feature extraction with variations of statistical models of word occurrences in textual detection.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System 战术数据链系统移动自组网MAC协议研究
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9971025
Riyanto, S. Supangkat, Iskandar
{"title":"Survey on MAC Protocol of Mobile Ad hoc Network for Tactical Data Link System","authors":"Riyanto, S. Supangkat, Iskandar","doi":"10.1109/ICITSI56531.2022.9971025","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971025","url":null,"abstract":"Tactical Data Link (TDL) is one of the important elements in Network Centric Warfare (NCW). TDL provides the means for rapid exchange of tactical information between air, ground, sea units and command centers. In military operations, TDL has high demands for resilience, responsiveness, reliability, availability and security. MANET has characteristics that are suitable for the combat environment, namely the ability to self-form and self-healing so that this network may be applied to the TDL system. To produce high performance in MANET adapted for TDL system, an efficient MAC Protocol method is needed. This paper provides a survey of several MAC Protocol methods on a tactical MANET. In this paper also suggests some improvements to the MANET MAC protocol to improve TDL system performance.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133567128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in Banking 区块链在银行业的应用
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970827
Nurul Hidayah Arrifin, Ulaganathan Subramanian
{"title":"Blockchain in Banking","authors":"Nurul Hidayah Arrifin, Ulaganathan Subramanian","doi":"10.1109/ICITSI56531.2022.9970827","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970827","url":null,"abstract":"Blockchain technology is one of the innovations in financial technology that serves as the backbone of Bitcoin and Cryptocurrency. A blockchain is a secure ledger of all data transfer activities that eliminate the need for third-party involvement. It is a technology that records transactions using distributed databases and cryptography. There are three types of blockchain which are public, private, and Consortium or Federated blockchain. Many industries have used blockchain technology. Blockchain in banking is one of the industries that use blockchain the most and need by the country and organization. Many use cases on blockchain in banking, such as Know Your Customer (KYC), clearing and settlement, trade finance, payments, smart contract, and syndicated loans. These use cases could see the impact of implementing blockchain in banking.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127787850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Evasion Framework For Auditing Anti-Malware Resistance Against Various Obfuscation Technique And Dynamic Code Loading Android恶意软件规避框架,用于审计反恶意软件对各种混淆技术和动态代码加载的抵抗力
2022 International Conference on Information Technology Systems and Innovation (ICITSI) Pub Date : 2022-11-08 DOI: 10.1109/ICITSI56531.2022.9970912
Steven Prasetya Ohello, Suhardi
{"title":"Android Malware Evasion Framework For Auditing Anti-Malware Resistance Against Various Obfuscation Technique And Dynamic Code Loading","authors":"Steven Prasetya Ohello, Suhardi","doi":"10.1109/ICITSI56531.2022.9970912","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970912","url":null,"abstract":"Malware is one of the biggest threats to the Android system today. Anti-malware researchers and malware developers are constantly competing to produce their best product. In this study we tried to evaluate the robustness of anti-malware on the market by auditing it from the point of view of malware authors. By understanding how an attack technique is developed, hopefully we can come up with better defenses in the future. Several studies have shown that transformation with code obfuscation and the use of dynamic code loading has proven to be effective in avoiding detection. But the research so far has only focused on how to bypass anti-malware. Existing studies have not discussed how to bypass Play Protect and permission based checks on the android system and get permission from the user. We propose a framework for auditing anti-malware using various obfuscation techniques and dynamic code loading. Malware will be embedded into legitimate apps to bypass play protect detection. This framework has a mechanism to check and add a number of permissions that malware needs into the application and force the user to grant permissions at runtime. In addition we also added a feature to randomize the order of the obfuscation process and also randomly generate certificates. From the experiments we conducted, each of these features was able to reduce the detection rate of the virustotal by 50%. The overall implementation and testing of our framework shows a significant reduction in detection. The malware was also successfully installed on the real device and carried out its functions properly without being detected.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114306396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信