Advances in Information and Communication: Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2

دانلود کتاب Advances in Information and Communication: Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2

45000 تومان موجود

کتاب پیشرفت در اطلاعات و ارتباطات: مجموعه مقالات کنفرانس آینده اطلاعات و ارتباطات 2023 (FICC)، جلد 2 نسخه زبان اصلی

دانلود کتاب پیشرفت در اطلاعات و ارتباطات: مجموعه مقالات کنفرانس آینده اطلاعات و ارتباطات 2023 (FICC)، جلد 2 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Advances in Information and Communication: Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2

نام کتاب : Advances in Information and Communication: Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2
عنوان ترجمه شده به فارسی : پیشرفت در اطلاعات و ارتباطات: مجموعه مقالات کنفرانس آینده اطلاعات و ارتباطات 2023 (FICC)، جلد 2
سری : Lecture Notes in Networks and Systems, 652
نویسندگان :
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 927
ISBN (شابک) : 3031280725 , 9783031280726
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 90 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface
Contents
The Disabled’s Learning Aspiration and E-Learning Participation
1 Introduction
2 Literature Review
2.1 Lifelong Education for the Disabled
2.2 E-Learning and the Disabled
3 Method
3.1 Sample
3.2 Measurement
3.3 Analysis
4 Results
4.1 E-Learning Participation Rate and Perceived Effectiveness of E-Learning
4.2 ICT Access and Use
4.3 The Results of Structural Equation Model for E-Learning Participation
5 Conclusion
References
Are CK Metrics Enough to Detect Design Patterns?
1 Introduction
2 Background and Related Works
2.1 Design Patterns Background
2.2 Design Patterns Detection
3 Methodology
3.1 Data Extraction
3.2 Data Preprocessing
3.3 Machine Learning Models
3.4 Performance Metrics
4 Implementation Details and Results
4.1 Dataset Description
4.2 Experiments
5 Discussion
6 Conclusion
References
Detecting Cyberbullying from Tweets Through Machine Learning Techniques with Sentiment Analysis
1 Introduction
2 Background
2.1 Natural Language Processing
2.2 Machine Learning Algorithms
3 Proposed Tweets SA Model
3.1 Evaluation Measures
3.2 Datasets
4 Experiments and Results
4.1 Results for Dataset-1
4.2 Results for Dataset-2
4.3 Comparing the Results of Dataset-1 and Dataset2
5 Conclusion
References
DNA Genome Classification with Machine Learning and Image Descriptors
1 Introduction
2 Related Work
3 Materials and Methods
3.1 CNNs and Chaos Game Representation
3.2 Kameris and Castor
3.3 FOS, GLCM, LBP, and MLBP
4 Experiments and Results
4.1 Datasets
4.2 Metrics
4.3 Results
4.4 Processing Time
5 Discussion
6 Limitations
7 Conclusions
8 Future Work
References
A Review of Intrusion Detection Systems Using Machine Learning: Attacks, Algorithms and Challenges
1 Introduction
2 Intrusion Detection System
3 Machine Learning and Intrusion Detection
4 Metrics
5 Challenges
6 Conclusions
References
