CINXE.COM
Search results for: trusted
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: trusted</title> <meta name="description" content="Search results for: trusted"> <meta name="keywords" content="trusted"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="trusted" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="trusted"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 87</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: trusted</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">87</span> Trusted Neural Network: Reversibility in Neural Networks for Network Integrity Verification</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malgorzata%20Schwab">Malgorzata Schwab</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashis%20Kumer%20Biswas"> Ashis Kumer Biswas</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this concept paper, we explore the topic of Reversibility in Neural Networks leveraged for Network Integrity Verification and crafted the term ''Trusted Neural Network'' (TNN), paired with the API abstraction around it, to embrace the idea formally. This newly proposed high-level generalizable TNN model builds upon the Invertible Neural Network architecture, trained simultaneously in both forward and reverse directions. This allows for the original system inputs to be compared with the ones reconstructed from the outputs in the reversed flow to assess the integrity of the end-to-end inference flow. The outcome of that assessment is captured as an Integrity Score. Concrete implementation reflecting the needs of specific problem domains can be derived from this general approach and is demonstrated in the experiments. The model aspires to become a useful practice in drafting high-level systems architectures which incorporate AI capabilities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trusted" title="trusted">trusted</a>, <a href="https://publications.waset.org/abstracts/search?q=neural" title=" neural"> neural</a>, <a href="https://publications.waset.org/abstracts/search?q=invertible" title=" invertible"> invertible</a>, <a href="https://publications.waset.org/abstracts/search?q=API" title=" API"> API</a> </p> <a href="https://publications.waset.org/abstracts/144758/trusted-neural-network-reversibility-in-neural-networks-for-network-integrity-verification" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144758.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">146</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">86</span> Generalization of Blom Key Predistribution Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abbas%20Cheraghi">Abbas Cheraghi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A key predistribution scheme provides one method to distribute secret ahead of time. Blom’s scheme is a symmetric threshold key exchange protocol in cryptography. The scheme was proposed by the Swedish cryptographer Rolf Blom. In this kind of scheme, trusted authority gives each user a secret key and a public identifier, which enables any two users to create independently a shared key for communicating between each other. However, if an attacker can compromise the keys of at least Known numbers of users, he can break the scheme and reconstruct every shared key. In this paper generalized Blom’s Scheme by multivariate Lagrange interpolation formula. This scheme is a form of threshold secret sharing scheme. In this new scheme, the amount of information transmitted by the trusted authority is independent of the numbers of users. In addition, this scheme is unconditionally secure against any individual user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=key%20predistribution" title="key predistribution">key predistribution</a>, <a href="https://publications.waset.org/abstracts/search?q=blom%E2%80%99s%20scheme" title=" blom’s scheme"> blom’s scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=secret%20sharing" title=" secret sharing"> secret sharing</a>, <a href="https://publications.waset.org/abstracts/search?q=unconditional%20secure" title=" unconditional secure"> unconditional secure</a> </p> <a href="https://publications.waset.org/abstracts/39358/generalization-of-blom-key-predistribution-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39358.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">85</span> Morphotectonic Analysis of Burkh Anticline, North of Bastak, Zagros</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Afroogh">A. Afroogh</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Ramazani%20omali"> R. Ramazani omali</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Hafezi%20Moghaddas"> N. Hafezi Moghaddas</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Nohegar"> A. Nohegar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Burkh anticline with a length of 50 km and a width of 9 km is located 40 km to the north of Bastak in internal Fars zone in folded-trusted belt of Zagros. In order to assess the active tectonics in the area of study, morphometrical indexes such as V indexes (V), ratio of valley floor to valley width (Vf), the stream length-gradient ratio (Sl), channel sinuosity indexes (S), mountain front faceting indexes (F%) and mountain front sinuosity(Smf) have been studied. These investigations show that the activity is not equal in various sections of the length of Burkh anticline. The central part of this anticline is the most active one. