Filters








614 Hits in 10.6 sec

Lessons Learned Developing and Extending a Visual Analytics Solution for Investigative Analysis of Scamming Activities [article]

Ronak Tanna, Shivam Dhar, Ashwin Sudhir, Shreyash Devan, Shubham Verma
2020 arXiv   pre-print
Cybersecurity analysts work on large communication data sets to perform investigative analysis by painstakingly going over thousands of email conversations to find potential scamming activities and the  ...  Beagle[1] is one such tool which visualizes the large communication data using different panels such that the inspector has better chances of finding the scam network.  ...  VISUALIZATION DESIGN e visual analytics solution -Beagle, was built for investigative analysis of scamming activities on communication datasets consisting of unstructured text, social network information  ... 
arXiv:2002.03058v1 fatcat:qyti4w7wdnbi5nezk2uhhbcdoq

Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data [article]

Evan Brinckman, Andrey Kuehlkamp, Jarek Nabrzyski, Ian J. Taylor
2019 arXiv   pre-print
In this paper, we reflect on work we have been conducting recently surrounding the ingestion, retrieval and analysis of Blockchain data.  ...  are fast becoming commonplace across a diverse range of business and scientific verticals.  ...  In another approach, [15] proposed BlockChainVis, a tool for visual analysis of Bitcoin transaction flows to identify illegal activity, ingesting the entire Bitcoin transaction history into its database  ... 
arXiv:1909.09925v1 fatcat:mvlm2zxpyjaplggkhjithddj74

The Smart Cities MethodoLogy Based on Public Value: The First Evaluation Cycle

Josiane Brietzke Porto, Mirian Oliveira
2020 BAR: Brazilian Administration Review  
This paper analyzes the results obtained from a first evaluation cycle of the Smart Cities MethodoLogy and its components (a reference model and an assessment method), developed based on a Public Value  ...  Such initiatives should be designed according to the needs and conditions of each municipality, with the aim of expanding or generating public value for stakeholders.  ...  state or federal level; (f) development and/or marketing of solutions for smart city projects; and (g) being a citizen, resident of, or visitor to a Brazilian city.  ... 
doi:10.1590/1807-7692bar2020190048 fatcat:nak4itzlbfe4rpcn7rytodt6li

Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study [article]

Radek Ošlejšek and Vít Rusňák and Karolína Burská and Valdemar Švábenský and Jan Vykopal
2019 arXiv   pre-print
They combine a known clustering and time-based visual approaches to show game results in a way that is easy to decode for players.  ...  In this paper, we investigate how to provide valuable post-game feedback to players of serious cybersecurity games through interactive visualizations.  ...  ACKNOWLEDGMENTS The authors would like to thank the cybersecurity experts for providing the feedback and invaluable insight into the target domain.  ... 
arXiv:1912.10781v2 fatcat:jm5nla34rzejvpjcqp2z42ldju

A Distributed Workflow Management System with Case Study of Real-life Scientific Applications on Grids

Qishi Wu, Mengxia Zhu, Yi Gu, Patrick Brown, Xukang Lu, Wuyin Lin, Yangang Liu
2012 Journal of Grid Computing  
Next-generation scientific applications feature complex workflows comprised of many computing modules with intricate inter-module dependencies. Supporting such scientific workflows  ...  A gallery of final images for one SCAM workflow are provided on the web interface for a visual examination, as shown in Fig. 16 .  ...  column modeling environment for the investigation of parameterized physics targeted for global climate models has been developed.  ... 
doi:10.1007/s10723-012-9222-7 fatcat:shx2jpjtybbxvfhd6mv4m3izme

Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era

George Iakovakis, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, Dimitris Gritzalis, Konstantinos Rantos
2021 Security and Communication Networks  
In our research, we provide a detailed classification for a group of tools which will facilitate risk mitigation and prevention.  ...  Our objective is to provide a multifaceted taxonomy and analysis of mitigation tools, which will support companies in their endeavor to protect their computer networks.  ...  /AUEB). e research aimed at, mainly, developing innovative methodologies for implementing the National Cybersecurity Strategy of Greece (2020-25).  ... 
doi:10.1155/2021/3187205 fatcat:tumus36longx7c5yukhsdbvbhm

Advancing Education Through Extended Reality and Internet of Everything Enabled Metaverses: Applications, Challenges, and Open Issues [article]

Senthil Kumar Jagatheesaperumal, Kashif Ahmad, Ala Al-Fuqaha, Junaid Qadir
2022 arXiv   pre-print
Metaverse has evolved as one of the popular research agendas that let the users learn, socialize, and collaborate in a networked 3D immersive virtual world.  ...  We believe this survey can fully demonstrate the versatility of metaverse-driven education, which could serve as a potential guideline for the researchers.  ...  visualization of the data through AI and predictive analysis.  ... 
arXiv:2207.01512v1 fatcat:oavkkuroxrf7hfisjyqt2lxz2y

Do Real Work, Not Homework [chapter]