Head Orientation of Public Speakers: Variation with Emotion, Profession and Age
1 Introduction
2 Motivation and Literature Review
3 Method and System Design
4 Data and Results
4.1 The Data Used
4.2 Preliminary Data Profiling
4.3 Results and Discussion
5 Conclusions
References
Using Machine Learning to Identify Top Antecedents Affecting Crime in US Communities
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset
3.2 Lasso Regression
3.3 Feature Normalization
3.4 Alpha Value Selection
3.5 Results
4 Conclusion
References
Hybrid Quantum Machine Learning Classifier with Classical Neural Network Transfer Learning
1 Introduction
2 The Classic Neural Network
3 Quantum Machine Learning Classifier
3.1 Circuit Design Principles
3.2 Gradient Parameter-Shift Rule
3.3 Unlearning Rate
4 Results
4.1 Expectations
4.2 Weights
4.3 Metrics
5 Future Work
6 Definitions
References
Repeated Potentiality Augmentation for Multi-layered Neural Networks
1 Introduction
1.1 Potentiality Reduction
1.2 Competitive Learning
1.3 Regularization
1.4 Comprehensive Interpretation
1.5 Paper Organization
2 Theory and Computational Methods
2.1 Repeated Potentiality Reduction and Augmentation
2.2 Total and Relative Information
2.3 Repeated Learning
2.4 Full and Partial Compression
3 Results and Discussion
3.1 Experimental Outline
3.2 Potentiality Computation
3.3 Collective Weights
3.4 Partially Collective Weights
3.5 Correlation and Generalization
4 Conclusion
References
SGAS-es: Avoiding Performance Collapse by Sequential Greedy Architecture Search with the Early Stopping Indicator
1 Introduction
1.1 Problems of DARTS and SGAS
1.2 Research Purposes and Main Contributions
2 Prior Knowledge
2.1 Neural Architecture Search (NAS)
2.2 Differentiable Architecture Search (DARTS)
2.3 Sequential Greedy Architecture Search (SGAS)
2.4 The Relation Among Flat Minima, max and Performance Collapse
3 Approach
3.1 SGAS-es Overview
3.2 Bilevel Optimization
3.3 Early Stopping Indicator
3.4 Edge Decision Strategy
3.5 Fixing the Operation
3.6 Put-It-All-Together: SGAS-es
4 Experiment
4.1 NAS-Bench-201
4.2 Fashion-MNIST Dataset
4.3 EMNIST-Balanced Dataset
5 Conclusion
References
Artificial Intelligence in Forensic Science
1 Introduction
2 Related Works
3 Applications of AI in Forensic Science
3.1 Pattern Recognition
3.2 Data Analysis
3.3 Knowledge Discovery
3.4 Statistical Evidence
3.5 Providing Legal Solutions
3.6 Creating Repositories
3.7 Enhance Communication Between Forensic Team Members
4 Proposed Methodology
4.1 Data Collection and Pre-processing
4.2 Training the Model
5 Results
6 Conclusion
References
Deep Learning Based Approach for Human Intention Estimation in Lower-Back Exoskeleton
1 Introduction
2 Related Work
2.1 Vision-Based Methods
2.2 Data from Wearable Sensors
3 Methodology
3.1 Data Acquisition via Sensors
3.2 Kinematic Data Analysis
3.3 Experimental Protocol
3.4 Human Intention Estimation
3.5 Motion Prediction for the Exoskeleton Control with Deep Learning Approach
3.6 Long Short-Term Memory