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anticline" title="anticline">anticline</a>, <a href="https://publications.waset.org/abstracts/search?q=internal%20fars%20zone" title=" internal fars zone"> internal fars zone</a>, <a href="https://publications.waset.org/abstracts/search?q=tectonic" title=" tectonic"> tectonic</a>, <a href="https://publications.waset.org/abstracts/search?q=morohometrical%20indexes" title=" morohometrical indexes"> morohometrical indexes</a>, <a href="https://publications.waset.org/abstracts/search?q=folded-trusted%20belt" title=" folded-trusted belt"> folded-trusted belt</a> </p> <a href="https://publications.waset.org/abstracts/2278/morphotectonic-analysis-of-burkh-anticline-north-of-bastak-zagros" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">84</span> Electronic-Word of Mouth(e-WoM): Preliminary Study of Malaysian Undergrad Students Smartphone Online Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norshakirah%20Ab.Aziz">Norshakirah Ab.Aziz</a>, <a href="https://publications.waset.org/abstracts/search?q=Nurul%20Atiqah%20Jamaluddin"> Nurul Atiqah Jamaluddin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Consequently, electronic word-of-mouth (e-WoM) becomes one of the resources in the decision making process and considered a valuable marketing channel for consumers and organizations. Admittedly, there is increasing concern on the accuracy and genuine of e-WoM content because consumers prefer to look out product or service information available online. Thus, the focus of this study is to propose a model and guidelines how to select trusted online review content according to domain chosen –undergrad students smartphone online review. Undeniable, mobile devices like smartphone has now become a necessity in today are daily life to complete our daily chores. The model and guideline focused on product competency review and the message integrity. In other words, this study aims to enable consumers to identify trusted online review content, which helps them in buying decisions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20word%20of%20mouth" title="electronic word of mouth">electronic word of mouth</a>, <a href="https://publications.waset.org/abstracts/search?q=e-WoM" title=" e-WoM"> e-WoM</a>, <a href="https://publications.waset.org/abstracts/search?q=WoM" title=" WoM"> WoM</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20review" title=" online review"> online review</a> </p> <a href="https://publications.waset.org/abstracts/27844/electronic-word-of-mouthe-wom-preliminary-study-of-malaysian-undergrad-students-smartphone-online-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">328</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">83</span> Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Sarrab">Mohamed Sarrab</a>, <a href="https://publications.waset.org/abstracts/search?q=Hadj%20Bourdoucen"> Hadj Bourdoucen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mobile%20application" title="mobile application">mobile application</a>, <a href="https://publications.waset.org/abstracts/search?q=run-time%20verification" title=" run-time verification"> run-time verification</a>, <a href="https://publications.waset.org/abstracts/search?q=usable%20security" title=" usable security"> usable security</a>, <a href="https://publications.waset.org/abstracts/search?q=direct%20information%20flow" title=" direct information flow"> direct information flow</a> </p> <a href="https://publications.waset.org/abstracts/2363/runtime-monitoring-using-policy-based-approach-to-control-information-flow-for-mobile-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2363.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">381</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">82</span> Data Security and Privacy Challenges in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Rashid">Amir Rashid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title="cloud security">cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=IaaS" title=" IaaS"> IaaS</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20data%20privacy%20and%20integrity" title=" cloud data privacy and integrity"> cloud data privacy and integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20cloud" title=" hybrid cloud"> hybrid cloud</a> </p> <a href="https://publications.waset.org/abstracts/72497/data-security-and-privacy-challenges-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72497.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">81</span> A Proposal for a Secure and Interoperable Data Framework for Energy Digitalization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hebberly%20Ahatlan">Hebberly Ahatlan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The process of digitizing energy systems involves transforming traditional energy infrastructure into interconnected, data-driven systems that enhance efficiency, sustainability, and responsiveness. As smart grids become increasingly integral to the efficient distribution and management of electricity from both fossil and renewable energy sources, the energy industry faces strategic challenges associated with digitalization and interoperability — particularly in the context of modern energy business models, such as virtual power plants (VPPs). The critical challenge in modern smart grids is to seamlessly integrate diverse technologies and systems, including virtualization, grid computing and service-oriented architecture (SOA), across the entire energy ecosystem. Achieving this requires addressing issues like semantic interoperability, IT/OT convergence, and digital asset scalability, all while ensuring security and risk management. This paper proposes a four-layer digitalization framework to tackle these challenges, encompassing persistent data protection, trusted key management, secure messaging, and authentication of IoT resources. Data assets generated through this framework enable AI systems to derive insights for improving smart grid operations, security, and revenue generation. Furthermore, this paper also proposes a Trusted Energy Interoperability Alliance as a universal guiding standard in the development of this digitalization framework to support more dynamic and interoperable energy markets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digitalization" title="digitalization">digitalization</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%2FOT%20convergence" title=" IT/OT convergence"> IT/OT convergence</a>, <a href="https://publications.waset.org/abstracts/search?q=semantic%20interoperability" title=" semantic interoperability"> semantic interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=VPP" title=" VPP"> VPP</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20blockchain" title=" energy blockchain"> energy blockchain</a> </p> <a href="https://publications.waset.org/abstracts/172857/a-proposal-for-a-secure-and-interoperable-data-framework-for-energy-digitalization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172857.