1,347 research outputs found

    Generic Taxonomy of Social Engineering Attack

    Get PDF
    Social engineering is a type of attack that allows unauthorized access to a system to achieve specific objective. Commonly, the purpose is to obtain information for social engineers. Some successful social engineering attacks get victims’ information via human based retrieval approach, example technique terms as dumpster diving or shoulder surfing attack to get access to password. Alternatively, victims’ information also can be stolen using technical-based method such as from pop-up windows, email or web sites to get the password or other sensitive information. This research performed a preliminary analysis on social engineering attack taxonomy that emphasized on types of technical-based social engineering attack. Results from the analysis become a guideline in proposing a new generic taxonomy of Social Engineering Attack (SEA)

    Lidar signal simulation for the evaluation of aerosols in chemistry transport models

    Get PDF
    International audienceWe present an adaptable tool, the OPTSIM (OPTical properties SIMulation) software, for the simulation of optical properties and lidar attenuated backscattered profiles (beta') from aerosol concentrations calculated by chemistry transport models (CTM). It was developed to model both Level 1 observations and Level 2 aerosol lidar retrievals in order to compare model results to measurements: the level 2 enables to estimate the main properties of aerosols plume structures, but may be limited due to specific assumptions. The level 1, originally developed for this tool, gives access to more information about aerosols properties (beta') requiring, at the same time, less hypothesis on aerosols types. In addition to an evaluation of the aerosol loading and optical properties, active remote sensing allows the analysis of aerosols' vertical structures. An academic case study for two different species (black carbon and dust) is presented and shows the consistency of the simulator. Illustrations are then given through the analysis of dust events in the Mediterranean region during the summer 2007. These are based on simulations by the CHIMERE regional CTM and observations from the CALIOP space-based lidar, and highlight the potential of this approach to evaluate the concentration, size and vertical structure of the aerosol plumes

    Class movement and re-location: An empirical study of Java inheritance evolution

    Get PDF
    This is the post-print version of the final paper published in Journal of Systems and Software. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. Copyright @ 2009 Elsevier B.V.Inheritance is a fundamental feature of the Object-Oriented (OO) paradigm. It is used to promote extensibility and reuse in OO systems. Understanding how systems evolve, and specifically, trends in the movement and re-location of classes in OO hierarchies can help us understand and predict future maintenance effort. In this paper, we explore how and where new classes were added as well as where existing classes were deleted or moved across inheritance hierarchies from multiple versions of four Java systems. We observed first, that in one of the studied systems the same set of classes was continuously moved across the inheritance hierarchy. Second, in the same system, the most frequent changes were restricted to just one sub-part of the overall system. Third, that a maximum of three levels may be a threshold when using inheritance in a system; beyond this level very little activity was observed, supporting earlier theories that, beyond three levels, complexity becomes overwhelming. We also found evidence of ‘collapsing’ hierarchies to bring classes up to shallower levels. Finally, we found that larger classes and highly coupled classes were more frequently moved than smaller and less coupled classes. Statistical evidence supported the view that larger classes and highly coupled classes were less cohesive than smaller classes and lowly coupled classes and were thus more suitable candidates for being moved (within an hierarchy)

    Data-driven Synset Induction and Disambiguation for Wordnet Development

    Get PDF
    International audienceAutomatic methods for wordnet development in languages other than English generally exploit information found in Princeton WordNet (PWN) and translations extracted from parallel corpora. A common approach consists in preserving the structure of PWN and transferring its content in new languages using alignments, possibly combined with information extracted from multilingual semantic resources. Even if the role of PWN remains central in this process, these automatic methods offer an alternative to the manual elaboration of new wordnets. However, their limited coverage has a strong impact on that of the resulting resources. Following this line of research, we apply a cross-lingual word sense disambiguation method to wordnet development. Our approach exploits the output of a data-driven sense induction method that generates sense clusters in new languages, similar to wordnet synsets, by identifying word senses and relations in parallel corpora. We apply our cross-lingual word sense disambiguation method to the task of enriching a French wordnet resource, the WOLF, and show how it can be efficiently used for increasing its coverage. Although our experiments involve the English-French language pair, the proposed methodology is general enough to be applied to the development of wordnet resources in other languages for which parallel corpora are available. Finally, we show how the disambiguation output can serve to reduce the granularity of new wordnets and the degree of polysemy present in PWN

