Biblio

Found 685 results

Filters: First Letter Of Last Name is I  [Clear All Filters]
2017-03-07
Isah, H., Neagu, D., Trundle, P..  2015.  Bipartite network model for inferring hidden ties in crime data. 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). :994–1001.

Certain crimes are difficult to be committed by individuals but carefully organised by group of associates and affiliates loosely connected to each other with a single or small group of individuals coordinating the overall actions. A common starting point in understanding the structural organisation of criminal groups is to identify the criminals and their associates. Situations arise in many criminal datasets where there is no direct connection among the criminals. In this paper, we investigate ties and community structure in crime data in order to understand the operations of both traditional and cyber criminals, as well as to predict the existence of organised criminal networks. Our contributions are twofold: we propose a bipartite network model for inferring hidden ties between actors who initiated an illegal interaction and objects affected by the interaction, we then validate the method in two case studies on pharmaceutical crime and underground forum data using standard network algorithms for structural and community analysis. The vertex level metrics and community analysis results obtained indicate the significance of our work in understanding the operations and structure of organised criminal networks which were not immediately obvious in the data. Identifying these groups and mapping their relationship to one another is essential in making more effective disruption strategies in the future.

2018-05-25
Zhang, Yihang, Ioannou, Petros A.  2015.  Combined variable speed limit and lane change control for truck-dominant highway segment. Intelligent Transportation Systems (ITSC), 2015 IEEE 18th International Conference on. :1163–1168.
2018-05-17
Greenwood, Garrison, Gallagher, John, Matson, Eric.  2015.  Cyber-Physical Systems: The Next Generation of Evolvable Hardware Research and Applications. Proceedings of the 18th Asia Pacific Symposium on Intelligent and Evolutionary Systems, Volume 1. :285–296.

Since the late 1990s the sales of processors targeted for embedded systems has exceeded sales for the PC market. Some embedded systems tightly link the computing resources to the physical world. Such systems are called cyber-physical systems. Autonomous cyber-physical systems often have safety-critical missions, which means they must be fault tolerant. Unfortunately fault recovery options are limited; adapting the physical system behavior may be the only viable option. Consequently, autonomous cyber-physical systems are a class of adaptive systems. The evolvable hardware field has developed a number of techniques that should prove to be useful for designing cyber-physical systems although work along those lines has only recently begun. In this paper we provide an overview of cyber-physical systems and then describe how two evolvable hardware techniques can be used to adapt the physical system behavior in real-time. The goal is to introduce cyber-physical systems to the evolvable hardware community and encourage those researchers to begin working in this emerging field.

2015-04-07
Ignacio X. Dominguez, Alok Goel, David L. Roberts, Robert St. Amant.  2015.  Detecting Abnormal User Behavior Through Pattern-mining Input Device Analytics. Proceedings of the 2015 Symposium and Bootcamp on the Science of Security (HotSoS-15).
2018-05-23
Ivanov, R., Weimer, J., Simpao, A., Rehman, M., Lee, I..  2015.  Early Detection of Critical Pulmonary Shunts in Infants. Proceedings of the 6th International Conference on Cyber-Physical Systems. :110-119.
2017-02-27
Ismail, Z., Leneutre, J., Bateman, D., Chen, L..  2015.  A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures. 2015 IEEE 16th International Symposium on High Assurance Systems Engineering. :101–109.

The communication infrastructure is a key element for management and control of the power system in the smart grid. The communication infrastructure, which can include equipment using off-the-shelf vulnerable operating systems, has the potential to increase the attack surface of the power system. The interdependency between the communication and the power system renders the management of the overall security risk a challenging task. In this paper, we address this issue by presenting a mathematical model for identifying and hardening the most critical communication equipment used in the power system. Using non-cooperative game theory, we model interactions between an attacker and a defender. We derive the minimum defense resources required and the optimal strategy of the defender that minimizes the risk on the power system. Finally, we evaluate the correctness and the efficiency of our model via a case study.

