40 research outputs found
Recommended from our members
LIDF: Layered intrusion detection framework for ad-hoc networks
As ad-hoc networks have different characteristics from a wired network, the intrusion detection techniques used for wired networks are no longer sufficient and effective when adapted directly to a wireless ad-hoc network. In this article, first Ï„he security challenges in intrusion detection for ad-hoc networks are identified and the related work for anomaly detection is discussed. We then propose a layered intrusion detection framework, which consists of collection, detection and alert modules that are handled by local agents. The collection, detection and alert modules are uniquely enabled with the main operations of ad-hoc networking, which are found at the OSI link and network layers. The proposed modules are based on interpolating polynomials and linear threshold schemes. An experimental evaluation of these modules shows their efficiency for several attack scenarios, such as route logic compromise, traffic patterns distortion and denial of service attacks
Evaluation of Fake News Detection with Knowledge-Enhanced Language Models
Recent advances in fake news detection have exploited the success of
large-scale pre-trained language models (PLMs). The predominant
state-of-the-art approaches are based on fine-tuning PLMs on labelled fake news
datasets. However, large-scale PLMs are generally not trained on structured
factual data and hence may not possess priors that are grounded in factually
accurate knowledge. The use of existing knowledge bases (KBs) with rich
human-curated factual information has thus the potential to make fake news
detection more effective and robust. In this paper, we investigate the impact
of knowledge integration into PLMs for fake news detection. We study several
state-of-the-art approaches for knowledge integration, mostly using Wikidata as
KB, on two popular fake news datasets - LIAR, a politics-based dataset, and
COVID-19, a dataset of messages posted on social media relating to the COVID-19
pandemic. Our experiments show that knowledge-enhanced models can significantly
improve fake news detection on LIAR where the KB is relevant and up-to-date.
The mixed results on COVID-19 highlight the reliance on stylistic features and
the importance of domain specific and current KBs.Comment: To appear in Proceedings of the 16th International AAAI Conference on
Web and Social Media (AAAI ICWSM-2022
Recommended from our members
Authentication in a layered security approach for mobile ad hoc networks
An ad hoc network is a collection of nodes that do not need to rely on a predefined infrastructure to keep the network connected. Nodes communicate amongst each other using wireless radios and operate by following a peer-to-peer network model. In this article we investigate authentication in a layered approach, which results to multiple lines of defense for mobile ad hoc networks. The layered security approach is described and design criteria for creating secure ad hoc network using multiple authentication protocols are analysed. The performance of several such known protocols, which are based on challenge-response techniques, is presented through simulation results
Recommended from our members
Security in smart home environment
This chapter presents the concept of Smart Home, describes the Smart Home networking technologies and discusses the main issues for ensuring security in a Smart Home environment. Nowadays, the integration of current communication and information technologies within the dwelling has led to the emergence of Smart Homes. These technologies facilitate the building of Smart Home environments in which devices and systems can communicate with each other and can be controlled automatically in order to interact with the household members and improve the quality of their life. However, the nature of Smart Home environment, the fact that it is always connected to the outside world via Internet and the open security back doors derived from the household members raise many security concerns. Finally, by reviewing the existing literature regarding Smart Homes and security issues that exist in Smart Home environments, the authors envisage to provide a base to broaden the research in Smart Home security
Recommended from our members
Detecting unauthorized and compromised nodes in mobile ad hoc networks
Security of mobile ad-hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the different types of attacks are discussed. We propose a two-phase detection procedure of nodes that are not authorized for specific services and nodes that have been compromised during their operation in MANET. The detection framework is enabled with the main operations of ad-hoc networking, which are found at the link and network layers. The proposed framework is based on zero knowledge techniques, which are presented through proofs
Recommended from our members
Ubiquitous healthcare profile management applying smart card technology
Nowadays, the patient-centric healthcare approach is focused on ubiquitous healthcare services. Furthermore, the adoption of cloud computing technology leads to more efficient ubiquitous healthcare systems. Moreover, the personalization of the delivery of ubiquitous healthcare services is enabled with the introduction of user profiles. In this paper, we propose five generic healthcare profile structures corresponding to the main categories of the participating entities included in a typical ubiquitous healthcare system in a cloud computing environment. In addition, we propose a profile management system incorporating smart card technology to increase its efficiency and the quality of the provided services of the ubiquitous healthcare system
Recommended from our members
Layered security design for mobile ad hoc networks
When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve confidentiality, authenticity, integrity and non-repudiation in practical networks. Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. In this article we investigate the principal security issues for protecting mobile ad hoc networks at the data link and network layers. The security requirements for these two layers are identified and the design criteria for creating secure ad hoc networks using multiple lines of defense against malicious attacks are discussed
Recommended from our members
Healthcare profile management system in smart cards
Nowadays, healthcare profile management systems are essential for ubiquitous healthcare systems in cloud computing environments. However, these profile management systems incorporate user profiles consisting of limited user information associated with user preferences and interests. Thus, it is required the deployment of profile management systems enabling the reliable creation and efficient management of enriched user profiles. Toward to this effort, in this paper, we propose a smart card file system design for the user healthcare smart cards incorporated in a healthcare profile management system applying in a typical ubiquitous healthcare system
Attitudes to kidney donation among primary care patients in rural Crete, Greece
<p>Abstract</p> <p>Background</p> <p>In Greece, there is limited research on issues related to organ donation, and the low rate of registration as donors requires explanation. This study reports the findings of a survey of knowledge and attitudes to kidney donation among primary care patients in rural Crete, Greece.</p> <p>Methods</p> <p>Two rural primary care settings in the island of Crete, Anogia Health Centre and Vrachasi Practice, were involved in a questionnaire survey. This was conducted among primary care patients (aged 18 years and over) with routine appointments, to assess their knowledge and attitudes to kidney donation. General practitioners (GPs) recruited patients and questionnaires were completed following the patients' medical consultation. Pearson's chi square tests were used and crude odds ratios (OR) with 95% confidence intervals (95% CI) were calculated in order to investigate into the possible associations between the respondents' knowledge, attitudes and specific concerns in relation to their socio-demographic features. Logistic regression analyses were used to examine differences by geographical location.</p> <p>Results</p> <p>The 224 (92.5%) of the 242 primary care attenders who were approached agreed to participate. Only 2.2% (5/224) of the respondents carried a donor card. Most participants (84.4%, 189/224) did not feel well informed about registering as a kidney donor. More than half of the respondents (54.3%, 121/223) were unwilling to register as a kidney donor and donate kidneys for transplant after death. Over a third of respondents (35.4%, 79/223) were not confident that medical teams would try as hard as possible to save the life of a person who has agreed to donate organs. People with a higher level of education were more likely to be willing to register as kidney donors [(OR: 3.3; 95% CI: 1.8–6.0), p < 0.001)] and to be less worried about their kidneys being removed after death [(OR: 0.3; 95% CI: 0.1–0.5), p < 0.001)] than those having a lower level of education.</p> <p>Conclusion</p> <p>Lack of knowledge and information regarding organ donation and negative attitudes related to registration as donors were the main findings of this study. Efforts should be based on targeting the attitudes to organ donation of individuals and population groups.</p