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">183</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">80</span> Comparing Hotels' Official Websites with Their Pages on Booking Sites: An Exploratory Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Iman%20Shawky">Iman Shawky</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Hotel websites frequently aim at encouraging visitors to become potential guests by completing their booking procedures, and accordingly, they have been proved to be attractive and appealing. That might be due to the consideration of them as one of the direct efficacious tools to promote and sell hotels' facilities, besides building strong communication with guests to create unforgettable brand images. This study tried to find out a step for five-star and four-star hotels to develop their websites to meet their visitors' or guests' requirements for an effective site. In addition, it aimed at exploring to what extent hotels' official websites compared with their pages on hotel booking sites still influence visitors' or guests' desires to book. Besides, it also aimed at investigating to what extent visitors or guests widely trust and use those sites to accomplish their booking. Furthermore, it tried to explore to what extent visitors' or guests' preferences of those sites can influence on hotels' financial performance. To achieve these objectives, the researcher conducted an exploratory study by surfing both hotels' official websites and their pages on booking sites of such hotels in Alexandria city in Egypt to make a comparison between them. Moreover, another separate comparison was made on Arab and foreign guests' views conducted by using a questionnaire during the past seven months to investigate the effectiveness of hotels' official websites against their pages on booking sites to trust and motive them to book. The results indicated that hotels' pages on booking sites represented widely trusted and used sites compared with their official websites for achieving visitors' or guests' booking process, while a few other visitors or guests still trusted official hotel websites for completing their booking. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=five-star%20and%20four-star%20hotels" title="five-star and four-star hotels">five-star and four-star hotels</a>, <a href="https://publications.waset.org/abstracts/search?q=hotel%20booking%20sites" title=" hotel booking sites"> hotel booking sites</a>, <a href="https://publications.waset.org/abstracts/search?q=hotels%27%20financial%20performance" title=" hotels' financial performance"> hotels' financial performance</a>, <a href="https://publications.waset.org/abstracts/search?q=hotels%27%20official%20websites" title=" hotels' official websites"> hotels' official websites</a> </p> <a href="https://publications.waset.org/abstracts/123961/comparing-hotels-official-websites-with-their-pages-on-booking-sites-an-exploratory-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/123961.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">79</span> On Adaptive and Auto-Configurable Apps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prisa%20Damrongsiri">Prisa Damrongsiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Kittinan%20Pongpianskul"> Kittinan Pongpianskul</a>, <a href="https://publications.waset.org/abstracts/search?q=Mario%20Kubek"> Mario Kubek</a>, <a href="https://publications.waset.org/abstracts/search?q=Herwig%20Unger"> Herwig Unger</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=apps" title="apps">apps</a>, <a href="https://publications.waset.org/abstracts/search?q=context-sensitive" title=" context-sensitive"> context-sensitive</a>, <a href="https://publications.waset.org/abstracts/search?q=location-sensitive" title=" location-sensitive"> location-sensitive</a>, <a href="https://publications.waset.org/abstracts/search?q=self-configuration" title=" self-configuration"> self-configuration</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20computing" title=" mobile computing"> mobile computing</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20home" title=" smart home "> smart home </a> </p> <a href="https://publications.waset.org/abstracts/19734/on-adaptive-and-auto-configurable-apps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">78</span> Decentralised Edge Authentication in the Industrial Enterprise IoT Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20P.%20Autry">C. P. Autry</a>, <a href="https://publications.waset.org/abstracts/search?q=A.W.%20Roscoe"> A.W. Roscoe </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=enterprise%20IoT%20cybersecurity" title=" enterprise IoT cybersecurity"> enterprise IoT cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=PKI%2FTTP" title=" PKI/TTP"> PKI/TTP</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20space" title=" IoT space"> IoT space</a> </p> <a href="https://publications.waset.org/abstracts/93630/decentralised-edge-authentication-in-the-industrial-enterprise-iot-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">77</span> Community Strengths and Indigenous Resilience as Drivers for Health Reform Change</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shana%20Malio-Satele">Shana Malio-Satele</a>, <a href="https://publications.waset.org/abstracts/search?q=Lemalu%20Silao%20Vaisola%20Sefo"> Lemalu Silao Vaisola Sefo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introductory Statement: South Seas Healthcare is Ōtara’s largest Pacific health provider in South Auckland, New Zealand. Our vision is excellent health and well-being for Pacific people and all communities through strong Pacific values. During