An information system is an important part in an organization to support business processes and to achieve its vision and mission. The information system nowadays has been one of the assets that ought to be protected ...
详细信息
Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgen...
详细信息
Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgency to explore a more advanced solution to replace the traditional approach. Silk Test Workbench is a tool for automation testing that can accelerate the functional testing of complex applications. For this research, we proposed automation testing on website applications with various testing scenarios that have been made. The visual test recording method is used for automation testing with Silk Test Workbench. Silk Test Workbench can speed up testing time, make a good test asset testing scenario, make it easier for users to do testing, and speed up the process to get the result in the form of a screen capture of the testing process. A comparison of testing time has been performed. The automatic testing time with the scenarios is 2 hours 46 minutes. The automatic testing time will be 2 hours 36 minutes using the all-in-one scenario. This study also used questionnaires from colleagues in the Quality Assurance field to get maximum User Acceptance Test results.
The increasing data volume given by the exponential growth of digital devices, cloud platforms, and the Internet of Things (IOT) had become an attractive target for attackers. This makes the search for innovative defe...
详细信息
Social media is an online media that functions as a platform for users to participate, share, create, and exchange information through various forums and social networks. The rapid increase in social media activity ca...
详细信息
Social media is an online media that functions as a platform for users to participate, share, create, and exchange information through various forums and social networks. The rapid increase in social media activity causes an increase in the number of comments on social media. This is prone to triggering debate due to the easy formation of open discussions between social media users. However, the debate often triggers the emergence of negative things, causing great fights on social media. Social media users often use comments containing toxic words to argue and corner a party or group. This study conducted an experiment to detect comments containing toxic sentences on social media in Indonesia using a Pre-Trained Model that was trained for Indonesian. This study performed a multilabel classification and evaluated the classification results generated by the Multilingual BERT (MBERT), IndoBERT, and Indo Roberta Small models. The optimal result of this study is to use the IndoBERT model with an F1 Score of 0.8897.
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) at...
详细信息
ISBN:
(数字)9781665464543
ISBN:
(纸本)9781665464550
Access point (AP) security has become increasingly important as wireless local area networks (WLANs) proliferate in industrial environments. Rogue APs are often used by attackers to conduct man-in-the-middle (MiTM) attacks. They can redirect users to malicious servers or do eavesdropping and manipulation of their *** this paper, we propose a novel one-class machine learning model to passively identify rogue APs in industrial environments. The implementation of the model is twofold. First, we passively extract the hardware and software characteristics of the evaluated AP according to its generated messages. This results in a comprehensive feature set that captures both low-level and high-level behaviors of the evaluated ***, we apply a one-class machine learning model to identify APs that significantly deviate from the previously known profile of legitimate APs. The combined evaluation of hardware and software behaviors integrated with an outlier detection scheme to effectively identify rogue APs is the insight of our proposal. We demonstrate the feasibility of our model, achieving an F1 score of 0.89 and a true positive rate of 0.9 in experiments conducted on our new publicly available dataset of 357 unique AP behaviors.
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal...
详细信息
ISBN:
(数字)9798350374889
ISBN:
(纸本)9798350374896
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, challenging their wide deployment. This paper proposes a new feasible palm vein verification scheme using a Deep Autoencoder and a Siamese Network, implemented threefold. First, we capture the individual's palm using a traditional visible spectrum camera sensor and perform preprocessing tasks to correct imprecise positioning, easing palm support accessories requirements. Second, we eliminate NIR sensor requirement by fine-tuning a Deep Autoencoder model to convert images from the visible spectrum to their infrared counterparts. Third, generated images are processed by a lightweight Siamese network using a contrastive loss function for individual verification. Experiments conducted on a publicly available dataset with over a hundred individuals confirmed the feasibility of our proposal. Our scheme reaches up to 0.97 of true-negative rate, with only 0.01 decrease compared to traditional NIR-based approaches. In addition, individual identification can be conducted in less than 6 seconds in a resource-constrained environment thanks to our lightweight model's implementation.
Sign language has importance rule to deal with communication process especially with impairments hearing people. Sign language detection also attract lot of researchers to join the challenge of research to detect and ...
详细信息
Since cloud computing becoming the trend, the way servers being implemented slowly moves to the cloud. Companies did not need to buy a physical server machine to deploy an app. Having a private server on cloud infrast...
详细信息
Since cloud computing becoming the trend, the way servers being implemented slowly moves to the cloud. Companies did not need to buy a physical server machine to deploy an app. Having a private server on cloud infrastructure indeed already reduce some cost for on-premise server maintenance. However, there is still a cost for usage when the server is inactive or having low to no traffic at all. Serverless deployment offer function as a service where application is deployed as a function and cost is billed per function call. This paper proposed a solution where there are two deployment that works in turn between infrastructure as a service and function as a service deployment. This dual deployment offered the system to use the virtual private server or deployed instance on active hours, and switch to serverless functions on inactive hours. Switching to serverless on low traffic hours will cut the usage and cost of the microservice app by the least 25%, while having performance slightly comparable to microservice app deployed to instances.
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually ca...
详细信息
ISBN:
(数字)9798350374889
ISBN:
(纸本)9798350374896
Over the past few years, several highly accurate Machine Learning (ML) techniques have been proposed for Android malware detection. Unfortunately, proposed schemes are rarely used in production, a situation usually caused by their limited generalization capabilities, leading to low accuracies when deployed. This paper proposes a new multi-view Android malware detection model, implemented in two stages. First, we extract multiple feature sets from an analyzed Android application package. The feature sets provide a complementary Android app behavioral vector for the classification task, enhancing the system's generalization. Secondly, we conduct a multi-objective optimization to select the optimal feature subset from each view for subsequent ensemble-based classification. Our proposal's insight is to proactively select each feature subset that simultaneously improves accuracy and reduces processing requirements in a multi-view setting. Experiments on our new dataset, comprising over 40 thousand Android app samples, demonstrated the feasibility of our proposal. Our scheme can improve true-positive rates by an average of 4.4 while demanding only up to 65% of inference processing costs.
A vast number of technologies based on Artificial Intelligence (AI) have proliferated into various application domains. As part of its objectives to develop agents which can behave and think like humans, some branches...
详细信息
暂无评论