968 research outputs found

    Cyber Threat Intelligence : Challenges and Opportunities

    Full text link
    The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions, this in essence defines cyber threat intelligence notion. However, such an intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyse, and interpret cyber attack evidences. In this introductory chapter we first discuss the notion of cyber threat intelligence and its main challenges and opportunities, and then briefly introduce the chapters of the book which either address the identified challenges or present opportunistic solutions to provide threat intelligence.Comment: 5 Page

    ABAKA : a novel attribute-based k-anonymous collaborative solution for LBSs

    Get PDF
    The increasing use of mobile devices, along with advances in telecommunication systems, increased the popularity of Location-Based Services (LBSs). In LBSs, users share their exact location with a potentially untrusted Location-Based Service Provider (LBSP). In such a scenario, user privacy becomes a major con- cern: the knowledge about user location may lead to her identification as well as a continuous tracing of her position. Researchers proposed several approaches to preserve users’ location privacy. They also showed that hiding the location of an LBS user is not enough to guarantee her privacy, i.e., user’s pro- file attributes or background knowledge of an attacker may reveal the user’s identity. In this paper we propose ABAKA, a novel collaborative approach that provides identity privacy for LBS users considering users’ profile attributes. In particular, our solution guarantees p -sensitive k -anonymity for the user that sends an LBS request to the LBSP. ABAKA computes a cloaked area by collaborative multi-hop forwarding of the LBS query, and using Ciphertext-Policy Attribute-Based Encryption (CP-ABE). We ran a thorough set of experiments to evaluate our solution: the results confirm the feasibility and efficiency of our proposal

    Idea Contests: How to Design Feedback for an Efficient Contest

    Get PDF
    Inviting the public or a targeted group of individuals to submit their ideas or solutions to a specific problem or challenge within a predefined period of time is called an “idea contest.” Idea contests are the straightforward mechanism to solicit and leverage the innovation and the intelligence of thousands of individuals. With the advent of the Internet, companies can easily organize idea contests with an easy access for anyone to participate from anywhere around the world. A contest organizer needs to design a contest so that more individuals are encouraged to participate, generate more innovative ideas/solutions, and to remain active throughout the contest. In my dissertation, I explore the effects of idea contest parameters –such as award size and structure, contest duration, the visibility of submissions, and the feedback- on the participation, motivation, and performance of individuals before and after joining a contest. Feedback, as the primary focus of my dissertation, is a less studied parameter in the context of idea contests. In my first essay, I investigate the relative importance of each contest design parameter, particularly feedback, with each other in motivating individuals to participate in a contest. In this regard, I both ran a conjoint study among real designers and collected online data from 99designs website. Feedback plays an important role in increasing the likelihood of participation and the participation rate for an idea contest. In the second essay, I explore the effect of two different types of feedback –absolute vs. relative- on the performance of participants during an idea contest. By running a real contest with participants from a major public university, I measured how participants in an idea contest react to different types of feedback. The likelihood of revising ideas as well as the quality of ideas submitted were the primary dependent variables in this field experiment.Marketing and Entrepreneurship, Department o

    The relationship between transformational leadership managers and organizational commitment of staff In Tehran University of Medical Sciences

    Get PDF
    The relationship between transformational leadership managers and organizational commitment of staff In Tehran University of Medical Sciences Dargahi Hossein1, Rajabnezhad Zeynab2*, Reshadatjo Hamideh3 Introduction: Effective Leadership is an essential factor for success of an organization. In new century, it is believed that using transformative leadership style by managers cause increase of organizational commitment by the employees. Therefore, this research is aimed to determine the relationship of transformative leadership style of managers with organizational commitment of employees in Tehran University of Medical Sciences (TUMS) at 2015. Method: The study was a cross - the cross on the 70 managers and 225 staff were made at various levels. Multifactorial questionnaire transformational leadership and organizational commitment Allan Mayer questionnaire was used. To calculate descriptive statistics such as mean and standard deviation and analytical tests such as t-test, and Pearson correlation coefficient was used statistical software SPSS version 19. Results: The headquarters managers had desired transformative leadership style, and also the employees had moderate organizational commitment. Moreover, There was significant relationship between the managers’ transformational leadership style with employees’ organizational commitment (P=0.007). Conclusion: Concerning with significant relationship between transformative leadership style with organizational commitment, it is expected that with paying attention to using transformative leadership, it is used for selection of headquarters managers in order to improvement of the employees organizational commitment as an one of the important factor. Key¬words: Transformative leadership style, Organizational Commitment, Tehran University of Medical Sciences. ¬Citation: Dargahi H, Rajabnezhad Z, Reshadatjo H. The relationship between transformational leadership managers and organizational commitment of staff In Tehran University of Medical Sciences. Journal of Health Based Research 2016; 2(2): 133-146. 1. Professor, Department of Health Care Management, Health Information Management Research Center, School of Para Medicine, Tehran University of Medical Sciences, Tehran, Iran. 2. MSc, Department of Executive Management, School of Management and Economics, Islamic Azad University, Science and Research Branch, Tehran, Iran. 3. Assistant Professor, Department of Higher Education Management, School of Management and Economics, Islamic Azad University, Science and Research Branch, Tehran, Iran. *Correspondence: Shahid Shafi'I All, Ghods st., Keshavarz Blvd., Tehran. Tel: 02164432358 Email: [email protected]

