Filters








9,057 Hits in 6.7 sec

Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory [chapter]

C. P. Mu, X. J. Li, H. K. Huang, S. F. Tian
2008 Lecture Notes in Computer Science  
In the paper, an online risk assessment model based on D-S evidence theory is presented.  ...  The results of the online risk assessment show a clear and concise picture of both the intrusion progress and the target security state.  ...  The online-risk assessment module evaluates D-S Evidence Theory D-S evidence theory (also called D-S theory) was proposed by Dempster and extended by Shafer.  ... 
doi:10.1007/978-3-540-88313-5_3 fatcat:7qbmeow3fbavxb4c6irtbr6xdm

The Effect of Risk Communication on Public Behavior to Non-Conventional Terrorism—Randomized Control Trial

Moran Bodas, Morel Ragoler, Yossi Rabby, Esther Krasner
2021 International Journal of Environmental Research and Public Health  
Threat perception and behavioral intent before and after exposure to hypothetical NCT scenarios were assessed stratified to the type of media, exposure to rumors, and risk communication.  ...  An online randomized controlled trial was conducted among 1802 adult participants in Israel.  ...  The choice to perform this study online was in light of the multitude of visual tools used in the study, including media reports, risk communication instructions, and rumors/fake news.  ... 
doi:10.3390/ijerph19010342 pmid:35010599 pmcid:PMC8751006 fatcat:wrnj7xoeoraodl7uxni3gdfjc4

Effective detection of sophisticated online banking fraud on extremely imbalanced data

Wei Wei, Jinjiu Li, Longbing Cao, Yuming Ou, Jiahang Chen
2012 World wide web (Bussum)  
Its detection is a typical use case of the broad-based Wisdom Web of Things (W2T) methodology.  ...  Sophisticated online banking fraud reflects the integrative abuse of resources in social, cyber and physical worlds.  ...  Because most forensic evidence for fraud is left on customers' computers and it is difficult to retrieve, intrusion detection methods cannot be directly used for online banking.  ... 
doi:10.1007/s11280-012-0178-0 fatcat:n5mvzx25tjbvdfhmcx4p2yvo4i

Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning [chapter]

Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez
2011 Lecture Notes in Computer Science  
A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or  ...  The current work describes a cognitive Instance-based Learning (IBL) model of the recognition and comprehension processes of a security analyst in a simple cyber-attack scenario.  ...  Acknowledgements This research was a part of a Multidisciplinary University Research Initiative Award (MURI; # W911NF-09-1-0525) from Army Research Office for a research project on Cyber Situation Awareness  ... 
doi:10.1007/978-3-642-22348-8_24 fatcat:owiyvf2t25c2xgqjzgnh3ahv6i

Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach

Abhijeet Sahu, Katherine Davis
2022 Sensors  
Using this model, a location-cum-domain-based fusion framework is proposed to evaluate the detector's performance using disjunctive, conjunctive, and cautious conjunctive rules.  ...  False alerts due to misconfigured or compromised intrusion detection systems (IDS) in industrial control system (ICS) networks can lead to severe economic and operational damage.  ...  with combined cyber-physical features and different time resolutions (a) res = 5 s; (b) res = 10 s; (c) res = 15 s; (d) res = 20 s.  ... 
doi:10.3390/s22062100 pmid:35336271 pmcid:PMC8950146 fatcat:3r5c5rcvwjchfbll5ffq3675v4

Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach [article]

Abhijeet Sahu, Katherine Davis
2021 arXiv   pre-print
Implicit trust of data is a major problem with using artificial intelligence or machine learning for CPS security, because during critical attack detection time they are more at risk, with greater likelihood  ...  Using this model, a location-cum-domain based fusion framework is proposed and evaluated with different combination rules, that fuse multiple evidence from inter-domain and intra-domain sensors.  ...  Specifically, two advantages we achieve from D-S theory are (1) its ability to deal with the lack of prior probabilities for various events and (2) its ability to combine evidences from multiple sources  ... 
arXiv:2111.10484v1 fatcat:3g3lxw3mjbfh5oltgoduhg3ejy

An Immunological-Based Simulation: A Case Study of Risk Concentration for Mobile Spam Context Assessment

Kamahazira Zainal, Mohd Zalisham Jali
2018 International Journal on Advanced Science, Engineering and Information Technology  
This paper presents RiCCA or Risk Concentration for Context Assessment model that performs a risk classification of text spam messages in Short Message Service (SMS) format.  ...  This simulation demonstrated that the Danger Theory as a feasible model to be applied in measuring the risk of spam.  ...  ) 6 Identified risk  for all spam messages, S in P do 7 Create a set of spam messages from the sample in D, P (spam folder) 8 for all spam messages in P do 9 Add data item in D 10 Update information on  ... 
doi:10.18517/ijaseit.8.3.2719 fatcat:llk74visqvb6be6vzetmkz2qey

Treating repetitive suicidal intrusions using eye movements: study protocol for a multicenter randomized clinical trial