4 Implementation
4.1 Hardware Implementation
4.2 Data Format
4.3 Feature Extraction
4.4 Performance Metric
5 Results and Discussion
6 Conclusion
References
TSEM: Temporally-Weighted Spatiotemporal Explainable Neural Network for Multivariate Time Series
1 Introduction
2 Related Work
2.1 Attention Neural Models
2.2 Post-Hoc Model-Specific Convolutional Neural Network-Based Models
2.3 Explanation Extraction by Class Activation Mapping
3 Methodology
4 Experiments and Evaluation
4.1 Baselines
4.2 Accuracy
4.3 Interpretability
4.4 Experiment Settings
4.5 Experiment Results
5 Conclusion and Outlook
References
AI in Cryptocurrency
1 Introduction
2 Related Work
3 Artificial Intelligence and Machine Learning
3.1 Artificial Intelligence
3.2 Machine Learning
4 Methodology
4.1 Data Collection
4.2 Preliminary Data Analysis
4.3 Data Preprocessing
4.4 Model Preparation
5 Results
6 Conclusions and Future Work
References
Short Term Solar Power Forecasting Using Deep Neural Networks
1 Introduction
2 Literature Review
3 Deep Neural Network
4 Proposed Methodology
5 Results and Discussion
6 Conclusion and Future Work
References
Convolutional Neural Networks for Fault Diagnosis and Condition Monitoring of Induction Motors
1 Introduction
2 Related Work
3 Data Description
4 Methodology
4.1 Experiment One: Raw Signal Data
4.2 Experiment Two: Statistical Features Data
5 Results
6 Conclusion
References
Huber Loss and Neural Networks Application in Property Price Prediction
1 Introduction
2 About the Data
2.1 Data Preparation
3 Neural Network Models
3.1 Deep Neural Network
3.2 Recurrent Neural Network
3.3 Hybrid Neural Network
4 Results
5 Conclusion
References
Text Regression Analysis for Predictive Intervals Using Gradient Boosting
1 Introduction
2 About the Data
2.1 Data Preparation
3 Literature Survey
4 Word Vectorization
4.1 Term Frequency-Inverse Document Frequency (TF-IDF)
4.2 Word2Vec
4.3 GloVe
5 The Intuition of Text Regression
5.1 Gradient Boosting Regressor
5.2 Quantile Regression Model
5.3 Benchmarking the Model
5.4 Model Comparisons
5.5 Hyperparameter Tuning
6 Result
6.1 Inference
7 Scope of Future Improvements
8 Conclusion
References
Chosen Methods of Improving Small Object Recognition with Weak Recognizable Features
1 Introduction
2 Related Works
3 Dataset Analysis
4 Data Augmentation with DCGAN
5 Augmentation Setup
5.1 Oversampling Strategies
5.2 Perceptual GAN
6 Results
7 Conclusions and Future Work
References
Factors Affecting the Adoption of Information Technology in the Context of Moroccan Smes
1 Introduction
2 Research Question
3 Literature Review
3.1 Definition of SME
3.2 Adoption of Information Technology
4 Research Methodology
5 Findings and Results
5.1 Organizational Factors
5.2 Individual Factors
5.3 Technological Factors
5.4 Environmental Factors
6 Conclusion and Future Works
References
Aspects of the Central and Decentral Production Parameter Space, its Meta-Order and Industrial Application Simulation Example
