WhatsApp, a leading platform for mobile messaging, withthe largest user base being in India, incorporates features like Last Seen, Live Location, and sharing defaults which pose privacy challenges. Our study evaluate...
详细信息
security is an important aspect and continues becoming a challenging topic especially in a web application. Today, 78,9% of websites uses PHP as programming languages. As a popular language, WebApps written in PHP ten...
详细信息
ISBN:
(纸本)9781538672594
security is an important aspect and continues becoming a challenging topic especially in a web application. Today, 78,9% of websites uses PHP as programming languages. As a popular language, WebApps written in PHP tend to have many vulnerabilities and they are reflected from their source codes. Static analysis is a method that can be used to perform vulnerability detection in source codes. However, it usually requires an additional method that involves an expert knowledge. In this paper, we propose a vulnerability detection technique using lexical analysis with machine learning as a classification method. In this work, we focused on using PHP native token and Abstract Syntax Tree (AST) as features then manipulate them to get the best feature. We pruned the AST to dump some unusable nodes or subtrees and then extracted the node type token with Breadth First Search (BFS) algorithm. Moreover, unusable PHP token are filtered and also combined each other token to enrich the features extracted using TF-IDF. these features are used for classification in machine learning to find the best features between AST token and PHP token. the classification methods that we used were Gaussian Naive Bayes (GNB), Support Vector Machine (SVM) and Decision Tree. As the result, we were able to get highest recall score at 92% with PHP token as features and Gaussian Na ve Bayes as machine learning classification method.
the prevailing development in energy grids and emersion of new energy players along withthe advent of the Internet of things (IoT) lead available energy systems (e.g., smart electricity grid) toward “energy internet...
详细信息
ISBN:
(数字)9781728153506
ISBN:
(纸本)9781728153513
the prevailing development in energy grids and emersion of new energy players along withthe advent of the Internet of things (IoT) lead available energy systems (e.g., smart electricity grid) toward “energy internet” concept. the expansion of an electrical power grid, because of its unique features, has caused this system to be converted to the central core of the energy ecosystem over the past decades. this process has also been preserved in the IoT in such a way that the presence of this technology increases the ability of evolutionary development in the power industry. IoT applications in smart grid (IoT-SG) have lots of advantages such as expenditure reduction, save of time, and smartness of grid equipment. Nevertheless, the disadvantages pertaining to IoT-SG should not be neglected. For instance, one of the most significant drawbacks and ahead challenges of IoT-SG is security and big data issues. In IoT-SG, each connected device can be a probable port to the IoT's infrastructure with personal data. Concerns about security and dataprivacy are indispensable, but withthe entrance of complexity, safety weaknesses, and probable vulnerabilities, in cases such as interoperability and autonomous decision-making, possible risks of IoT have reached new levels. this paper mostly focuses on the IoT-SG investigations, advantages and ahead challenges, plus effective solutions to these challenges are being discussed. Furthermore, according to some key challenges such as safety and big data, general conclusions for confronting and dealing withthese challenges have been made.
the following topics are dealt with: mobile computing; Android (operating system); smart phones; program testing; dataprivacy; security of data; learning (artificial intelligence); program debugging; user interfaces;...
详细信息
ISBN:
(纸本)9781538661703
the following topics are dealt with: mobile computing; Android (operating system); smart phones; program testing; dataprivacy; security of data; learning (artificial intelligence); program debugging; user interfaces; program diagnostics.
the proceedings contain 22 papers. the special focus in this conference is on Service-Oriented and Cloud Computing. the topics include: Consumer-driven API testing with performance contracts;patterns for workflow engi...
ISBN:
(纸本)9783319721248
the proceedings contain 22 papers. the special focus in this conference is on Service-Oriented and Cloud Computing. the topics include: Consumer-driven API testing with performance contracts;patterns for workflow engine benchmarking;Patterns in HCI – a discussion of lessons learned;interactive dashboard for workflow engine benchmarks;a distributed cross-layer monitoring system based on QoS metrics models;continuous, trustless, and fair: Changing priorities in services computing;data integration and quality requirements in emergency services;challanges in services research: A software architecture perspective;towards a unified management of applications on heterogeneous clouds;re-powering service provisioning in federated cloud ecosystems: An algorithm combining energy sustainability and cost-saving strategies;deadlock analysis of service-oriented systems with recursion and concurrency;prediction of quality of service of software applications;impact-minimizing runtime adaptation in cloud-based data stream processing;A motivating case study for coordinating deployment of security VNF in federated cloud networks;the big bucket: An IoT cloud solution for smart waste management in smart cities;towards distributed and context-aware human-centric cyber-physical systems;application development and deployment for IoT devices;cloud migration architecture and pricing – Mapping a licensing business model for software vendors to a SaaS business model;A DMN-based approach for dynamic deployment modelling of cloud applications;cloud migration methodologies: Preliminary findings.
Much of the research that our community publishes is based on data. However, an open question remains: are the results of data science trustworthy, and how can we increase our trust in data science? Accomplishing this...
