476 research outputs found
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models
Modern malware families often rely on domain-generation algorithms (DGAs) to
determine rendezvous points to their command-and-control server. Traditional
defence strategies (such as blacklisting domains or IP addresses) are
inadequate against such techniques due to the large and continuously changing
list of domains produced by these algorithms. This paper demonstrates that a
machine learning approach based on recurrent neural networks is able to detect
domain names generated by DGAs with high precision. The neural models are
estimated on a large training set of domains generated by various malwares.
Experimental results show that this data-driven approach can detect
malware-generated domain names with a F_1 score of 0.971. To put it
differently, the model can automatically detect 93 % of malware-generated
domain names for a false positive rate of 1:100.Comment: Submitted to NISK 201
Clustering Methods for Electricity Consumers: An Empirical Study in Hvaler-Norway
The development of Smart Grid in Norway in specific and Europe/US in general
will shortly lead to the availability of massive amount of fine-grained
spatio-temporal consumption data from domestic households. This enables the
application of data mining techniques for traditional problems in power system.
Clustering customers into appropriate groups is extremely useful for operators
or retailers to address each group differently through dedicated tariffs or
customer-tailored services. Currently, the task is done based on demographic
data collected through questionnaire, which is error-prone. In this paper, we
used three different clustering techniques (together with their variants) to
automatically segment electricity consumers based on their consumption
patterns. We also proposed a good way to extract consumption patterns for each
consumer. The grouping results were assessed using four common internal
validity indexes. We found that the combination of Self Organizing Map (SOM)
and k-means algorithms produce the most insightful and useful grouping. We also
discovered that grouping quality cannot be measured effectively by automatic
indicators, which goes against common suggestions in literature.Comment: 12 pages, 3 figure
An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics
Biometric systems have to address many requirements, such as large population
coverage, demographic diversity, varied deployment environment, as well as
practical aspects like performance and spoofing attacks. Traditional unimodal
biometric systems do not fully meet the aforementioned requirements making them
vulnerable and susceptible to different types of attacks. In response to that,
modern biometric systems combine multiple biometric modalities at different
fusion levels. The fused score is decisive to classify an unknown user as a
genuine or impostor. In this paper, we evaluate combinations of score
normalization and fusion techniques using two modalities (fingerprint and
finger-vein) with the goal of identifying which one achieves better improvement
rate over traditional unimodal biometric systems. The individual scores
obtained from finger-veins and fingerprints are combined at score level using
three score normalization techniques (min-max, z-score, hyperbolic tangent) and
four score fusion approaches (minimum score, maximum score, simple sum, user
weighting). The experimental results proved that the combination of hyperbolic
tangent score normalization technique with the simple sum fusion approach
achieve the best improvement rate of 99.98%.Comment: 10 pages, 5 figures, 3 tables, conference, NISK 201
Evaluation of team dynamic in Norwegian projects for IT students
The need for teaching realistic software development in project courses has
increased in a global scale. It has always been challenges in cooperating
fast-changing software technologies, development methodologies and teamwork.
Moreover, such project courses need to be designed in the connection to
existing theoretical courses. We performed a large-scale research on student
performance in Software Engineering projects in Norwegian universities. This
paper investigates four aspects of team dynamics, which are team reflection,
leadership, decision making and task assignment in order to improve student
learning. Data was collected from student projects in 4 years at two
universities. We found that some leader's characteristics are perceived
differently for female and male leaders, including the perception of leaders as
skilful workers or visionaries. Leadership is still a challenging aspect to
teach, and assigned leadership is probably not the best way to learn. Students
is are performing well in task review, however, needs support while performing
task assignment. The result also suggests that task management to be done in
more fine-grained levels. It is also important to maintain an open and active
discussion to facilitate effective group decision makings
nsroot: Minimalist Process Isolation Tool Implemented With Linux Namespaces
Data analyses in the life sciences are moving from tools run on a personal
computer to services run on large computing platforms. This creates a need to
package tools and dependencies for easy installation, configuration and
deployment on distributed platforms. In addition, for secure execution there is
a need for process isolation on a shared platform. Existing virtual machine and
container technologies are often more complex than traditional Unix utilities,
like chroot, and often require root privileges in order to set up or use. This
is especially challenging on HPC systems where users typically do not have root
access. We therefore present nsroot, a lightweight Linux namespaces based
process isolation tool. It allows restricting the runtime environment of data
analysis tools that may not have been designed with security as a top priority,
in order to reduce the risk and consequences of security breaches, without
requiring any special privileges. The codebase of nsroot is small, and it
provides a command line interface similar to chroot. It can be used on all
Linux kernels that implement user namespaces. In addition, we propose combining
nsroot with the AppImage format for secure execution of packaged applications.
