Logic Journal of the IGPL最新文献

筛选
英文 中文
A comparison of time series lags and non-lags in Spanish electricity price forecasting using data science models 利用数据科学模型对西班牙电价预测中的时间序列滞后和非滞后进行比较
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-24 DOI: 10.1093/jigpal/jzae034
Belén Vega-Márquez, Javier Solís-García, Isabel A Nepomuceno-Chamorro, Cristina Rubio-Escudero
{"title":"A comparison of time series lags and non-lags in Spanish electricity price forecasting using data science models","authors":"Belén Vega-Márquez, Javier Solís-García, Isabel A Nepomuceno-Chamorro, Cristina Rubio-Escudero","doi":"10.1093/jigpal/jzae034","DOIUrl":"https://doi.org/10.1093/jigpal/jzae034","url":null,"abstract":"Electricity is an indicator that shows the progress of a civilization; it is a product that has greatly changed the way we think about the world. Electricity price forecasting became a fundamental task in all countries due to the deregulation of the electricity market in the 1990s. This work examines the effectiveness of using multiple variables for price prediction given the large number of factors that could influence the price of the electricity market. The tests were carried out over four periods using data from Spain and deep learning models. Two different attribute selection methods based on Pearson’s correlation coefficient have been used to improve the efficiency of the training process. The variables used as input to the different prediction models were chosen, considering those most commonly used previously in the literature. This study attempts to test whether using time series lags improves the non-use of lags. The results obtained have shown that lags improve the results compared to a previous work in which no lags were used.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140314514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive graph Laplacian MTL L1, L2 and LS-SVMs 自适应图拉普拉斯 MTL L1、L2 和 LS-SVM
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-24 DOI: 10.1093/jigpal/jzae025
Carlos Ruiz, Carlos M Alaíz, José R Dorronsoro
{"title":"Adaptive graph Laplacian MTL L1, L2 and LS-SVMs","authors":"Carlos Ruiz, Carlos M Alaíz, José R Dorronsoro","doi":"10.1093/jigpal/jzae025","DOIUrl":"https://doi.org/10.1093/jigpal/jzae025","url":null,"abstract":"Multi-Task Learning tries to improve the learning process of different tasks by solving them simultaneously. A popular Multi-Task Learning formulation for SVM is to combine common and task-specific parts. Other approaches rely on using a Graph Laplacian regularizer. Here we propose a combination of these two approaches that can be applied to L1, L2 and LS-SVMs. We also propose an algorithm to iteratively learn the graph adjacency matrix used in the Laplacian regularization. We test our proposal with synthetic and real problems, both in regression and classification settings. When the task structure is present, we show that our model is able to detect it, which leads to better results, and we also show it to be competitive even when this structure is not present.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140314616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices 使用 MQTT 协议对物联网设备网络中的入侵检测进行贝塔海比学习
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-22 DOI: 10.1093/jigpal/jzae013
Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, José Luis Calvo-Rolle
{"title":"Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices","authors":"Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, José Luis Calvo-Rolle","doi":"10.1093/jigpal/jzae013","DOIUrl":"https://doi.org/10.1093/jigpal/jzae013","url":null,"abstract":"This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set of projections that enable human experts to visually identify most attacks in real-time, making it a powerful tool that can be implemented in IoT environments easily.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial: Special Issue HAIS 2021 编辑:HAIS 2021 特刊
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-21 DOI: 10.1093/jigpal/jzae022
{"title":"Editorial: Special Issue HAIS 2021","authors":"","doi":"10.1093/jigpal/jzae022","DOIUrl":"https://doi.org/10.1093/jigpal/jzae022","url":null,"abstract":"","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140387718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realtime polymorphic malicious behavior detection in blockchain-based smart contracts 在基于区块链的智能合约中实时检测多态恶意行为
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-20 DOI: 10.1093/jigpal/jzae016
Darius Galiş, Ciprian Pungilă, Viorel Negru
{"title":"Realtime polymorphic malicious behavior detection in blockchain-based smart contracts","authors":"Darius Galiş, Ciprian Pungilă, Viorel Negru","doi":"10.1093/jigpal/jzae016","DOIUrl":"https://doi.org/10.1093/jigpal/jzae016","url":null,"abstract":"This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The experimental results obtained showed a significant speed-up of our approach, as compared to the classic similarity measures used commonly in such scenarios.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some results for min matrices associated with Chebyshev polynomials 与切比雪夫多项式相关的最小矩阵的一些结果
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-20 DOI: 10.1093/jigpal/jzae028
Fatih Yilmaz, Samet Arpaci, Aybüke Ertaş
