A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory
[chapter]
2008
Lecture Notes in Computer Science
In the paper, an online risk assessment model based on D-S evidence theory is presented. ...
The results of the online risk assessment show a clear and concise picture of both the intrusion progress and the target security state. ...
The online-risk assessment module evaluates
D-S Evidence Theory D-S evidence theory (also called D-S theory) was proposed by Dempster and extended by Shafer. ...
doi:10.1007/978-3-540-88313-5_3
fatcat:7qbmeow3fbavxb4c6irtbr6xdm
The Effect of Risk Communication on Public Behavior to Non-Conventional Terrorism—Randomized Control Trial
2021
International Journal of Environmental Research and Public Health
Threat perception and behavioral intent before and after exposure to hypothetical NCT scenarios were assessed stratified to the type of media, exposure to rumors, and risk communication. ...
An online randomized controlled trial was conducted among 1802 adult participants in Israel. ...
The choice to perform this study online was in light of the multitude of visual tools used in the study, including media reports, risk communication instructions, and rumors/fake news. ...
doi:10.3390/ijerph19010342
pmid:35010599
pmcid:PMC8751006
fatcat:wrnj7xoeoraodl7uxni3gdfjc4
Effective detection of sophisticated online banking fraud on extremely imbalanced data
2012
World wide web (Bussum)
Its detection is a typical use case of the broad-based Wisdom Web of Things (W2T) methodology. ...
Sophisticated online banking fraud reflects the integrative abuse of resources in social, cyber and physical worlds. ...
Because most forensic evidence for fraud is left on customers' computers and it is difficult to retrieve, intrusion detection methods cannot be directly used for online banking. ...
doi:10.1007/s11280-012-0178-0
fatcat:n5mvzx25tjbvdfhmcx4p2yvo4i
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
[chapter]
2011
Lecture Notes in Computer Science
A security analyst is in charge of observing the online operations of a corporate network (e.g., an online retail company with an external webserver and an internal fileserver) from threats of random or ...
The current work describes a cognitive Instance-based Learning (IBL) model of the recognition and comprehension processes of a security analyst in a simple cyber-attack scenario. ...
Acknowledgements This research was a part of a Multidisciplinary University Research Initiative Award (MURI; # W911NF-09-1-0525) from Army Research Office for a research project on Cyber Situation Awareness ...
doi:10.1007/978-3-642-22348-8_24
fatcat:owiyvf2t25c2xgqjzgnh3ahv6i
Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
2022
Sensors
Using this model, a location-cum-domain-based fusion framework is proposed to evaluate the detector's performance using disjunctive, conjunctive, and cautious conjunctive rules. ...
False alerts due to misconfigured or compromised intrusion detection systems (IDS) in industrial control system (ICS) networks can lead to severe economic and operational damage. ...
with combined cyber-physical features and different time resolutions (a) res = 5 s; (b) res = 10 s; (c) res = 15 s; (d) res = 20 s. ...
doi:10.3390/s22062100
pmid:35336271
pmcid:PMC8950146
fatcat:3r5c5rcvwjchfbll5ffq3675v4
Inter-Domain Fusion for Enhanced Intrusion Detection in Power Systems: An Evidence Theoretic and Meta-Heuristic Approach
[article]
2021
arXiv
pre-print
Implicit trust of data is a major problem with using artificial intelligence or machine learning for CPS security, because during critical attack detection time they are more at risk, with greater likelihood ...
Using this model, a location-cum-domain based fusion framework is proposed and evaluated with different combination rules, that fuse multiple evidence from inter-domain and intra-domain sensors. ...
Specifically, two advantages we achieve from D-S theory are (1) its ability to deal with the lack of prior probabilities for various events and (2) its ability to combine evidences from multiple sources ...
arXiv:2111.10484v1
fatcat:3g3lxw3mjbfh5oltgoduhg3ejy
An Immunological-Based Simulation: A Case Study of Risk Concentration for Mobile Spam Context Assessment
2018
International Journal on Advanced Science, Engineering and Information Technology
This paper presents RiCCA or Risk Concentration for Context Assessment model that performs a risk classification of text spam messages in Short Message Service (SMS) format. ...
This simulation demonstrated that the Danger Theory as a feasible model to be applied in measuring the risk of spam. ...
) 6 Identified risk for all spam messages, S in P do 7 Create a set of spam messages from the sample in D, P (spam folder) 8 for all spam messages in P do 9 Add data item in D 10 Update information on ...
doi:10.18517/ijaseit.8.3.2719
fatcat:llk74visqvb6be6vzetmkz2qey
Treating repetitive suicidal intrusions using eye movements: study protocol for a multicenter randomized clinical trial
2019
BMC Psychiatry
Growing evidence shows that the majority of suicidal patients diagnosed with major depression or bipolar disorder report repetitive suicide-related images and thoughts (suicidal intrusions). ...