2018-05-23
Michael W. Whalen, Sanjai Rayadurgam, Elaheh Ghassabani, Anitha Murugesan, Oleg Sokolsky, Mats Per Erik Heimdahl, Insup Lee.  2015.  Hierarchical multi-formalism proofs of cyber-physical systems. 13. {ACM/IEEE} International Conference on Formal Methods and Models for Codesign, {MEMOCODE} 2015. :90–95.
2018-05-27
2018-05-23
2018-05-16
Ivanov, R., Atanasov, N., Pajic, M., Lee, I., Pappas, G. J..  2015.  Robust Localization Using Context-Aware Filtering. Workshop on Multi VIew Geometry in Robotics (MVIGRO), in conjunction with RSS.
Park, Junkil, Ivanov, Radoslav, Weimer, James, Pajic, Miroslav, Lee, Insup.  2015.  Sensor Attack Detection in the Presence of Transient Faults. Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems. :1–10.
2015-04-07
Robert St. Amant, Prairie Rose Goodwin, Ignacio Dominguez, David L. Roberts.  2015.  Toward Expert Typing in ACT-R. Proceedings of the 2015 International Conference on Cognitive Modeling (ICCM 15).
2016-02-11
Ivan Ruchkin, Ashwini Rao, Dio De Niz, Sagar Chaki, David Garlan.  2015.  Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems: An Analysis Contracts Approach. CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy.

Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones. Many of the standard methods for CPS design make strong and unverified assumptions about the trustworthiness of physical devices, such as sensors. When these assumptions are violated, subtle inter-domain vulnerabilities are introduced into the system model. In this paper we use formal specification of analysis contracts to expose security assumptions and guarantees of analyses from reliability, control, and sensor security domains. We show that this specification allows us to determine where these assumptions are violated, opening the door to malicious attacks. We demonstrate how this approach can help discover and prevent vulnerabilities using a self-driving car example.

2016-02-15
Ivan Ruchkin, Ashwini Rao, Dio De Niz, Sagar Chaki, David Garlan.  2015.  Eliminating Inter-Domain Vulnerabilities in Cyber-PhysicalSystems: An Analysis Contracts Approach. CPS-SPC '15 Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy.

Designing secure cyber-physical systems (CPS) is a particularly difficult task since security vulnerabilities stem not only from traditional cybersecurity concerns, but also physical ones. Many of the standard methods for CPS design make strong and unverified assumptions about the trustworthiness of physical devices, such as sensors. When these assumptions are violated, subtle inter-domain vulnerabilities are introduced into the system model. In this paper we use formal specification of analysis contracts to expose security assumptions and guarantees of analyses from reliability, control, and sensor security domains. We show that this specification allows us to determine where these assumptions are violated, opening the door to malicious attacks. We demonstrate how this approach can help discover and prevent vulnerabilities using a self-driving car example.

2017-02-21
E. Aubry, T. Silverston, I. Chrisment.  2015.  "SRSC: SDN-based routing scheme for CCN". Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft). :1-5.

Content delivery such as P2P or video streaming generates the main part of the Internet traffic and Content Centric Network (CCN) appears as an appropriate architecture to satisfy the user needs. However, the lack of scalable routing scheme is one of the main obstacles that slows down a large deployment of CCN at an Internet-scale. In this paper we propose to use the Software-Defined Networking (SDN) paradigm to decouple data plane and control plane and present SRSC, a new routing scheme for CCN. Our solution is a clean-slate approach using only CCN messages and the SDN paradigm. We implemented our solution into the NS-3 simulator and perform simulations of our proposal. SRSC shows better performances than the flooding scheme used by default in CCN: it reduces the number of messages, while still improves CCN caching performances.

2018-05-15
T. S. Brisimi, S. Ariafar, Y. Zhang, C. G. Cassandras, I. Ch. Paschalidis.  2015.  Sensing and Classifying Roadway Obstacles: The Street Bump Anomaly Detection and Decision Support System. Proceedings of the IEEE Int. Conf. on Automation Science and Engineering (CASE). :1288–1293.
2017-03-08
Boykov, Y., Isack, H., Olsson, C., Ayed, I. B..  2015.  Volumetric Bias in Segmentation and Reconstruction: Secrets and Solutions. 2015 IEEE International Conference on Computer Vision (ICCV). :1769–1777.