    A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks

    Get PDF
    The rapid increase in the number of malicious programs has made malware forensics a daunting task and caused users’ systems to become in danger. Timely identification of malware characteristics including its origin and the malware sample family would significantly limit the potential damage of malware. This is a more profound risk in Cyber-Physical Systems (CPSs), where a malware attack may cause significant physical damage to the infrastructure. Due to limited on-device available memory and processing power in CPS devices, most of the efforts for protecting CPS networks are focused on the edge layer, where the majority of security mechanisms are deployed. Since the majority of advanced and sophisticated malware programs are combining features from different families, these malicious programs are not similar enough to any existing malware family and easily evade binary classifier detection. Therefore, in this article, we propose a novel multilabel fuzzy clustering system for malware attack attribution. Our system is deployed on the edge layer to provide insight into applicable malware threats to the CPS network. We leverage static analysis by utilizing Opcode frequencies as the feature space to classify malware families. We observed that a multilabel classifier does not classify a part of samples. We named this problem the instance coverage problem. To overcome this problem, we developed an ensemble-based multilabel fuzzy classification method to suggest the relevance of a malware instance to the stricken families. This classifier identified samples of VirusShare, RansomwareTracker, and BIG2015 with an accuracy of 94.66%, 94.26%, and 97.56%, respectively

    Shale gas prospectivity studies in the Perth Basin, Western Australia

    Get PDF
    The Early Permian Carynginia Formation and the Late Triassic Kockatea Shale are prospective shale gas resources in the Perth Basin. Various geological studies such as visual core description and petrography were conducted to understand about the lithofacies and depositional environments in the target formations. Key geochemical parameters such as TOC, thermal maturity and RHP were identified through rock-eval pyrolysis. Petrophysical studies were applied in detecting organic richness and fracability of the under-study shale plays

    El uso de diferentes estrategias ortográficas entre jóvenes estudiantes de inglés como lengua extranjera

    Get PDF
    The present study aimed to investigate the frequency of children’s spelling strategy use in the primary levels of learning English. It also compared the use of these strategies in good and average spellers with those of poor spellers. The participants of this study were 32 Iranian children at the first stages of learning to spell rated as being either low, average, or above average spellers. The children were asked to spell 20 words in a dictation. They were observed while spelling and were asked about the strategy they used to spell each word immediately after spelling. The results showed that retrieval was the most frequently used strategy by the participants most frequently used by the participants followed by sounding out and analogy. Considering the use of strategies in good, average, and poor spellers, it was concluded that the most common strategies for spelling were used more often by good and average spellers and less often by poor spellers.Este trabajo tiene como objetivo investigar la frecuencia en el uso de estrategias ortográficas de los niños en los primeros niveles del aprendizaje del inglés. También se compara el uso de estas estrategias entre alumnos que escriben bien y normal con los que obtenían pobres resultados. Los participantes de este estudio fueron 32 niños iraníes en los primeras etapas de aprendizaje de la escritura que han sido clasificados en buenos, regulares y pobres atendiendo a su ortografía. Se pidió a los estudiantes que escribieran 20 palabras en un dictado. Se les observó mientras las escribían y se les preguntó sobre las estrategia que empleaban inmediatamente después de escribir cada palabra. Los resultados muestran que la recuperación fue la estrategia que más empleaban seguida de la pronunciación y la analogía. Considerando el uso de las estrategias por parte de los tres grupos, los que escriben bien, normal y mal, se puede concluir que las estrategias más comunes para escribir las empleaban con más frecuencia los que escribían bien y normal, y con menor frecuencia los que obtuvieron pobres resultados

    The Role of Hotel Architecture in Tourists Attraction Development

    Get PDF
    Hotels and accommodations of the cities have a basic role in attracting tourists and people traveling to the city. Since business and fun trips are going to increase day-to-day, modern hotels should respond the needs of a wide range of tourists who have been residents there. However, little attention to the role of architecture vision in hotels designing has caused decreasing numbers of tourists who are residents at hotels. The objective of this research was to investigate the important factors in hotel designing, in order to attract tourists, in other words, recognition of effective factors in hotel architecture designing which will influence on choice of tourists. A questionnaire, with the content of effective factors in architecture, in order to attract tourists to hotels, has been prepared and distributed among resident tourists at hotels in Gorgan. The results show that, though exterior design can be effective, but the thing which is more important to tourists, is the facilities within the hotels. Somehow, facilities and exterior design are complementing each other. So besides a good exterior designing, architects should pay more attention to design of interior spaces
    • …
    corecore