Various studies showed that vividness of negative as well as positive intrusive images may be reduced by dual task (e.g. eye movements) interventions taxing the working memory. ...
Acknowledgements We would like to acknowledge the invaluable help of the following mental health institutions who have agreed to help us with recruitment and data collection: Arkin, Altrecht, Dimence, ...
doi:10.1186/s12888-019-2129-0
pmid:31072317
pmcid:PMC6507069
fatcat:yi63pdgenbgh3b3nj2bikndgza
Security games for voltage control in smart grid
2012
2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
The consequences of data injection attacks are quantified using a risk assessment process based on realistic system simulations. ...
The framework developed is also useful to analyse different types of attacks and defensive measures. The theoretical results obtained are demonstrated using numerical examples. ...
In comparison, only empirical evidence is used in this work. The limitation of attack trees is not unrecognized. Sommestad et al. ...
doi:10.1109/allerton.2012.6483220
dblp:conf/allerton/LawAP12
fatcat:zotycxvqiza4vlnp3s3pkm25ru
Privacy in electronic commerce and the economics of immediate gratification
2004
Proceedings of the 5th ACM conference on Electronic commerce - EC '04
Models of self-control problems and immediate gratification offer more realistic descriptions of the decision process and are more consistent with currently available data. ...
distortions may affect not only 'naïve' individuals but also 'sophisticated' ones; and we prove that this may occur also when individuals perceive the risks from not protecting their privacy as significant ...
of completing [or not completing] that transaction with a certain technology d, p d (t) [1 − p d (t)]; minus the cost of using the technology t: c d t . 1 The technology d may or may not be privacy enhancing ...
doi:10.1145/988772.988777
dblp:conf/sigecom/Acquisti04
fatcat:l5g2zids75covl7e4acarkw7uq
Influence of Social Networking on Malaysian Female Secondary Students: A Qualitative Study Across Three Schools
2017
Akademika
they are aware of the risks and danger involved, and how they handle them. ...
The findings revealed that these students were not very different from those in the west in that they are aware of risks involving in SN and will stay clear of risky behaviours. ...
They had some stressful and emotional experiences with SN which made them wary and cynical of SN but they w o u l d n o t g i v e u p S N a n d c o n t i n u e t o use the sites actively. ...
doi:10.17576/akad-2017-8701-20
fatcat:7hpawddtgvfrrlpz2kcokjvz4u
Interpretation training to target repetitive negative thinking in generalized anxiety disorder and depression
2018
Journal of Consulting and Clinical Psychology
To test the hypothesis that negative interpretation bias contributes to worry and rumination, we assessed the effects of inducing more positive interpretations in reducing RNT. ...
This is consistent with a causal role for negative interpretation bias in both worry and rumination, suggesting a useful role for CBM-I within treatments for anxiety and depression. ...
of participants' breathing focus thought intrusions. ...
doi:10.1037/ccp0000310
pmid:30507227
fatcat:377ssilgt5fbrpsj7xyuabbm4u
Cyber Situation Awareness
2012
Human Factors
risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). ...
In this paper, we use cognitive modeling to make predictions regarding these factors. ...
The s parameter has a default value of 0.25 in the ACT-R architecture, and we assume this default value in the IBL model. We use default values of d and s parameters. ...
doi:10.1177/0018720812464045
pmid:23829034
fatcat:na2bz4bv55fvdm22s562kdakmm
An Adversarial-Risk-Analysis Approach to Counterterrorist Online Surveillance
2019
Sensors
We propose an adversarial-risk-analysis (ARA) model as a novel way of approaching the online surveillance problem that has the advantage of discarding the hypothesis of common knowledge. ...
We conduct a theoretical analysis in this scenario that investigates the introduction of automatic classification technology compared to the status quo involving manual investigation of the collected profiles ...
The Problem of Online Surveillance In this section, we describe the problem of online surveillance from the intrusion-detection problem posed and solved by [18] (According to [19] ), intrusion detection ...
doi:10.3390/s19030480
fatcat:kfnuzhisknatfdb7pfbkal7cha
Chatbot Advertising Effectiveness: when does the message get through?
2019
Computers in Human Behavior
The first purpose of this article was to investigate whether and how perceived helpfulness and usefulness of a chatbot consulted on the Facebook Messenger platform affected perceived intrusiveness of chatbot-initiated ...
Afterwards, they were asked to evaluate their experiences via an online survey. ...
Acknowledgements This study was funded by the research fund of the University of Antwerp [BOF DOCPRO]. ...
doi:10.1016/j.chb.2019.04.009
fatcat:57spkl2slrfkvddjkikhnpujjq
« Previous
Showing results 1 — 15 out of 9,057 results