Many standard optimization methods for segmentation and reconstruction compute ML model estimates for appearance or geometry of segments, e.g. Zhu-Yuille [23], Torr [20], Chan-Vese [6], GrabCut [18], Delong et al. [8]. We observe that the standard likelihood term in these formu-lations corresponds to a generalized probabilistic K-means energy. In learning it is well known that this energy has a strong bias to clusters of equal size [11], which we express as a penalty for KL divergence from a uniform distribution of cardinalities. However, this volumetric bias has been mostly ignored in computer vision. We demonstrate signif- icant artifacts in standard segmentation and reconstruction methods due to this bias. Moreover, we propose binary and multi-label optimization techniques that either (a) remove this bias or (b) replace it by a KL divergence term for any given target volume distribution. Our general ideas apply to continuous or discrete energy formulations in segmenta- tion, stereo, and other reconstruction problems.

2017-10-27
Zhongjing Ma, Suli Zou, Long Ran, Xingyu Shi, Ian Hiskens.  2015.  Decentralized Coordination for Large-scale Plug-in Electric Vehicles in Smart Grid: An Efficient Real-time Price Approach. IEEE 54th Annual Conference on Decision and Control (CDC). :5877-5882.
It has been a hot research topic to research the incorporation of large-scale PEVs into smart grid, such as the valley-fill strategy. However high charging rates under the valley-fill behavior may result in high battery degradation cost. Consequently in this paper, we novelly setup a framework to study a class of charging coordination problems which deals with the tradeoff between total generation cost and the accumulated battery degradation costs for all PEVs during a multi-time interval. Due to the autonomy of individual PEVs and the computational complexity for the system with large-scale PEV populations, it is impractical to implement the solution in a centralized way. Alternatively we propose a novel decentralized method such that each individual submits a charging profile, with respect to a given fixed price curve, which minimizes its own cost dealing with the tradeoff between the electricity cost and battery degradation cost over the charging interval; the price curve is updated based upon the aggregated PEV charging profiles. We show that, following the proposed decentralized price update procedure, the system converges to the unique efficient (in the sense of social optimality) solution under certain mild conditions.
2018-05-15
Jing Zhang, I. Ch. Paschalidis.  2015.  An Improved Composite Hypothesis Test for Markov Models with Applications in Network Anomaly Detection. Proceedings of the 54th IEEE Conference on Decision and Control. :3810–3815.
2017-10-27
Zhongjing Ma, Suli Zou, Xiangdong Liu, Ian Hiskens.  2015.  Efficient Coordination of Electric Vehicle Charging using a Progressive Second Price Auction. American Control Conference. :2999-3006.
An auction-based game is formulated for coordinating the charging of a population of electric vehicles (EVs) over a finite horizon. The proposed auction requires individual EVs to submit bid profiles that have dimension equal to two times the number of time-steps in the horizon. They compete for energy allocation at each time-step. Use of the progressive second price (PSP) auction mechanism ensures that incentive compatibility holds for the auction game. However, due to cross-elasticity between the charging time-steps, the marginal valuation of an individual EV at a particular time is determined by both the demand at that time and the total demand over the entire horizon. This difficulty is addressed by partitioning the allowable set of bid profiles according to the total desired energy over the entire horizon. It is shown that the efficient bid profile over the charging horizon is a Nash equilibrium of the underlying auction game. A dynamic update mechanism for the auction game is designed. A numerical example demonstrates that the auction system converges to the efficient Nash equilibrium.
2017-02-21
I. Ilhan, A. C. Gurbuz, O. Arikan.  2015.  "Sparsity based robust Stretch Processing". 2015 IEEE International Conference on Digital Signal Processing (DSP). :95-99.

