Keywords:
Computational intelligence.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (431 pages)
Edition:
1st ed.
ISBN:
9783030878726
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.1400
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6732914
DDC:
006.3
Language:
English
Note:
Intro -- Preface -- CISIS 2021 -- Organization -- General Chair -- Local Chair -- Local Co-chairs -- Program Committee Chairs -- Program Committee -- CISIS 2021: Special Sessions -- Building Trust in Ecosystems and Ecosystem Components -- Program Committee -- CISIS 2021 Organizing Committee Chairs -- CISIS 2021 Organizing Committee -- ICEUTE 2021 -- Organization -- General Chair -- Local Chair -- Local Co-chairs -- Program Committee Chairs -- Program Committee -- ICEUTE 2021: Special Sessions -- Sustainable Personal Goals: Engaging Students in their Learning Process -- Program Committee -- ICEUTE 2021 Organizing Committee Chairs -- ICEUTE 2021 Organizing Committee -- Contents -- A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation -- 1 Introduction -- 2 Related Work -- 2.1 The CUDA Framework -- 2.2 Challenges in Heterogeneous Implementations -- 3 Implementation -- 4 Experimental Results -- 5 Conclusion -- References -- Estimating Re-identification Risk by Means of Formal Conceptualization -- 1 Introduction -- 2 Background -- 2.1 Risk-Based Methodologies for Preserving Privacy -- 2.2 Formal Concept Analysis -- 3 Estimating Risk Using Formal Concepts -- 3.1 Semantic Interpretation of Risk Metrics -- 3.2 Semantic Risk -- 3.3 Semantic Risk Management -- 4 Conclusions and Future Work -- References -- Beta Hebbian Learning for Intrusion Detection in Networks of IoT Devices -- 1 Introduction -- 2 Case Study -- 3 Dataset -- 4 Beta Hebbian Learning Algorithm as Projection Model for CyberActtacks Visualization -- 5 Experiments and Results -- 6 Conclusions and Future Works -- References -- Attacks Detection on Sampled Netflow Traffic Through Image Analysis with Convolutional Neural Networks (CNN) -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Gathering -- 2.2 Image Generation -- 2.3 Training the CNN -- 3 Results.
,
4 Conclusions and Further Work -- References -- Analysis of the Performance of Different Accountability Strategies for Autonomous Robots -- 1 Introduction -- 2 System Architecture -- 3 System Application Using Sysdig, Librdkafka, Apache Kafka and MongoDB -- 3.1 Sysdig -- 3.2 Librdkafka Message Producer -- 3.3 Apache Kafka -- 3.4 MongoDB -- 4 Experimentation -- 4.1 Software Artifacts -- 5 Evaluation -- 5.1 Assessment Scenarios -- 5.2 Metrics -- 6 Results and Discussion -- 6.1 Log Benchmarking -- 6.2 System Benchmarking -- 7 Conclusions -- References -- Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection -- 1 Introduction -- 2 Materials and Methods -- 2.1 NetFlow -- 2.2 RedCAYLE -- 2.3 MoEv -- 2.4 DOROTHEA -- 2.5 Data Gathering -- 2.6 Evaluation -- 3 Results and Discussion -- 4 Conclusions -- References -- Localizing Worst-Parent Rank Attack Using Intelligent Edges of Smart Buildings -- 1 Introduction -- 1.1 Background -- 1.2 Related Work -- 2 System Description -- 3 Worst-Parent Attack -- 4 Simulation of Worst-Parent Attack -- 5 Results and Discussion -- 5.1 Preprocessing and Machine Learning -- 5.2 Results -- 5.3 Discussion -- 6 Conclusions -- References -- Towards a Fog Based Computing Conceptual Framework for Biometric Digital Identification Systems -- 1 Introduction -- 1.1 Motivation -- 1.2 Background of the Problem -- 1.3 Statement of Background of the Problem -- 2 Related Works -- 3 Current State of Research -- 4 A Conceptual Framework for IOT and Data Cloud Biometric Digital Identities -- 5 Evaluation of the Conceptual Framework -- 5.1 Results -- 6 Conclusion and Future Work -- References -- Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach -- 1 Introduction -- 2 Case Study -- 2.1 Dataset Description -- 3 Classifier Approach to Detect DoS Attacks -- 3.1 Classifier Approach.