{"title":"Some results for min matrices associated with Chebyshev polynomials","authors":"Fatih Yilmaz, Samet Arpaci, Aybüke Ertaş","doi":"10.1093/jigpal/jzae028","DOIUrl":"https://doi.org/10.1093/jigpal/jzae028","url":null,"abstract":"In the present study, inspired by the studies in the literature, we consider Min matrix and its Hadamard exponential matrix family whose elements are Chebyshev polynomials of the first kind. Afterwards, we examine their various linear algebraic properties and obtain some inequalities. Furthermore, we shed light on the results we obtained to boost the clarity of our paper with the illustrative examples. In addition to all these, we give two MATLAB-R2023a codes that compute the Min matrix and the Hadamard exponential matrix with Chebyshev polynomials of the first kind entries, as well as calculate some matrix norms.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection, exploitation and mitigation of memory errors 内存错误的检测、利用和缓解
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae008
Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez, Pablo Garcia Bringas
{"title":"Detection, exploitation and mitigation of memory errors","authors":"Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez, Pablo Garcia Bringas","doi":"10.1093/jigpal/jzae008","DOIUrl":"https://doi.org/10.1093/jigpal/jzae008","url":null,"abstract":"Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. In this paper, we summarise the main memory safety violation types (i.e. memory errors), and analyse how they are exploited by attackers and the main mitigation methods proposed in the research community. We further systematise the most relevant techniques with regards to memory corruption identification in current programs.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards enhanced monitoring framework with smart predictions 通过智能预测改进监测框架
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae010
Antonello Calabrò, Said Daoudagh, Eda Marchetti
{"title":"Towards enhanced monitoring framework with smart predictions","authors":"Antonello Calabrò, Said Daoudagh, Eda Marchetti","doi":"10.1093/jigpal/jzae010","DOIUrl":"https://doi.org/10.1093/jigpal/jzae010","url":null,"abstract":"Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides the reference architecture of the Smart Monitoring Framework and its possible implementation to promptly detect suspicious behavior or property violations. The paper also illustrates how the provided implementation satisfies the defined guidelines by design.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140156892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting multimodal biometrics for enhancing password security 利用多模态生物识别技术提高密码安全性
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae009
Konstantinos Karampidis
{"title":"Exploiting multimodal biometrics for enhancing password security","authors":"Konstantinos Karampidis","doi":"10.1093/jigpal/jzae009","DOIUrl":"https://doi.org/10.1093/jigpal/jzae009","url":null,"abstract":"Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience of use and ease of hardware installation. Many biometric-based authentication schemes were proposed, but despite the advantages that they offer, recent research has shown that biometrics by itself cannot be considered as an inviolable technique. Recently, we have proposed StegoPass, a novel method that obtains the 68 facial points of a user and utilizes them as a stego message to an image. This produced stego image was the password. Although the experiments conducted showed maximum security, it would be challenging to enhance the robustness of the proposed model for even more attacks. This paper examines the utilization of multimodal biometrics as the secret message embedded in the image. More specifically, besides the extraction of the facial points, we extract the unique minutiae moments and combine them in a feature vector. This feature vector is then embedded in the image. Two different datasets were used, and the security of the method was tested against state-of-the-art deep learning models, i.e. generative adversarial networks, to test whether the image could be digitally synthesized and fool the proposed verification scheme. The results proved that the new enhanced version of StegoPass offers an extremely secure method as its predecessor.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Good practices in designing a communication channel architecture for secure async flexible distributed collaboration 设计用于安全异步灵活分布式协作的通信渠道架构的良好实践
IF 1 4区 数学
Logic Journal of the IGPL Pub Date : 2024-03-15 DOI: 10.1093/jigpal/jzae012
Rudolf Erdei, Daniela Delinschi, Oliviu Matei, Laura Andreica
{"title":"Good practices in designing a communication channel architecture for secure async flexible distributed collaboration","authors":"Rudolf Erdei, Daniela Delinschi, Oliviu Matei, Laura Andreica","doi":"10.1093/jigpal/jzae012","DOIUrl":"https://doi.org/10.1093/jigpal/jzae012","url":null,"abstract":"In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The architecture was developed and implemented as part of the BIECO project, and is based around open standards such as Open Platform Communications United Architecture (OPC-UA). The key feature of the architecture is that it enables secure asynchronous near-real-time communication between a large number of nodes in a multimodal setup, without the need of any Service to know its place within the tool-chain. Based on our experience with building this system and based on the good results obtained, we are presenting a list of lessons learnt, recommendations for better communication channel modules within loosely coupled distributed systems.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信