1 Introduction
2 Metadescriptive Approach in Orgitonal Terms of the Central-Decentral Problem
3 Model in Witness and Comparison to Previous Approach
3.1 Traditional and Additive Manufacturing (AM)
3.2 Electric Motor Housing as Application Example for the Case Study
3.3 Simulation of the Case Study in Witness
3.4 Comparison to Previous Work
3.5 Discussion
4 Conclusion and Outlook
References
Gender Equality in Information Technology Processes: A Systematic Mapping Study
1 Introduction
2 Background
2.1 Gender Equality
2.2 Gender Equality in IT
3 Research Method
3.1 Research Questions
3.2 Search Strategy
3.3 Selection Criteria
3.4 Data Sources and Study Selection
3.5 Strategy for Data Extraction and Analysis
4 Results
4.1 RQ1: What Kind of Studies Exist on IT Processes and Gender Equality?
4.2 RQ2: What Gender Equality Targets are addressed by IT Processes?
4.3 RQ3: What are the Main Challenges to Achieve Gender Equality in IT Processes?
4.4 RQ4: What are the Best Practices Established to Address Gender Equality in IT Processes?
5 Discussion
5.1 Principal Findings
5.2 Limitations
5.3 Implications
6 Conclusions and Future Work
Appendix A. Selected Studies
Appendix B. Results Mapping
References
The P vs. NP Problem and Attempts to Settle It via Perfect Graphs State-of-the-Art Approach
1 Introduction
2 Literature Review
3 Transforming Any Graph into a Perfect Graph
4 Extracting the Independence Number from the Transformed Perfect Graph
4.1 Characterisation of the Transformed Graph T
4.2 Algorithms to Find the Independence Number for Special Graphs
4.3 Example Graphs
5 Results
6 Conclusion and Future Work
References
Hadoop Dataset for Job Estimation in the Cloud with Limited Bandwidth
1 Introduction
2 Experimental Setup
3 The Hadoop MapReduce Job Traces Database
3.1 Data Generation
3.2 Data Collection
4 Conclusion and Future Work
References
Survey of Schema Languages: On a Software Complexity Metric
1 Introduction
2 Review of Related Works
3 Materials and Methods
3.1 Experimental Setup of LIS Metric
4 Result and Discussion
5 Conclusion
References
Bohmian Quantum Field Theory and Quantum Computing
1 Introduction
2 The Abrams-Lloyd Theorem
3 Lagrangians and Yang-Mills Fields
4 Fields and Photons
5 Quantum Logic Gates
6 Bohmian Mechanics
7 A System of Equations
8 Conclusion
References
Service-Oriented Multidisciplinary Computing: From Code Providers to Transdisciplines
1 Introduction
2 Disciplines and Intents in TDML
2.1 The Service-Oriented Conceptualization of TDML
2.2 Three Pillars of Service Orientation
3 Discipline Instantiation and Initialization
3.1 Explicit Discipline Instantiation with Builder Signatures
3.2 Implicit Discipline Instantiation by Intents
4 Discipline Execution and Aggregations
5 An Example of a Distributed Transdiscipline in TDML
5.1 Specify the Sellar Intent with the MadoIntent Operator
5.2 Define the Sellar Model with Two Distributed Disciplines
5.3 Execute the Sellar Intent
6 Conclusions
References
Incompressible Fluid Simulation Parallelization with OpenMP, MPI and CUDA
1 Introduction
2 Implementation and Tuning Effort
2.1 OpenMP
2.2 MPI
2.3 CUDA
3 Experimental Data: Scaling and Performance Analysis and Interesting Inputs and Outputs
3.1 OpenMP
3.2 Strong Scaling
3.3 Weak Scaling
3.4 MPI
3.5 CUDA
4 Conclusion
4.1 Difficulty
4.2 Timeliness of the Contribution
References
Predictive Analysis of Solar Energy Production Using Neural Networks
1 Introduction
2 Related Work
3 Research Methodology
3.1 Data Preparation and Preprocessing
3.2 Feature Extraction
3.3 Machine Learning and Neural Network Algorithms Overview
4 Analysis of Results
4.1 Wavelet Transforms
4.2 Discussion of Results
5 Conclusion and Future Work
References
Implementation of a Tag Playing Robot for Entertainment
1 Introduction
2 Related Work