Brian P. Coppola
2015 Chemistry Education  
Rabkin, for, among a million other things, understanding and inspiring the value of Real Work.  ...  Acknowledgments The author thanks his organic chemistry colleagues in the Department of Chemistry, University of Michigan, for their continued support and enthusiasm that makes being part of that faculty  ...  Starting with 30-40 min of class time immediately following a lesson, their students drafted an active-learning exercise based on the course material.  ... 
doi:10.1002/9783527679300.ch9 fatcat:qgywj2dyqrgkff73i7tg7lel7i

XAI for Cybersecurity: State of the Art, Challenges, Open Issues and Future Directions [article]

Gautam Srivastava, Rutvij H Jhaveri, Sweta Bhattacharya, Sharnil Pandya, Rajeswari, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Jon G. Hall, Mamoun Alazab, Thippa Reddy Gadekallu
2022 arXiv   pre-print
Finally, the lessons learnt from these applications are highlighted which act as a guide for future scope of research.  ...  AI models often appear as a blackbox wherein developers are unable to explain or trace back the reasoning behind a specific decision.  ...  techniques along with visual analytics.  ... 
arXiv:2206.03585v1 fatcat:qe2d33ujdzbapczhefs2whbnwe

Digital Citizenship Model Course

ACOMI Nicoleta, ACOMI Ovidiu, XYLOURI Ourania, DALOSI Anna, JARANOWSKA Daria, SELDERS Arndt
2022 Zenodo  
This model course for the development of Digital Citizenship skills is a guideline designed to assist trainers and educators to introduce and organise training courses and non-formal educational activities  ...  The educational materials for the proposed lesson plans supported by course curricula, quizzes, case studies and exercises are available online via this e-learning platform.  ...  on the optimal solutions for the development of a safe workstation -Trainees are asked to discuss on social media behaviours which are considered problematic and the reasons behind these behaviours Tasks  ... 
doi:10.5281/zenodo.7123591 fatcat:s464vuigj5a6jccvn45dv7aana

Railway Defender Kill Chain to Predict and Detect Cyber-Attacks

Ravdeep Kour, Adithya Thaduri, Ramin Karim
2020 Journal of Cyber Security and Mobility  
The railway cybersecurity OSACBM architecture consists of eight layers; cybersecurity information moves from the initial level of data acquisition to data processing, data analysis, incident detection,  ...  incident assessment, incident prognostics, decision support, and visualization.  ...  Acknowledgments The authors would like to thanks Luleå Railway Research Center (JVTC) for sponsoring research work. The authors would also like to acknowledge the contributions of Dr.  ... 
doi:10.13052/jcsm2245-1439.912 fatcat:ew4twrtxafcghjrq7n4zuusmzu

Idealized simulations of the tropical climate and variability in the Single Column Atmosphere Model (SCAM). Part I: Radiative‐convective equilibrium

I‐Kuan Hu, Brian E. Mapes, Stefan Tulich, Richard B. Neale, Andrew Gettelman, Kevin A. Reed
2022 Journal of Advances in Modeling Earth Systems  
Modeling of the tropical atmosphere has been a major challenge, because the flow is far from adiabatic and involves cross-scale interactions among convection, cloud, radiation, and dynamics.  ...  For instance, general circulation models  ...  In this approach, however, those prescribed advective tendencies may conceal genuine interactions among physical parameterizations, limiting the transferability of lessons learned from SCAM to its parent  ... 
doi:10.1029/2021ms002826 fatcat:jyauxlifbzebhigu3txfgodmvm

Toward a standard benchmark for computer security research

Tudor Dumitras, Darren Shou
2011 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS '11  
In this paper, we review the unique characteristics of the WINE data, we discuss why rigorous benchmarking will provide fresh insights on the security arms race and we propose a research agenda for this  ...  WINE includes representative field data, collected worldwide from 240,000 sensors, for new empirical studies, and it will enable the validation of research on all the phases in the lifecycle of security  ...  Acknowledgments We thank Roy Maxion, Dave Brumley, Jon McCune, Ahren Studer, Jim Newsome and Marc Dacier for their early feedback on the ideas presented in this paper.  ... 
doi:10.1145/1978672.1978683 dblp:conf/badgers/DumitrasS11 fatcat:jwikl2e6bnhr7mmwwvarngynjq

Indian Ethos, Ethics and Management

Seema S. Singha, Subhadeep Mukherjee
2021 Adhyatma: Journal of Management, Spirituality, and Human Values  
Complying with the laws and regulations the hospitals should have a very glass glow information system and should reach to customers' queries.  ...  Concentrating in ethical compliances and setting benchmark in quality is what will always ensure the progress of health care service providers.  ...  The stages are Identification, Investigation, Analysis and Integration (Muniapan, 2010) . Identification Investigation Analysis Integration In the 1 st stage of the approach i.e.  ... 
doi:10.52416/eureka.2020.1.1.p01-614 fatcat:2psopsiwmbec3lw4iq567tn2re

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions.  ...  Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize  ...  U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities.  ... 
arXiv:2203.02662v3 fatcat:iudwizbvp5cv3fga6lpvydlrna
« Previous Showing results 1 — 15 out of 614 results