7,335 research outputs found
CRUC: Cold-start Recommendations Using Collaborative Filtering in Internet of Things
The Internet of Things (IoT) aims at interconnecting everyday objects
(including both things and users) and then using this connection information to
provide customized user services. However, IoT does not work in its initial
stages without adequate acquisition of user preferences. This is caused by
cold-start problem that is a situation where only few users are interconnected.
To this end, we propose CRUC scheme - Cold-start Recommendations Using
Collaborative Filtering in IoT, involving formulation, filtering and prediction
steps. Extensive experiments over real cases and simulation have been performed
to evaluate the performance of CRUC scheme. Experimental results show that CRUC
efficiently solves the cold-start problem in IoT.Comment: Elsevier ESEP 2011: 9-10 December 2011, Singapore, Elsevier Energy
Procedia, http://www.elsevier.com/locate/procedia/, 201
Identifying smart design attributes for Industry 4.0 customization using a clustering Genetic Algorithm
Industry 4.0 aims at achieving mass customization at a
mass production cost. A key component to realizing this is accurate
prediction of customer needs and wants, which is however a
challenging issue due to the lack of smart analytics tools. This
paper investigates this issue in depth and then develops a predictive
analytic framework for integrating cloud computing, big data
analysis, business informatics, communication technologies, and
digital industrial production systems. Computational intelligence
in the form of a cluster k-means approach is used to manage
relevant big data for feeding potential customer needs and wants
to smart designs for targeted productivity and customized mass
production. The identification of patterns from big data is achieved
with cluster k-means and with the selection of optimal attributes
using genetic algorithms. A car customization case study shows
how it may be applied and where to assign new clusters with
growing knowledge of customer needs and wants. This approach
offer a number of features suitable to smart design in realizing
Industry 4.0
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks
Despite the fact that cyberattacks are constantly growing in complexity, the
research community still lacks effective tools to easily monitor and understand
them. In particular, there is a need for techniques that are able to not only
track how prominently certain malicious actions, such as the exploitation of
specific vulnerabilities, are exploited in the wild, but also (and more
importantly) how these malicious actions factor in as attack steps in more
complex cyberattacks. In this paper we present ATTACK2VEC, a system that uses
temporal word embeddings to model how attack steps are exploited in the wild,
and track how they evolve. We test ATTACK2VEC on a dataset of billions of
security events collected from the customers of a commercial Intrusion
Prevention System over a period of two years, and show that our approach is
effective in monitoring the emergence of new attack strategies in the wild and
in flagging which attack steps are often used together by attackers (e.g.,
vulnerabilities that are frequently exploited together). ATTACK2VEC provides a
useful tool for researchers and practitioners to better understand cyberattacks
and their evolution, and use this knowledge to improve situational awareness
and develop proactive defenses
Recommended from our members
ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy. In this paper, we propose we propose ForChaos, a lightweight detection algorithm for IoT devices, that is based on forecasting and chaos theory to identify flooding and DDoS attacks. For every time-series behaviour collected, a forecasting-technique prediction is generated, based on a number of features, and the error between the two values is calcualted. In order to assess the error of the forecasting from the actual value, the lyapunov exponent is used to detect potential malicious behaviour. In NS-3 we evaluate our detection algorithm through a series of experiments in Flooding and Slow-Rate DDoS attacks. The results are presented and discussed in detail and compared with related studies, demonstrating its effectiveness and robustness
A Distributed Sensor Data Search Platform for Internet of Things Environments
Recently, the number of devices has grown increasingly and it is hoped that,
between 2015 and 2016, 20 billion devices will be connected to the Internet and
this market will move around 91.5 billion dollars. The Internet of Things (IoT)
is composed of small sensors and actuators embedded in objects with Internet
access and will play a key role in solving many challenges faced in today's
society. However, the real capacity of IoT concepts is constrained as the
current sensor networks usually do not exchange information with other sources.
In this paper, we propose the Visual Search for Internet of Things (ViSIoT)
platform to help technical and non-technical users to discover and use sensors
as a service for different application purposes. As a proof of concept, a real
case study is used to generate weather condition reports to support rheumatism
patients. This case study was executed in a working prototype and a performance
evaluation is presented.Comment: International Journal of Services Computing (ISSN 2330-4472) Vol. 4,
No.1, January - March, 201
When Things Matter: A Data-Centric View of the Internet of Things
With the recent advances in radio-frequency identification (RFID), low-cost
wireless sensor devices, and Web technologies, the Internet of Things (IoT)
approach has gained momentum in connecting everyday objects to the Internet and
facilitating machine-to-human and machine-to-machine communication with the
physical world. While IoT offers the capability to connect and integrate both
digital and physical entities, enabling a whole new class of applications and
services, several significant challenges need to be addressed before these
applications and services can be fully realized. A fundamental challenge
centers around managing IoT data, typically produced in dynamic and volatile
environments, which is not only extremely large in scale and volume, but also
noisy, and continuous. This article surveys the main techniques and
state-of-the-art research efforts in IoT from data-centric perspectives,
including data stream processing, data storage models, complex event
processing, and searching in IoT. Open research issues for IoT data management
are also discussed
- …