J. S. van Bentum, M. Sijbrandij, A. J. F. M. Kerkhof, A. Huisman, A. R. Arntz, E. A. Holmes, G. Franx, J. Mokkenstorm, M. J. H. Huibers
2019 BMC Psychiatry  
Growing evidence shows that the majority of suicidal patients diagnosed with major depression or bipolar disorder report repetitive suicide-related images and thoughts (suicidal intrusions).  ...  Various studies showed that vividness of negative as well as positive intrusive images may be reduced by dual task (e.g. eye movements) interventions taxing the working memory.  ...  Acknowledgements We would like to acknowledge the invaluable help of the following mental health institutions who have agreed to help us with recruitment and data collection: Arkin, Altrecht, Dimence,  ... 
doi:10.1186/s12888-019-2129-0 pmid:31072317 pmcid:PMC6507069 fatcat:yi63pdgenbgh3b3nj2bikndgza

Security games for voltage control in smart grid

Yee Wei Law, Tansu Alpcan, Marimuthu Palaniswami
2012 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)  
The consequences of data injection attacks are quantified using a risk assessment process based on realistic system simulations.  ...  The framework developed is also useful to analyse different types of attacks and defensive measures. The theoretical results obtained are demonstrated using numerical examples.  ...  In comparison, only empirical evidence is used in this work. The limitation of attack trees is not unrecognized. Sommestad et al.  ... 
doi:10.1109/allerton.2012.6483220 dblp:conf/allerton/LawAP12 fatcat:zotycxvqiza4vlnp3s3pkm25ru

Privacy in electronic commerce and the economics of immediate gratification

Alessandro Acquisti
2004 Proceedings of the 5th ACM conference on Electronic commerce - EC '04  
Models of self-control problems and immediate gratification offer more realistic descriptions of the decision process and are more consistent with currently available data.  ...  distortions may affect not only 'naïve' individuals but also 'sophisticated' ones; and we prove that this may occur also when individuals perceive the risks from not protecting their privacy as significant  ...  of completing [or not completing] that transaction with a certain technology d, p d (t) [1 − p d (t)]; minus the cost of using the technology t: c d t . 1 The technology d may or may not be privacy enhancing  ... 
doi:10.1145/988772.988777 dblp:conf/sigecom/Acquisti04 fatcat:l5g2zids75covl7e4acarkw7uq

Influence of Social Networking on Malaysian Female Secondary Students: A Qualitative Study Across Three Schools

Siew Ming Thang, Noorizah Mohd Noor, Lay Shi Ng, Adzuhaidah Md Taha, Noor Baizura Abdul Aziz
2017 Akademika  
they are aware of the risks and danger involved, and how they handle them.  ...  The findings revealed that these students were not very different from those in the west in that they are aware of risks involving in SN and will stay clear of risky behaviours.  ...  They had some stressful and emotional experiences with SN which made them wary and cynical of SN but they w o u l d n o t g i v e u p S N a n d c o n t i n u e t o use the sites actively.  ... 
doi:10.17576/akad-2017-8701-20 fatcat:7hpawddtgvfrrlpz2kcokjvz4u

Interpretation training to target repetitive negative thinking in generalized anxiety disorder and depression

Colette R. Hirsch, Charlotte Krahé, Jessica Whyte, Sofia Loizou, Livia Bridge, Sam Norton, Andrew Mathews
2018 Journal of Consulting and Clinical Psychology  
To test the hypothesis that negative interpretation bias contributes to worry and rumination, we assessed the effects of inducing more positive interpretations in reducing RNT.  ...  This is consistent with a causal role for negative interpretation bias in both worry and rumination, suggesting a useful role for CBM-I within treatments for anxiety and depression.  ...  of participants' breathing focus thought intrusions.  ... 
doi:10.1037/ccp0000310 pmid:30507227 fatcat:377ssilgt5fbrpsj7xyuabbm4u

Cyber Situation Awareness

Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez
2012 Human Factors  
risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total).  ...  In this paper, we use cognitive modeling to make predictions regarding these factors.  ...  The s parameter has a default value of 0.25 in the ACT-R architecture, and we assume this default value in the IBL model. We use default values of d and s parameters.  ... 
doi:10.1177/0018720812464045 pmid:23829034 fatcat:na2bz4bv55fvdm22s562kdakmm

An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance

César Gil, Javier Parra-Arnau
2019 Sensors  
We propose an adversarial-risk-analysis (ARA) model as a novel way of approaching the online surveillance problem that has the advantage of discarding the hypothesis of common knowledge.  ...  We conduct a theoretical analysis in this scenario that investigates the introduction of automatic classification technology compared to the status quo involving manual investigation of the collected profiles  ...  The Problem of Online Surveillance In this section, we describe the problem of online surveillance from the intrusion-detection problem posed and solved by [18] (According to [19] ), intrusion detection  ... 
doi:10.3390/s19030480 fatcat:kfnuzhisknatfdb7pfbkal7cha

Chatbot Advertising Effectiveness: when does the message get through?

Evert Van den Broeck, Brahim Zarouali, Karolien Poels
2019 Computers in Human Behavior  
The first purpose of this article was to investigate whether and how perceived helpfulness and usefulness of a chatbot consulted on the Facebook Messenger platform affected perceived intrusiveness of chatbot-initiated  ...  Afterwards, they were asked to evaluate their experiences via an online survey.  ...  Acknowledgements This study was funded by the research fund of the University of Antwerp [BOF DOCPRO].  ... 
doi:10.1016/j.chb.2019.04.009 fatcat:57spkl2slrfkvddjkikhnpujjq
« Previous Showing results 1 — 15 out of 9,057 results