25,507 research outputs found
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection
The advance of smartphones and cellular networks boosts the need of mobile
advertising and targeted marketing. However, it also triggers the unseen
security threats. We found that the phone scams with fake calling numbers of
very short lifetime are increasingly popular and have been used to trick the
users. The harm is worldwide. On the other hand, deceptive advertising
(deceptive ads), the fake ads that tricks users to install unnecessary apps via
either alluring or daunting texts and pictures, is an emerging threat that
seriously harms the reputation of the advertiser. To counter against these two
new threats, the conventional blacklist (or whitelist) approach and the machine
learning approach with predefined features have been proven useless.
Nevertheless, due to the success of deep learning in developing the highly
intelligent program, our system can efficiently and effectively detect phone
scams and deceptive ads by taking advantage of our unified framework on deep
neural network (DNN) and convolutional neural network (CNN). The proposed
system has been deployed for operational use and the experimental results
proved the effectiveness of our proposed system. Furthermore, we keep our
research results and release experiment material on
http://DeceptiveAds.TWMAN.ORG and http://PhoneScams.TWMAN.ORG if there is any
update.Comment: 6 pages, TAAI 2017 versio
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
Security of computers and the networks that connect them is increasingly
becoming of great significance. Computer security is defined as the protection
of computing systems against threats to confidentiality, integrity, and
availability. There are two types of intruders: the external intruders who are
unauthorized users of the machines they attack, and internal intruders, who
have permission to access the system with some restrictions. Due to the fact
that it is more and more improbable to a system administrator to recognize and
manually intervene to stop an attack, there is an increasing recognition that
ID systems should have a lot to earn on following its basic principles on the
behavior of complex natural systems, namely in what refers to
self-organization, allowing for a real distributed and collective perception of
this phenomena. With that aim in mind, the present work presents a
self-organized ant colony based intrusion detection system (ANTIDS) to detect
intrusions in a network infrastructure. The performance is compared among
conventional soft computing paradigms like Decision Trees, Support Vector
Machines and Linear Genetic Programming to model fast, online and efficient
intrusion detection systems.Comment: 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special
track at WSTST 2005, Muroran, JAPA
Recommended from our members
Application of Advanced Early Warning Systems with Adaptive Protection
This project developed and field-tested two methods of Adaptive Protection systems utilizing synchrophasor data. One method detects conditions of system stress that can lead to unintended relay operation, and initiates a supervisory signal to modify relay response in real time to avoid false trips. The second method detects the possibility of false trips of impedance relays as stable system swings “encroach” on the relays’ impedance zones, and produces an early warning so that relay engineers can re-evaluate relay settings. In addition, real-time synchrophasor data produced by this project was used to develop advanced visualization techniques for display of synchrophasor data to utility operators and engineers
Efficient Database Generation for Data-driven Security Assessment of Power Systems
Power system security assessment methods require large datasets of operating
points to train or test their performance. As historical data often contain
limited number of abnormal situations, simulation data are necessary to
accurately determine the security boundary. Generating such a database is an
extremely demanding task, which becomes intractable even for small system
sizes. This paper proposes a modular and highly scalable algorithm for
computationally efficient database generation. Using convex relaxation
techniques and complex network theory, we discard large infeasible regions and
drastically reduce the search space. We explore the remaining space by a highly
parallelizable algorithm and substantially decrease computation time. Our
method accommodates numerous definitions of power system security. Here we
focus on the combination of N-k security and small-signal stability.
Demonstrating our algorithm on IEEE 14-bus and NESTA 162-bus systems, we show
how it outperforms existing approaches requiring less than 10% of the time
other methods require.Comment: Database publicly available at:
https://github.com/johnnyDEDK/OPs_Nesta162Bus - Paper accepted for
publication at IEEE Transactions on Power System
- …