3 Design and Implementation
4 Design Hardware Component
5 Discussion and Results
6 Conclusion
References
English-Filipino Speech Topic Tagger Using Automatic Speech Recognition Modeling and Topic Modeling
1 Introduction
2 Literature
2.1 Latent Dirichlet Allocation
3 Materials and Methods
3.1 Dataset
3.2 Pre-processing
3.3 Modeling
3.4 Topic Modeling: Latent Dirichlet Allocation
3.5 Evaluation
4 Results and Discussion
4.1 English XLSR Wav2Vec2 Fine-Tuned to Filipino
4.2 Comparison of Transcriptions: Base XLSR-Wav2Vec2 Model Fine-Tuned to Filipino
4.3 Topic Tagger Results
4.4 Evaluation of the Topic Models
5 Conclusion and Future Work
References
A Novel Adaptive Fuzzy Logic Controller for DC-DC Buck Converters
1 Introduction
2 System Model
3 The Proposed DAFLC
4 Implementation of the DAFLC Using ARM Embedded Platform
4.1 Fuzzification and Defuzzification
4.2 Inference Rule Update
5 Experimental Results
5.1 Case 1: Experiment with Reference Voltage Value 200V, Constant Load R = 50
5.2 Case 2: Experiments with Rising Steeply Reference Voltage Values from 50V to 200V, and the Load Resistance is Fixed at 50
5.3 Case 3: Experiment with Varying Load and Input Voltage
6 Conclusions
References
Visual Mechanisms Inspired Efficient Transformers for Image and Video Quality Assessment
1 Introduction
2 Multi-stage Channel Attention Integrated Swin Transformer for IQA (MCAS-IQA)
3 Locally Shared Attention in Transformer for VQA (LSAT-VQA)
4 Experiments and Discussions
4.1 IQA and VQA Datasets
4.2 Training Approach
4.3 Comparison and Ablations of IQA Models
4.4 Experiments on VQA Models
5 Conclusion
References
A Neural Network Based Approach for Estimation of Real Estate Prices
1 Introduction
2 The Proposed Approach
2.1 Training
2.2 Generation of Output Vector by a New Unknown Input Vector
3 Software Realization
4 Conclusion
References
Contextualizing Artificially Intelligent Morality: A Meta-ethnography of Theoretical, Political and Applied Ethics
1 Introduction
2 Literature Review
3 Theoretical AI Morality: Top-Down vs Bottom-Up
3.1 The Example of Fairness in AI
4 Technical AI Morality: Top-Down vs Bottom-Up
5 Political AI Morality: Top-Down vs. Bottom-Up
6 The Bottom-Up Method of AI Being Taught Ethics Through Reinforcement Learning
6.1 Reinforcement Learning as a Methodology for Teaching AI Ethics
7 The Top-Down Method of AI Being Taught Ethics
7.1 Practical Principles for AI Ethics
8 The Hybrid of Bottom-Up and Top-Down Ethics for AI
8.1 Data Mining Case Study: The African Indigenous Context
8.2 Contact Tracing for COVID-19 Case Study
9 Discussion
10 Conclusion
References
An Analysis of Current Fall Detection Systems and the Role of Smart Devices and Machine Learning in Future Systems
1 Introduction
2 Literature Review
2.1 Current Fall Detection and Fall Prevention Systems
2.2 Sensors
2.3 Fall Detection and Prevention Algorithms
3 Methodology
3.1 Materials
3.2 Dataset
3.3 Program
3.4 Evaluation and Analysis Techniques
4 Analysis and Evaluation
4.1 Statistical Analysis to Test the Classifiers
5 Discussion
6 Conclusion
6.1 Future Work
References
Authentication Scheme Using Honey Sentences
1 Introduction
2 Previous Methods
2.1 Overview of Previous Methods
2.2 Security Analysis of Previous Methods
3 Proposed Method
3.1 Preprocessing Phase
3.2 Sign-Up Phase
3.3 Login Phase
4 Discussion
4.1 Naturalness Evaluation
4.2 Security Analysis
5 Conclusion and Future Research
References
HSDVS-DPoS: A Secure and Heterogeneous DPoS Consensus Protocol Using Heterogeneous Strong Designated Verifier Signature
1 Introduction
2 Related Work
3 Preliminaries
3.1 Heterogeneous Strong Designated Signature Based on PKI and IBC
4 Proposed HSDVS-DPoS Consensus Protocol
4.1 Roles
4.2 Relationship of Roles
4.3 Data Structure
4.4 Consensus Phases
5 Discussion
5.1 Counting Phase