nsroot is open sourced and available at: https://github.com/uit-no/nsroo
Building sentiment Lexicons applying graph theory on information from three Norwegian thesauruses
Sentiment lexicons are the most used tool to automatically predict sentiment
in text. To the best of our knowledge, there exist no openly available
sentiment lexicons for the Norwegian language. Thus in this paper we
applied two different strategies to automatically generate sentiment lexicons
for the Norwegian language. The first strategy used machine translation to
translate an English sentiment lexicon to Norwegian and the other strategy
used information from three different thesauruses to build several sentiment
lexicons. The lexicons based on thesauruses were built using the Label
propagation algorithm from graph theory. The lexicons were evaluated
by classifying product and movie reviews. The results show satisfying
classification performances. Different sentiment lexicons perform well on
product and on movie reviews. Overall the lexicon based on machine
translation performed the best, showing that linguistic resources in English
can be translated to Norwegian without losing significant value
Integrating BIM and gaming to support building operation: the case of a new hospital
Moving into a new hospital requires healthcare professionals to adapt to a new work environment. Workflows, processes, and competencies become obsolete and need to be tailored for the new hospital. This paper explores a role-play serious game developed for the purpose of familiarizing professionals with their new work environment. A three-dimensional virtual prototype of the new hospital building created from Building Information Modeling technology, served as the graphical environment in which the game was staged. The game, namely the âWardâ, is intended to provide healthcare professionals with a virtual training ground for exercising new work processes. We conducted a series of interviews with the client, healthcare experts, and the software developers involved in developing the games. Our intention of doing so was twofold: attaining an understanding of how Building Information Modeling data has been integrated into the game and exploring how the gameâs functionalities had been fitted to best support the healthcare professionals in their learning. By exploring the process of the gameâs development we were able to point out shortcomings in current practice and to suggest areas for improvement. These are (1) use of crossover modules, (2) increased collaboration, (3) clear communication of information needs, and (4) better contractual agreements. The gameplay could be further improved by increasing the amount of non-player characters. Moreover, we just begin to understand how pedagogical concepts for games conveying architectural designs can be built. This indicates that developing such concepts is an intriguing avenue for further research. We argue that the findings are useful for practitioners and researchers interested in integrating BIM and gaming technology
âSafe spacesâ â Electronic media, the internet and the representation of disability.
This paper details the findings from a research into educational âsafe spacesâ. In this research, the electronic media emplaced within four English schoolsâ intranet sites were examined to evidence the image of disability and impairment constructed in this âsafe spaceâ. The research, through the employment of proto text analysis, revealed that the image of disability and impairment within schoolsâ electronic media represented and unbalanced and negative image of disability that was grounded in the ideology of child deficit. Based upon these findings it is argued that âsafe spaceâ in relation to these intranet sites was more a metaphor of dominance and power than one located within the principles of equality and social justice. The paper argues that as educators we must move beyond safe spaces as a shallow paradigm of meaning and ask when creating such places - what does space mean, how do the electronic media employed in such spaces create meaning and what might specific safe spaces do
The anti-democratic employment of school cyberspace. A pilgrimage into an Arab winter?
In this article I wish to bring critical attention to the manner in which the Internet and intranet are employed as pedagogical space in schools. Within this article I also articulate my struggle to understand and conduct research in this place of electronic communication. Informed by Nietzsche and some biblical scripture, I suggest that what we are finding in education is a church of the intranet that is worshiped as a shelter of safety for educational learning. However, my contention is that a lack of control of uploaded and downloaded digital media results in spaces which mirror extant societal prejudices and bigotry. To evidence my argument I present specific data from English schools' colonisation of cyberspace and suggest that in this terra nullius a new civilisation, constructed upon old world ideals, âconformedâ the construction of the disabled indigene
Employment of American and British first language textbooks as a foreign language resource in private schools in South Lebanon
This article presents the findings of research that examined how teachers employed first language textbooks to teach English as a foreign language and to develop the
intercultural competences of their students. The research employed semi-structured phenomenological interviews and questionnaires with eight South Lebanese educators. The findings demonstrates how in relation to language learning, the employment of foreign textbooks produces successful results. The research though also details how teachers have to work hard to bridge the cultural gaps between their students and the âalienâ cultures detailed in the textbooks. Problematic, it would appear to the development of inter cultural competence is that in South Lebanon some cultures, noticeably that of Judaism, and some topics, such as sexuality, that schools, teachers but moreover parents control how and indeed if, students are inculcated into wider cultures and debates. The conclusion of the research details how in the development of intercultural competence that teachers are the key mediators of studentsâ responses to cultures and practices other than their own
- âŚ