Strecth Processing (SP) is a radar signal processing technique that provides high-range resolution with processing large bandwidth signals with lower rate Analog to Digital Converter(ADC)s. The range resolution of the large bandwidth signal is obtained through looking into a limited range window and low rate ADC samples. The target space in the observed range window is sparse and Compressive sensing(CS) is an important tool to further decrease the number of measurements and sparsely reconstruct the target space for sparse scenes with a known basis which is the Fourier basis in the general application of SP. Although classical CS techniques might be directly applied to SP, due to off-grid targets reconstruction performance degrades. In this paper, applicability of compressive sensing framework and its sparse signal recovery techniques to stretch processing is studied considering off-grid cases. For sparsity based robust SP, Perturbed Parameter Orthogonal Matching Pursuit(PPOMP) algorithm is proposed. PPOMP is an iterative technique that estimates off-grid target parameters through a gradient descent. To compute the error between actual and reconstructed parameters, Earth Movers Distance(EMD) is used. Performance of proposed algorithm are compared with classical CS and SP techniques.

2017-03-07
Amin, R., Islam, S. K. H., Biswas, G. P., Khan, M. K..  2015.  An efficient remote mutual authentication scheme using smart mobile phone over insecure networks. 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). :1–7.

To establish a secure connection between a mobile user and a remote server, this paper presents a session key agreement scheme through remote mutual authentication protocol by using mobile application software(MAS). We analyzed the security of our protocol informally, which confirms that the protocol is secure against all the relevant security attacks including off-line identity-password guessing attacks, user-server impersonation attacks, and insider attack. In addition, the widely accepted simulator tool AVISPA simulates the proposed protocol and confirms that the protocol is SAFE under the OFMC and CL-AtSe back-ends. Our protocol not only provide strong security against the relevant attacks, but it also achieves proper mutual authentication, user anonymity, known key secrecy and efficient password change operation. The performance comparison is also performed, which ensures that the protocol is efficient in terms of computation and communication costs.

2017-03-08
Idrus, S. Z. Syed, Cherrier, E., Rosenberger, C., Mondal, S., Bours, P..  2015.  Keystroke dynamics performance enhancement with soft biometrics. IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015). :1–7.

It is accepted that the way a person types on a keyboard contains timing patterns, which can be used to classify him/her, is known as keystroke dynamics. Keystroke dynamics is a behavioural biometric modality, whose performances, however, are worse than morphological modalities such as fingerprint, iris recognition or face recognition. To cope with this, we propose to combine keystroke dynamics with soft biometrics. Soft biometrics refers to biometric characteristics that are not sufficient to authenticate a user (e.g. height, gender, skin/eye/hair colour). Concerning keystroke dynamics, three soft categories are considered: gender, age and handedness. We present different methods to combine the results of a classical keystroke dynamics system with such soft criteria. By applying simple sum and multiply rules, our experiments suggest that the combination approach performs better than the classification approach with best result of 5.41% of equal error rate. The efficiency of our approaches is illustrated on a public database.

2017-02-14
J. Kim, I. Moon, K. Lee, S. C. Suh, I. Kim.  2015.  "Scalable Security Event Aggregation for Situation Analysis". 2015 IEEE First International Conference on Big Data Computing Service and Applications. :14-23.

Cyber-attacks have been evolved in a way to be more sophisticated by employing combinations of attack methodologies with greater impacts. For instance, Advanced Persistent Threats (APTs) employ a set of stealthy hacking processes running over a long period of time, making it much hard to detect. With this trend, the importance of big-data security analytics has taken greater attention since identifying such latest attacks requires large-scale data processing and analysis. In this paper, we present SEAS-MR (Security Event Aggregation System over MapReduce) that facilitates scalable security event aggregation for comprehensive situation analysis. The introduced system provides the following three core functions: (i) periodic aggregation, (ii) on-demand aggregation, and (iii) query support for effective analysis. We describe our design and implementation of the system over MapReduce and high-level query languages, and report our experimental results collected through extensive settings on a Hadoop cluster for performance evaluation and design impacts.