5.2 Rules of Counting
6 Security Analysis
6.1 Authentication and Secrecy
6.2 Anonymity
6.3 Fairness
6.4 Verifiability
6.5 Receipt-Freeness
6.6 Coercion-Resistance
7 Experiment
7.1 Overall Design
7.2 Experimental Evaluation
7.3 Experimental Results and Analysis
8 Conclusion
References
Framework for Multi-factor Authentication with Dynamically Generated Passwords
1 Introduction
2 Literature Review
3 Challenges and Limitations of the Existing Approaches
4 Proposed Authentication Idea
5 Experimental Environment
6 Results
7 Analysis of the Experimental Results
8 Conclusion
9 Further Research
References
Randomness Testing on Strict Key Avalanche Data Category on Confusion Properties of 3D-AES Block Cipher Cryptography Algorithm
1 Introduction
2 Review of 3D-AES
3 Proposed Design of Enhanced 3D-AES Block Cipher
3.1 Confusion-Based Function
3.2 Proposed Design of Confusion-Based Functions
3.3 ConfuseP
3.4 ConfuseK
3.5 ConfuseP−1 and ConfuseK−1
4 Randomness Testing on Enhanced 3D-AES
5 Discussion on Test Results
6 Conclusion and Future Research
References
A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential Attacks
1 Introduction
2 Introduction to Eagle Encoding Algorithm
3 Eagle Encryption Algorithm
3.1 Eagle Key Generator
3.2 Eagle Encryption Process
3.3 Eagle Decryption Process
4 Linear Attack Analysis to Eagle Encryption Algorithm
5 Differential Attack Analysis to Eagle Encryption Algorithm
6 One-Way Function Design
6.1 Introduction to One-Way Functions
6.2 Construction of One-Way Functions
7 Conclusion
References
Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities
1 Introduction
2 Problem and Significance
3 Review of Literature
4 Methodology
4.1 ECB Mode Benchmark
4.2 Open-Source Repository Information for Four Projects
4.3 Analysis of Open-Source Repositories with Static Analysis Tools
5 Findings
6 Discussions
7 Conclusions and Future Work
References
Developing a GSM-GPS Based Tracking System: Vulnerable Nigerian School Children as a Case Study
1 Introduction
1.1 Vulnerability Points in Nigerian School Children as a Basis for Tracker Functionality
2 Literature Review
2.1 Review of Related Works
2.2 Review Results
3 Methodology
3.1 Hardware Components
3.2 Software Components
3.3 System Flowchart
4 Result and Discussion
4.1 Circuit Diagram
4.2 System Operation
4.3 Performance Tests
5 Future Scope and Conclusion
References
Standardization of Cybersecurity Concepts in Automotive Process Models: An Assessment Tool Proposal
1 Introduction
1.1 Scope
1.2 Background and Approaches
1.3 Motive
2 Case Study Methodology and Scope
3 Case Study Observations and Results Consolidation
3.1 Overview of Automotive SPICE Assessment Methodology Steps
3.2 Details of the 1st Automotive SPICE Assessment for Cybersecurity (Challenged/Lessons Learned)
4 Study Results and Final Conclusion
5 Conclusion and Recommendations for Future Work
References
Factors Affecting the Persistence of Deleted Files on Digital Storage Devices
1 Introduction
2 Related Work
3 Experimental Design
3.1 Virtual Machine Preserving and Archiving Process
4 Parameters Identification
4.1 Disk and System Factors
4.2 Post-user Activity
4.3 Deleted Files Properties
5 Approach and Methodology
6 Results and Analysis
6.1 User Activity and Number of Files
6.2 File Size
6.3 File Types
6.4 Media Free Space and Disk Fragmentation
7 Challenges and Limitations
8 Conclusion
9 Future Work
References
Taphonomical Security: DNA Information with a Foreseeable Lifespan*-4pt
1 Introduction
2 Biochemical Preliminaries
2.1 NA Composition
2.2 NA Bonds Degradation Over Time
2.3 On the Synthesis of RNA-DNA Chimeric Oligonucleotides
2.4 RNA Degradation in Further Detail
3 The Proposed Method
3.1 Description of the Method
3.2 Encrypting Information
3.3 Key Reconstruction
3.4 Security
4 Controlling the Information Lifetime