详细信息
ISBN:
(纸本)9781450345231
Much of the research that our community publishes is based on data. However, an open question remains: are the results of data science trustworthy, and how can we increase our trust in data science? Accomplishing this goal is difficult, as we must trust the inputs, systems, and results of data science. this panel will discuss the current state of trustworthy data science, and explore possible technical, legal, and cultural solutions that can increase our trust in the input, systems, and results of data science.
the proceedings contain 11 papers. the topics discussed include: to cheat or not to cheat - a game-theoretic analysis of outsourced computation verification;reconciling security and functional requirements in multi-te...
ISBN:
(纸本)9781450349703
the proceedings contain 11 papers. the topics discussed include: to cheat or not to cheat - a game-theoretic analysis of outsourced computation verification;reconciling security and functional requirements in multi-tenant clouds;cloud storage file recoverability;a secure algorithm for outsourcing matrix multiplication computation in the cloud;efficient key-rotatable and security-updatable homomorphic encryption;security of Okamoto identification scheme - a defense against ephemeral key leakage and setup;enabling privacy-assured mobile advertisement targeting and dissemination;privacy-preserving hybrid recommender system;efficient implementation of a proxy-based protocol for data sharing on the cloud;secure dot product of outsourced encrypted vectors and its application to SVM;and a privacy-preserving and vessel authentication scheme using automatic identification system.
the HPC Architecture for Cyber Situational Awareness (HACSAW) was established by the Department of Defense (DoD) High Performance Computing Modernization Program (HPCMP) to combine a rich computational environment wit...
详细信息
ISBN:
(纸本)9781450364553
the HPC Architecture for Cyber Situational Awareness (HACSAW) was established by the Department of Defense (DoD) High Performance Computing Modernization Program (HPCMP) to combine a rich computational environment with operationally relevant data to perform cutting-edge cybersecurity research that will increase HPCMP’s current and predictive understanding of cyberspace on the Defense Research and Engineering Network (DREN). the data repository created by this unique environment includes the collection of unclassified data sources from the edge of the network (i.e., Internet Access Points) down to the host-level, across more than one hundred (100) different DoD enclaves. through the application of high performance computing (HPC) resources, HACSAW explores novel and innovative analytical capabilities based on a comprehensive cybersecuritydataset. the integration of HPC within the cyber work-flow provides an opportunity for fusion and assessments of disparate data streams and real-time analysis using data science algorithms and machine learning (both structured and unstructured data). Our approach is designed to ultimately leverage HPC resources to significantly reduce the time to respond to changes in the cyber environment from days to minutes. Understanding the operational status of information systems, the missions (friendly and adversary) being pursued, and the threats and vulnerabilities that impact them is essential for effective mission accomplishment. this understanding is referred to as Cyberspace Situational Awareness (Cyber SA). Today’s decision makers require meaningful Cyber SA to safeguard sensitive data, sustain fundamental operations, and protect national infrastructure [2]. the need and responsibility of Cyber SA spans multiple organizations within the DoD, across the entire government and in the private sector. the lack of relevant and recent real-world network enterprise data has hampered many cybersecurity research efforts to develop and validate
the proceedings contain 56 papers. the special focus in this conference is on Man-Machine Interactions. the topics include: Deep learning with dense random neural networks;a perceptually inspired method for enhancing ...
ISBN:
(纸本)9783319677910
the proceedings contain 56 papers. the special focus in this conference is on Man-Machine Interactions. the topics include: Deep learning with dense random neural networks;a perceptually inspired method for enhancing contrast in uneven lighting images.;advances in hand-eye robot interactions;human perception of the pattern strength measure;typing braille code in the air withthe leap motion controller;touchless virtual keyboard controlled by eye blinking and EEG signals;an alternative virtual keyboard for blind people;how increasing machine agency affects human agency;eye movement traits in differentiating experts and laymen;mobile application using embedded sensors as a three dimensional motion registration method;virtual reality application to study the visual influences on human balance;improvements in DNA reads correction;semantic-based clustering of gene ontology terms on the biotest platform;comparative analysis of MicroRNA-target gene interaction prediction algorithms based on integrated P-value calculation;searching through scientific PDF files supported by bi-clustering of key terms matrices.;searching for cancer signatures using data mining techniques;consensus approach for detection of cancer somatic mutations;cancer clonal evolution simulation program;image denoising using backward stochastic differential equations;gabor filters generalization based on ateb-functions for information security;hierarchical agglomerative clustering of time-warped series;averaging of nonlinearly aligned evoked potentials in impulsive noise environment;linguistically described covariance matrix estimation;DBpedia and YAGO as knowledge base for natural language based question answering - the evaluation and expressing the notion of a mathematical structure in the formal language of mizar.
Life Cycle Assessment(LCA) is crucial for evaluating the ecological sustainability of a product or service, and the accurate evaluation of sustainability requires detailed and transparent information about industrial ...
详细信息
ISBN:
(纸本)9781450345231
Life Cycle Assessment(LCA) is crucial for evaluating the ecological sustainability of a product or service, and the accurate evaluation of sustainability requires detailed and transparent information about industrial activities. However, such information is usually considered confidential and withheld from the public. In this paper, we present a study of privacy in the context of LCA. the main goal is to explore the privacy challenges in sustainability assessment considering the protection of trade secrets while increasing transparency of industrial activities. To overcome privacy concerns, we apply differential privacy to LCA computations considering the idiosyncratic features of LCA data. Our assessments on a specific real-life example show that it is possible to achieve privacy-preserving LCA computations without losing the utility of data completely.
暂无评论