,
3.2 Methods -- 3.3 Experiments Setup -- 3.4 Preprocessing -- 3.5 Results -- 4 Conclusions and Futures Works -- References -- Fuzzy Logic System for Risk and Energy Efficiency Estimation of Driving Maneuvers -- 1 Introduction -- 2 Road and Vehicle Dynamics -- 3 Risky Maneuvers Identification by a Fuzzy Mamdani System -- 3.1 Variables of the Fuzzy Inference System -- 3.2 Mamdani-Type Fuzzy Identification System -- 4 Results and Discussion -- 5 Conclusions and Future Work -- References -- Machine Learning Ensemble Methods for Optical Network Traffic Prediction -- 1 Introduction -- 2 Datasets -- 3 Network Model and Machine Learning Approach -- 4 Numerical Results -- 5 Conclusions -- References -- Assessing the Impact of Batch-Based Data Aggregation Techniques for Feature Engineering on Machine Learning-Based Network IDSs -- 1 Introduction -- 2 Dataset and Methods -- 2.1 UGR'16 Dataset -- 2.2 Methods -- 3 Experimental Design -- 4 Results and Discussion -- 5 Conclusions and Future Work -- References -- Gait-Based Authentication Using a RGB Camera -- 1 Introduction -- 2 Materials and Methods -- 2.1 OpenPose -- 2.2 Dataset -- 2.3 Data Labeling -- 2.4 Model Fitting -- 2.5 Methods of Evaluation -- 3 Results -- 4 Discussion -- 5 Conclusions -- References -- The Neverending Story: Memory Corruption 30 Years Later -- 1 Introduction -- 2 Background -- 3 Memory Error Detection -- 3.1 Static Analysis -- 3.2 Instrumentation and Runtime Monitoring -- 3.3 Fuzzing -- 3.4 Symbolic Execution -- 4 Memory Corruption Exploitation -- 4.1 Code-Reuse Attacks -- 4.2 Data-Only Attacks -- 5 Defense Strategies -- 5.1 Enhanced Software Diversity -- 5.2 Control-Flow Integrity -- 5.3 Data-Flow Integrity -- 5.4 Software Fault Isolation -- 6 Related Work -- 7 Conclusion -- References.
,
StegoPass - Utilization of Steganography to Produce a Novel Unbreakable Biometric Based Password Authentication Scheme -- 1 Introduction -- 2 Methodology -- 3 Experimental Results -- 4 Conclusion and Future Work -- References -- A Repeated Mistake is a Choice: Considering Security Issues and Risks in Quantum Computing from Scratch -- 1 Introduction -- 2 Quantum Programming Languages (QPL) -- 2.1 Imperative Languages -- 3 Limitations of the Hardware -- 4 Analysis for Security in Quantum Languages -- 4.1 Analysis of the Base Language -- 4.2 Analysis of Errors in the Definition of Circuits -- 4.3 Dynamic Analysis of the Program -- 4.4 Work of Mention -- 5 Conclusions -- References -- Advanced 3D Visualization of Android Malware Families -- 1 Introduction -- 2 HUEPs -- 3 Experimental Study -- 3.1 Android Malware Genome Dataset -- 3.2 Obtained HUEP Visualizations -- 4 Conclusions and Future Work -- References -- SPECIAL SESSION: Building Trust in Ecosystems and Ecosystem Components -- BIECO Runtime Auditing Framework -- 1 Introduction -- 2 Related Work -- 3 Conceptual Idea -- 4 BIECO Auditing Process -- 5 Runtime Auditing Framework -- 5.1 Predictive Simulation -- 5.2 Runtime Monitoring -- 6 Conclusions and Future Work -- References -- Basic Aspects in Redundancy-Based Intrusion Tolerance -- 1 Introduction and Related Work -- 2 Overview of Redundancy-Based Intrusion Tolerance -- 3 Cyber Attack Model -- 4 Categories of System Components Targeted by Attacks -- 5 System Model and Failure Assumptions -- 6 Type of Redundancy -- 7 Final Considerations and Next Steps -- References -- A Survey on the State of the Art of Vulnerability Assessment Techniques -- 1 Introduction -- 2 Vulnerability Detection Techniques -- 2.1 Anomaly Detection-Based Techniques -- 2.2 Vulnerable Code Pattern Recognition -- 2.3 Vulnerability Prediction Models.
,
3 Vulnerability Exploitability Forecasting Techniques -- 4 Vulnerability Propagation Models -- 5 Conclusions -- References -- Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture -- 1 Introduction -- 1.1 Related Work -- 2 Context of the Work -- 2.1 Functional Requirements for the Communication Channel -- 2.2 Non-functional Requirements for the Communication Channel -- 3 Architecture of the Communication Channel -- 4 Architecture Validation -- 5 Conclusions -- References -- A Comparative Study of the Most Important Methods for Forecasting the ICT Systems Vulnerabilities -- 1 Introduction -- 2 Methods of Forecasting the ICT Systems Vulnerabilities -- 2.1 Time Series Forecasting Based Models -- 2.2 Artificial Intelligence-Based Models -- 2.3 ICT Vulnerabilities Forecasting -- 3 Conclusions -- References -- Comparison of Safety and Security Analysis Techniques -- 1 Introduction -- 2 Background -- 3 State-of-the-Art -- 3.1 CHASSIS -- 3.2 FMEVA -- 3.3 SAHARA -- 3.4 STPA-Sec -- 4 Applying Safety and Security Analysis Methods on Collaborating Systems -- 4.1 Use Case Definition -- 5 Conclusions and Future Work -- References -- General Track -- A Simple User Guide for Erasmus+ Teaching and Training. The Case of the University of Catania -- 1 Introduction, Approaches, Methodologies and Dataset of the REALISE Project -- 2 Results: The Case Study of the University of Catania -- 3 Conclusions -- References -- Virtual Implementation of Practical Control Subjects as an Alternative to Face-to-Face Laboratory Lessons -- 1 Introduction -- 2 Background -- 3 Case Study -- 3.1 Tank-Level Plant -- 3.2 Control System -- 4 Integration Approach -- 4.1 Virtual Plant with Factory I/O -- 4.2 Interface and Control with Node-RED -- 5 Implemented Solution -- 5.1 Communicating Applications over Modbus TCP -- 5.2 PID Control with Node-RED.
,
5.3 Visualization, Analysis and Results.
Permalink