60,765 research outputs found

    The Wyner Variational Autoencoder for Unsupervised Multi-Layer Wireless Fingerprinting

    Full text link
    Wireless fingerprinting refers to a device identification method leveraging hardware imperfections and wireless channel variations as signatures. Beyond physical layer characteristics, recent studies demonstrated that user behaviours could be identified through network traffic, e.g., packet length, without decryption of the payload. Inspired by these results, we propose a multi-layer fingerprinting framework that jointly considers the multi-layer signatures for improved identification performance. In contrast to previous works, by leveraging the recent multi-view machine learning paradigm, i.e., data with multiple forms, our method can cluster the device information shared among the multi-layer features without supervision. Our information-theoretic approach can be extended to supervised and semi-supervised settings with straightforward derivations. In solving the formulated problem, we obtain a tight surrogate bound using variational inference for efficient optimization. In extracting the shared device information, we develop an algorithm based on the Wyner common information method, enjoying reduced computation complexity as compared to existing approaches. The algorithm can be applied to data distributions belonging to the exponential family class. Empirically, we evaluate the algorithm in a synthetic dataset with real-world video traffic and simulated physical layer characteristics. Our empirical results show that the proposed method outperforms the state-of-the-art baselines in both supervised and unsupervised settings

    Factors of Employee’s E-Learning Effectiveness: A Multi-Level Study Based on Socio-Technical Systems Theory

    Get PDF
    Application of e-learning in enterprises provides the advantages of lower training cost, richer learning content, higher information consistency, and easier update of content. Despite the fact that enterprises have the intention to introduce e-learning, there is not a complete framework to which they can refer to ensure the benefits of e-learning for employee training or learning and understand which important factors affect employee’s e-learning effectiveness. Relative to the difficulties of introducing e-learning in management practice, the academic achievements in this aspect also seem very limited. Most the existing papers are focused on discussion and survey of e-learning in school, and very few of them are dedicated to empirical research of e-learning in corporate environment. Besides, these studies discuss e-learning only at the technical or the individual level without a comprehensive investigation into the factors affecting e-learning effectiveness with multi-level theoretic framework. This paper applies the socio-technical systems theory to review and integrate theories about employee e-learning from a macro view. To make up the insufficiency of related research, literature review and case research are conducted first. Based on the interview results, an analysis model is constructed to thoroughly explore factors affecting employee’s e-learning effectiveness. Later, through a questionnaire survey on employees’ adoption of e-learning and subsequent multi-level data analysis, hypotheses on the relationship of the influencing factors and the research model are verified. Results show that e-learning effectiveness (usefulness of e-learning, continuance intention to use, and e-learning performance) is simultaneously or alternately affected by direct or moderating factors of the technical system and the social system at the work environment level and the individual level. Compared with the existing research, this paper uses a more comprehensive system view to construct the theoretical model and empirically verify it. The results can be a reference for future researchers and managers of e-learning in enterprises

    Game Theory Meets Network Security: A Tutorial at ACM CCS

    Full text link
    The increasingly pervasive connectivity of today's information systems brings up new challenges to security. Traditional security has accomplished a long way toward protecting well-defined goals such as confidentiality, integrity, availability, and authenticity. However, with the growing sophistication of the attacks and the complexity of the system, the protection using traditional methods could be cost-prohibitive. A new perspective and a new theoretical foundation are needed to understand security from a strategic and decision-making perspective. Game theory provides a natural framework to capture the adversarial and defensive interactions between an attacker and a defender. It provides a quantitative assessment of security, prediction of security outcomes, and a mechanism design tool that can enable security-by-design and reverse the attacker's advantage. This tutorial provides an overview of diverse methodologies from game theory that includes games of incomplete information, dynamic games, mechanism design theory to offer a modern theoretic underpinning of a science of cybersecurity. The tutorial will also discuss open problems and research challenges that the CCS community can address and contribute with an objective to build a multidisciplinary bridge between cybersecurity, economics, game and decision theory

    Communication Theoretic Data Analytics

    Full text link
    Widespread use of the Internet and social networks invokes the generation of big data, which is proving to be useful in a number of applications. To deal with explosively growing amounts of data, data analytics has emerged as a critical technology related to computing, signal processing, and information networking. In this paper, a formalism is considered in which data is modeled as a generalized social network and communication theory and information theory are thereby extended to data analytics. First, the creation of an equalizer to optimize information transfer between two data variables is considered, and financial data is used to demonstrate the advantages. Then, an information coupling approach based on information geometry is applied for dimensionality reduction, with a pattern recognition example to illustrate the effectiveness. These initial trials suggest the potential of communication theoretic data analytics for a wide range of applications.Comment: Published in IEEE Journal on Selected Areas in Communications, Jan. 201

    Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

    Full text link
    The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system. This chapter provides a layered perspective of the smart grid security and discusses game and decision theory as a tool to model the interactions among system components and the interaction between attackers and the system. We discuss game-theoretic applications and challenges in the design of cross-layer robust and resilient controller, secure network routing protocol at the data communication and networking layers, and the challenges of the information security at the management layer of the grid. The chapter will discuss the future directions of using game-theoretic tools in addressing multi-layer security issues in the smart grid.Comment: 16 page
    • …
    corecore