4.1 Probabilistic Model
4.2 The Information Lifetime Bounds
5 Parameter Choice and Efficiency Analysis
5.1 Finding (n,k) for Target Times t and t\'
5.2 Finding (n,k) with Lowest Agony Ratio
5.3 Finding (n,k) for Target Time ttarget with the Least Variance
6 Conclusion and Future Work
A Proofs
B Numerical Values
References
Evaluation and Analysis of Reversible Watermarking Techniques in WSN for Secure, Lightweight Design of IoT Applications: A Survey
1 Introduction
2 WSN and IoT Smart Meters in Summary
3 Digital Watermarking and Reversible Watermarking
4 Literature Review and Related Work
5 Comparison and Discussion
5.1 Design Purpose
5.2 Influential Factors on System Performance
5.3 Resistance Against Attacks
6 Suggestions for Improving Security Performance for the Future Lightweight IoT-Based Design
7 Conclusion and Future Work
References
Securing Personally Identifiable Information (PII) in Personal Financial Statements*-4pt
1 Introduction
2 Review of Relevant Literature
3 Methodology
3.1 Qualifying Questions
3.2 Survey Contents
3.3 Sampling
4 Results
4.1 Preferences: Financial Institution
4.2 Preferences: Information on Statements
4.3 Changing View of PII
4.4 Discussion - Information on Statements
5 Conclusions
6 Discussions on Future Work
A Appendix
A.1 Example Statement: Full Account Number Obfuscated Only Obfuscated
A.2 Example Statement: Last 4 Digits Obfuscated
A.3 Example Statement: No Obfuscated Information
A.4 Survey Questions
References
Conceptual Mapping of the Cybersecurity Culture to Human Factor Domain Framework
1 Introduction
2 Research Method
3 Identified Cybersecurity Culture Factors
4 Human Factor
4.1 Factors of Human Problem
4.2 Human Factor Framework
5 Mapping of Cybersecurity Culture Factors and Human Factor Domain
5.1 Organisational and Individual Levels Factors
5.2 Discussions
6 Limitation
7 Conclusion and Future Work
References
Attacking Compressed Vision Transformers
1 Introduction
1.1 Related Work
1.2 Novel Contribution
2 Dataset
3 Metrics
4 Vision Transformers and Types
4.1 Transformers
4.2 Vision Transformers
4.3 Data-Efficient Image Transformers (DeiT)
5 Attacks
5.1 White Box Attacks
5.2 Black Box Attacks
6 Compression Techniques
6.1 Dynamic Quantization
6.2 Pruning: Dynamic DeiT
6.3 Weight Multiplexing + Distillation: Mini-DeiT
7 Experiments and Results
7.1 Compression Results
7.2 Quantization Attack Results
7.3 Pruning Attack Results
7.4 Weight Multiplexing + Distillation Attack Results
8 Limitations and Future Work
9 Conclusion
References
Analysis of SSH Honeypot Effectiveness
1 Introduction
2 Background
3 Methodology
4 Data and Results
4.1 Uncloaked Data
4.2 Cloaked Data
5 Comparison
6 Conclusion
7 Future Work
Appendix A
References
Human Violence Recognition in Video Surveillance in Real-Time
1 Introduction
2 Related Work
3 Proposal
3.1 Spatial Attention Module (SA)
3.2 Temporal Attention Module (TA)
4 Experiment and Results
4.1 Datasets
4.2 Configuration Model
4.3 Efficiency Evaluation
4.4 Accuracy Evaluation
4.5 Real-Time Evaluation
5 Discussion and Future Work
6 Conclusions
References
Establishing a Security Champion in Agile Software Teams: A Systematic Literature Review
1 Introduction
2 Related Work
2.1 Security Challenges in Agile Teams
2.2 The Champion Role and Security Champions
3 Methodology
3.1 The Search Protocol
3.2 The Systematic Search
3.3 The Adhoc Search
3.4 Data Extraction and Analysis
4 Results
4.1 RQ1 - Is There a Reportedly Consistent View on Security Champion in Agile Software Teams?
4.2 RQ2 - What Is Reported from the Software Engineering Literature About Establishing and Maintaining Security Champion Roles in Agile Software Teams?
4.3 RQ3: Which Challenges Has Been Reported Regarding the Establishment And Maintenance of Security Champion in Agile Software Teams?