    Scams africains: entre jeu affectif et argumentation

    Get PDF
    Le scam africain est une fraude Ă©galement connue sous le nom de scam 419. TrĂšs frĂ©quente actuellement, elle se diffuse majoritairement par courriel et se prĂ©sente sous la forme d’une lettre personnelle dans laquelle une personne prĂ©tend avoir accĂšs Ă  une grosse somme d’argent. Elle sollicite alors un internaute inconnu afin de la sortir du pays pour se la rĂ©approprier ensuite. En compensation de l’aide de ce complice, le scammeur lui promet un pourcentage de la somme. Cette fraude impliquant de gros montant, fait des victimes de par le monde. Son Ă©noncĂ©, souvent dĂ©noncĂ© voire moquĂ© sur les forums, contient de nombreuses inexactitudes mais Ă©galement des appels aux affects et des procĂ©dĂ©s rationnalisateurs permettant de piĂ©ger des internautes, soit dĂ©sespĂ©rĂ©s sur le plan financier, soit pensant pouvoir prendre les fraudeurs Ă  leur propre piĂšge. Cet article se propose d’analyser ces procĂ©dĂ©s afin de mieux comprendre comment l’adhĂ©sion Ă  ce type de message peut se construire. Un jeu de volontĂ© liĂ© au croire va ainsi se dĂ©voiler et expliquer les mĂ©canismes communicationnels et cognitifs s’enclenchant lors de la lecture du scam chez la victime potentielle. Le scam devient ainsi un exemple concret et plus complexe qu’il n’y paraĂźt pour illustrer les processus amenant Ă  la co-construction de la croyance dans un Ă©noncĂ© diffusĂ© par les nouvelles technologies de l’information et de la communication.Le scam africain est une fraude Ă©galement connue sous le nom de scam 419. TrĂšs frĂ©quente actuellement, elle se diffuse majoritairement par courriel et se prĂ©sente sous la forme d’une lettre personnelle dans laquelle une personne prĂ©tend avoir accĂšs Ă  une grosse somme d’argent. Elle sollicite alors un internaute inconnu afin de la sortir du pays pour se la rĂ©approprier ensuite. En compensation de l’aide de ce complice, le scammeur lui promet un pourcentage de la somme. Cette fraude impliquant de gros montant, fait des victimes de par le monde. Son Ă©noncĂ©, souvent dĂ©noncĂ© voire moquĂ© sur les forums, contient de nombreuses inexactitudes mais Ă©galement des appels aux affects et des procĂ©dĂ©s rationnalisateurs permettant de piĂ©ger des internautes, soit dĂ©sespĂ©rĂ©s sur le plan financier, soit pensant pouvoir prendre les fraudeurs Ă  leur propre piĂšge. Cet article se propose d’analyser ces procĂ©dĂ©s afin de mieux comprendre comment l’adhĂ©sion Ă  ce type de message peut se construire. Un jeu de volontĂ© liĂ© au croire va ainsi se dĂ©voiler et expliquer les mĂ©canismes communicationnels et cognitifs s’enclenchant lors de la lecture du scam chez la victime potentielle. Le scam devient ainsi un exemple concret et plus complexe qu’il n’y paraĂźt pour illustrer les processus amenant Ă  la co-construction de la croyance dans un Ă©noncĂ© diffusĂ© par les nouvelles technologies de l’information et de la communication

    The Montclarion, December 03, 2015

    Get PDF
    Student Newspaper of Montclair State Universityhttps://digitalcommons.montclair.edu/montclarion/2061/thumbnail.jp

    Project-Team RMoD 2013 Activity Report

    Get PDF
    Activity Report 2013 Project-Team RMOD Analyses and Languages Constructs for Object-Oriented Application Evolutio

    Angels and monsters: An empirical investigation of potential test effectiveness and efficiency improvement from strongly subsuming higher order mutation

    Get PDF
    We study the simultaneous test effectiveness and efficiency improvement achievable by Strongly Subsuming Higher Order Mutants (SSHOMs), constructed from 15,792 first order mutants in four Java programs. Using SSHOMs in place of the first order mutants they subsume yielded a 35%-45% reduction in the number of mutants required, while simultaneously improving test efficiency by 15% and effectiveness by between 5.6% and 12%. Trivial first order faults often combine to form exceptionally non-trivial higher order faults; apparently innocuous angels can combine to breed monsters. Nevertheless, these same monsters can be recruited to improve automated test effectiveness and efficiency
    • 

    corecore