[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 8, Issue 4July 2017Special Issue: Cyber Security and Regular Papers
Reflects downloads up to 05 Mar 2025Bibliometrics
Skip Table Of Content Section
SECTION: Special Issue: Cyber Security
editorial
Free
The Letter from Prof. Maj. Gen. (Ret.) Isaac Ben-Israel
Article No.: 49e, Page 1https://doi.org/10.1145/3057727
editorial
Free
research-article
Bridging the Air Gap between Isolated Networks and Mobile Phones in a Practical Cyber-Attack
Article No.: 50, Pages 1–25https://doi.org/10.1145/2870641

Information is the most critical asset of modern organizations, and accordingly it is one of the resources most coveted by adversaries. When highly sensitive data is involved, an organization may resort to air gap isolation in which there is no ...

research-article
Public Access
Understanding the Relationship between Human Behavior and Susceptibility to Cyber Attacks: A Data-Driven Approach
Article No.: 51, Pages 1–25https://doi.org/10.1145/2890509

Despite growing speculation about the role of human behavior in cyber-security of machines, concrete data-driven analysis and evidence have been lacking. Using Symantec’s WINE platform, we conduct a detailed study of 1.6 million machines over an 8-month ...

research-article
Public Access
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk
Article No.: 52, Pages 1–32https://doi.org/10.1145/2914795

Cybersecurity threats are on the rise with evermore digitization of the information that many day-to-day systems depend upon. The demand for cybersecurity analysts outpaces supply, which calls for optimal management of the analyst resource. Therefore, a ...

research-article
A Risk-Scoring Feedback Model for Webpages and Web Users Based on Browsing Behavior
Article No.: 53, Pages 1–21https://doi.org/10.1145/2928274

It has been claimed that many security breaches are often caused by vulnerable (naïve) employees within the organization [Ponemon Institute LLC 2015a]. Thus, the weakest link in security is often not the technology itself but rather the people who use ...

research-article
Securely Computing a Ground Speed Model
Article No.: 54, Pages 1–13https://doi.org/10.1145/2998550

Consider a server offering risk assessment services and potential clients of these services. The risk assessment model that is run by the server is based on current and historical data of the clients. However, the clients might prefer not sharing such ...

research-article
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems
Article No.: 55, Pages 1–21https://doi.org/10.1145/3011018

Traffic of Industrial Control System (ICS) between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is known to be highly periodic. However, it is sometimes multiplexed, due to asynchronous scheduling. Modeling the network ...

research-article
On Network Neutrality Measurements
Article No.: 56, Pages 1–22https://doi.org/10.1145/3040966

Network level surveillance, censorship, and various man-in-the-middle attacks target only specific types of network traffic (e.g., HTTP, HTTPS, VoIP, or Email). Therefore, packets of these types will likely receive “special” treatment by a transit ...

research-article
Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks
Article No.: 57, Pages 1–22https://doi.org/10.1145/3046676

The way users manage access to their information and computers has a tremendous effect on the overall security and privacy of individuals and organizations. Usually, access management is conducted using a choice architecture, a behavioral economics ...

SECTION: Regular Papers
research-article
Tracking Illicit Drug Dealing and Abuse on Instagram Using Multimodal Analysis
Article No.: 58, Pages 1–15https://doi.org/10.1145/3011871

Illicit drug trade via social media sites, especially photo-oriented Instagram, has become a severe problem in recent years. As a result, tracking drug dealing and abuse on Instagram is of interest to law enforcement agencies and public health agencies. ...

research-article
Advanced Economic Control of Electricity-Based Space Heating Systems in Domestic Coalitions with Shared Intermittent Energy Resources
Article No.: 59, Pages 1–27https://doi.org/10.1145/3041216

Over the past few years, Domestic Heating Automation Systems (DHASs) that optimize the domestic space heating control process with minimum user input, utilizing appropriate occupancy prediction technology, have emerged as commercial products (e.g., the ...

research-article
Algorithms for Graph-Constrained Coalition Formation in the Real World
Article No.: 60, Pages 1–24https://doi.org/10.1145/3040967

Coalition formation typically involves the coming together of multiple, heterogeneous, agents to achieve both their individual and collective goals. In this article, we focus on a special case of coalition formation known as Graph-Constrained Coalition ...

research-article
Data-Driven Frequency-Based Airline Profit Maximization
Article No.: 61, Pages 1–28https://doi.org/10.1145/3041217

Although numerous traditional models predict market share and demand along airline routes, the prediction of existing models is not precise enough, and to the best of our knowledge, there is no use of data mining--based forecasting techniques for ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Subjects