5 Discussion
6 Conclusions
References
HTTPA: HTTPS Attestable Protocol
1 Introduction
2 Threat Modeling
3 Problem Statement
4 HTTPS Attestable (HTTPA) Protocol
4.1 Standard HTTP over TLS
4.2 Attestation over HTTPS
4.3 One-Way HTTPA
4.4 Mutual HTTPA (mHTTPA)
5 Summary
References
HTTPA/2: A Trusted End-to-End Protocol for Web Services
1 Introduction
2 Technical Preliminaries
2.1 Trusted Execution Environment (TEE)
2.2 Attest Quote (AtQ)
2.3 Attest Base (AtB)
2.4 Three Types of Request
2.5 Attest Ticket (AtT)
2.6 Attest Binder (AtBr)
2.7 Trusted Cargo (TrC)
2.8 Trusted Transport Layer Security (TrTLS)
3 Protocol Transactions
3.1 Preflight Check Phase
3.2 Attest Handshake (AtHS) Phase
3.3 Attest Secret Provisioning (AtSP) Phase
3.4 Trusted Communication Phase
3.5 Protocol Flow
4 Security Considerations
4.1 Layer 7 End-to-End Protection
4.2 Replay Protection
4.3 Downgrade Protection
4.4 Privacy Considerations
4.5 Roots of Trust (RoT)
5 Conclusion
6 Future Work
7 Notices and Disclaimers
References
Qualitative Analysis of Synthetic Computer Network Data Using UMAP
1 Introduction
1.1 Problem Statement
1.2 Motivation
1.3 Proposed Solution
1.4 Paper Roadmap
2 Background and Literature Review
2.1 Computer Network Traffic and Classification
2.2 Generative Machine Learning
2.3 Synthetic Traffic Evaluation
2.4 CTGAN
2.5 UMAP Embedding
3 Proposed Methodology
4 Case Study
4.1 Plan
4.2 Data Preparation
4.3 Generators
4.4 Real Data is Embedded
4.5 Synthetic Data is Embedded
5 Results and Discussion
5.1 Held-Out vs. GAN vs. Empirical Distribution
5.2 Comparison with Quantitative Measures
5.3 Behavior of UMAP
6 Future Work
6.1 Hyperparameter Search for Quality Embedding
6.2 Use in Traffic GAN Tuning
References
Device for People Detection and Tracking Using Combined Color and Thermal Camera
1 Introduction
2 Literature Review
2.1 Human Detection and Wearing Mask
2.2 Tracking Humans
2.3 Camera RGB-D
2.4 Thermal Camera
2.5 Calibration
3 Functional Results
4 Solution Architecture
5 Test Results
6 Conclusions
References
Robotic Process Automation for Reducing Food Wastage in Swedish Grocery Stores
1 Introduction
2 Robotic Process Automation
2.1 The History of RPA
2.2 Previous Studies
2.3 Related Studies in Food Wastage Reduction: Previous Studies Focus on the Theoretical Aspects, Such as the Usability of RPA in the Supply Chain, Although Very Few. Related Studies Are
3 Methodology
3.1 Methods for Data Collection
3.2 Thematic Analysis
3.3 Evaluation Methods
4 Results and Analysis
4.1 Advantages and Challenges of Adopting RPA
4.2 Advantages of Adopting RPA
4.3 Challenges of Adopting RPA
4.4 Possibilities of Implementing RPA in Current Business Processes
4.5 The Necessity of Physical Work in Certain Monotonous Tasks
5 Discussions and Conclusions
5.1 Identified Advantages of Adopting RPA
5.2 Identified Challenges of Adopting RPA
5.3 Limitations
5.4 Concluding Remarks and Future Directions
References
A Survey Study of Psybersecurity: An Emerging Topic and Research Area
1 Introduction, Scope and Motivation
2 Causes of Psybersecurity Attacks (PSA)
2.1 PSA Attack Vectors
2.2 Attack Target
2.3 Ciaidini\'s Principles of Psychiatric and Social Engineering
3 The Effects of Psybersecurity Attacks (PSA)
4 Cyberpsychology and its Dimensions
5 Summarizing and Classifying Literature: Survey Study Results 1
6 Analyzing Psybersecurity Attacks (PSA): Survey Study Results 2
7 Psybersecurity Amidst the COVID Pandemic
8 Future Scope of Work and Potential Research Directions
9 Conclusion and Summary
References
Author Index




پست ها تصادفی