Advanced Persistent Threat (APT) is one of the cyber threats that continuously attack specific targets exfiltrate information or destroy the system [1]. Because the attackers use various tools and methods according to...
详细信息
ISBN:
(纸本)9781728151656
Advanced Persistent Threat (APT) is one of the cyber threats that continuously attack specific targets exfiltrate information or destroy the system [1]. Because the attackers use various tools and methods according to the target, it is difficult to describe APT attack in a single pattern. Therefore, APT attacks are difficult to defend against with general countermeasures. In these days, systems consist of various components and related stakeholders, which makes it difficult to consider all the security concerns. In this paper, we propose an ontology knowledge base and its design process to recommend security requirements based on APT attack cases and system domain knowledge. The proposed knowledge base is divided into three parts;APT ontology, general security knowledge ontology, and domain-specific knowledge ontology. Each ontology can help to understand the security concerns in their knowledge. While integrating three ontologies into the problem domain ontology, the appropriate security requirements can be derived with the security requirements recommendation process. The proposed knowledge base and process can help to derive the security requirements while considering both real attacks and systems.
We develop a novel framework, named as iota-injection, to address the sparsity problem of recommender systems. By carefully injecting low values to a selected set of unrated user-item pairs in a user-item matrix, we d...
详细信息
We develop a novel framework, named as iota-injection, to address the sparsity problem of recommender systems. By carefully injecting low values to a selected set of unrated user-item pairs in a user-item matrix, we demonstrate that top-N recommendation accuracies of various collaborative filtering (CF) techniques can be significantly and consistently improved. We first adopt the notion of pre-use preferences of users toward a vast amount of unrated items. Using this notion, we identify uninteresting items that have not been rated yet but are likely to receive low ratings from users, and selectively impute them as low values. As our proposed approach is method-agnostic, it can be easily applied to a variety of CF algorithms. Through comprehensive experiments with three real-life datasets (e.g., Movielens, Ciao, and Watcha), we demonstrate that our solution consistently and universally enhances the accuracies of existing CF algorithms (e.g., item-based CF, SVD-based CF, and SVD++) by 2.5 to 5 times on average. Furthermore, our solution improves the running time of those CF methods by 1.2 to 2.3 times when its setting produces the best accuracy.
Diversity in the exhibited behavior of a given system is a desirable characteristic in a variety of application contexts. Synthesis of conformant implementations often proceeds by discovering witnessing Skolem functio...
详细信息
ISBN:
(数字)9781450367684
ISBN:
(纸本)9781728172811
Diversity in the exhibited behavior of a given system is a desirable characteristic in a variety of application contexts. Synthesis of conformant implementations often proceeds by discovering witnessing Skolem functions, which are traditionally deterministic. In this paper, we present a novel Skolem extraction algorithm to enable synthesis of witnesses with random behavior and demonstrate its applicability in the context of reactive systems. The synthesized solutions are guaranteed by design to meet the given specification, while exhibiting a high degree of diversity in their responses to external stimuli. Case studies demonstrate how our proposed framework unveils a novel application of synthesis in model-based fuzz testing to generate fuzzers of competitive performance to general-purpose alternatives, as well as the practical utility of synthesized controllers in robot motion planning problems.
The teaching method is the unity of the teaching method and the learning method. In the applied college education, more emphasis is placed on the self-learning method of the students. The most direct way to respect st...
详细信息
Telepathology has enabled the remote cancer diagnosis based on digital pathological whole slide images (WSIs). During the diagnosis, the behavior information of the pathologist can be recorded by the platform and then...
详细信息
Application programming interfaces (APIs) have become ubiquitous in software development. However, external APIs are not guaranteed to contain every desirable feature, nor are they immune to software defects. Therefor...
详细信息
ISBN:
(数字)9781450371216
ISBN:
(纸本)9781728165196
Application programming interfaces (APIs) have become ubiquitous in software development. However, external APIs are not guaranteed to contain every desirable feature, nor are they immune to software defects. Therefore, API users will sometimes be faced with situations where a current API does not satisfy all of their requirements, but migrating to another API is costly. In these cases, due to the lack of communication channels between API developers and users, API users may intentionally bypass an existing API after inquiring into workarounds for their API problems with online communities. This mechanism takes the API developer out of the conversation, potentially leaving API defects unreported and desirable API features undiscovered. In this paper we explore API workaround inquiries from API users on Stack Overflow. We uncover general reasons why API users inquire about API workarounds, and general solutions to API workaround requests. Furthermore, using workaround implementations in Stack Overflow answers, we develop three API workaround implementation patterns. We identify instances of these patterns in real-life open source projects and determine their value for API developers from their responses to feature requests based on the identified API workarounds.
Recently, software-defined satellite has become a research hotspot in the aerospace. based on an advanced computing platform with open system architecture, researchers can upload software for specific tasks even the s...
详细信息
Safety messages dissemination in vehicular networks requires real-time and deterministic medium access. The existing standard, IEEE 802.11p, for vehicular networks is based on Carrier Sense Multiple Access (CSMA) whic...
详细信息
Maternal mortality and childbirth complications are major delivery issues in most developing countries, especially in rural areas. The proper identification of risks associated with the delivery of an expecting woman ...
详细信息
ISBN:
(数字)9781665414609
ISBN:
(纸本)9781665447522
Maternal mortality and childbirth complications are major delivery issues in most developing countries, especially in rural areas. The proper identification of risks associated with the delivery of an expecting woman at an earlier stage can substantially reduce the mortality rate. A few studies have been conducted on using Machine Learning (ML) techniques for predicting birth mode i.e. caesarean section or normal delivery. The most commonly used methods are Decision Tree (DT), K-Nearest Neighbour (KNN), Naive Bayes (NB) and Support Vector Machine (SVM). In this study we have implemented Bagging Ensemble Classifiers based on these traditional machine learning algorithms, which is a novel approach in the area of birth mode prediction. This paper examines the performance of four ML algorithms, with bagging ensemble classifiers (DT-Bagging, KNN-Bagging, NB-Bagging, SVM-Bagging). The result shows that bagging ensemble models outperformed the traditional models in this domain. Besides, we have identified the association between important factors and caesarean section. This study may later be used to create a decision support system by extracting knowledge from the hidden patterns in data to reduce the rate of caesarean delivery in Bangladesh.
The increasing weapon equipments bring forth burdensome test and diagnosis tasks. Some problems that have been emerged in the developing maintenance and support system of multiform weapon equipments have been analyzed...
详细信息
ISBN:
(纸本)9789811065712;9789811065705
The increasing weapon equipments bring forth burdensome test and diagnosis tasks. Some problems that have been emerged in the developing maintenance and support system of multiform weapon equipments have been analyzed, such as the poor generality, the difficulty of sharing knowledge and interchanging information. A method of constructing universal test and diagnosis platform based on the AI-ESTATE standard is proposed in the paper. Aiming this, AI-ESTATE standard provides basic method to facilitate information exchange by defining a set of knowledge and data specification formats using information model, by defining formal services to form interface standards among diagnostic reasoner and other test system components. The system architecture of general test and diagnosis software platform applies the COM component technology to realize the separation of between test and diagnosis based on the principle of generalize and standardize. Then the function, constitution and realization of its general diagnostic softwarebased on AI-ESTATET are researched in this paper. The realization of diagnosis model management services and reasoner manipulation services is described. This platform can test and diagnosis multiform weapon equipments, such as missile equipment, radar equipment and multiform artilleries. Especially, it solves the problem of sharing information and portability of software by information model and service.
暂无评论