the DELTA and Omicron outbreak of COVID-19, our Pacific people, indigenous Māori, and the community of South Auckland were disproportionately affected and faced significant hardship with existing inequities magnified. This study highlights the community-based learnings of harnessing community-based strengths such as indigenous resilience, family-informed experiences and stories that provide critical insights that inform health reform changes that will be sustainable and equitable for all indigenous populations. This study is based on critical learnings acquired during COVID-19 that challenge the deficit narrative common in healthcare about indigenous populations. This study shares case studies of marginalised groups and religious groups and the successful application of indigenous cultural strengths, such as collectivism, positive protective factors, and using trusted relationships to create meaningful change in the way healthcare is delivered. The significance of this study highlights the critical conditions needed to adopt a community-informed way of creating integrated healthcare that works and the role that the community can play in being part of the solution. Methodologies: Key methodologies utilised are indigenous and Pacific-informed. To achieve critical learnings from the community, Pacific research methodologies, heavily informed by the Polynesian practice, were applied. Specifically, this includes; Teu Le Va (Understanding the importance of trusted relationships as a way of creating positive health solutions); The Fonofale Methodology (A way of understanding how health incorporates culture, family, the physical, spiritual, mental and other dimensions of health, as well as time, context and environment; The Fonua Methodology – Understanding the overall wellbeing and health of communities, families and individuals and their holistic needs and environmental factors and the Talanoa methodology (Researching through conversation, where understanding the individual and community is through understanding their history and future through stories). Major Findings: Key findings in the study included: 1. The collectivist approach in the community is a strengths-based response specific to populations, which highlights the importance of trusted relationships and cultural values to achieve meaningful outcomes. 2. The development of a “village model” which identified critical components to achieving health reform change; system navigation, a sense of service that was culturally responsive, critical leadership roles, culturally appropriate support, and the ability to influence the system enablers to support an alternative way of working. Concluding Statement: There is a strong connection between community-based strengths being implemented into healthcare strategies and reforms and the sustainable success of indigenous populations and marginalised communities accessing services that are cohesive, equitably resourced, accessible and meaningful for families. This study highlights the successful community-informed approaches and practices used during the COVID-19 response in New Zealand that are now being implemented in the current health reform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=indigenous%20voice" title="indigenous voice">indigenous voice</a>, <a href="https://publications.waset.org/abstracts/search?q=community%20voice" title=" community voice"> community voice</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20reform" title=" health reform"> health reform</a>, <a href="https://publications.waset.org/abstracts/search?q=New%20Zealand" title=" New Zealand"> New Zealand</a> </p> <a href="https://publications.waset.org/abstracts/160132/community-strengths-and-indigenous-resilience-as-drivers-for-health-reform-change" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160132.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">76</span> Determinants of Youth Engagement with Health Information on Social Media Platforms in United Arab Emirates</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Niyi%20Awofeso">Niyi Awofeso</a>, <a href="https://publications.waset.org/abstracts/search?q=Yunes%20Gaber"> Yunes Gaber</a>, <a href="https://publications.waset.org/abstracts/search?q=Moyosola%20Bamidele"> Moyosola Bamidele</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Since most social media platforms are accessible anytime and anywhere where Internet connections and smartphones are available, the invisibility of the reader raises questions about accuracy, appropriateness and comprehensibility of social media communication. Furthermore, the identity and motives of individuals and organizations who post articles on social media sites are not always transparent. In the health sector, through socially networked platforms constitute a common source of health-related information, given their purported wealth of information. Nevertheless, fake blogs and sponsored postings for marketing 'natural cures' pervade most commonly used social media platforms, thus complicating readers’ abilities to access and understand trustworthy health-related information. This purposive sampling study of 120 participants aged 18-35 year in UAE was conducted between September and December 2017, and explored commonly used social media platforms, frequency of use of social media for accessing health related information, and approaches for assessing the trustworthiness of health information on social media platforms. Results indicate that WhatsApp (95%), Instagram (87%) and Youtube (82%) were the most commonly used social media platforms among respondents. Majority of respondents (81%) indicated that they regularly access social media to get health-associated information. More than half of respondents (55%) with non-chronic health status relied on unsolicited messages to obtain health-related information. Doctors’ health blogs (21%) and social media sites of international healthcare organizations (20%) constitute the most trusted source of health information among respondents, with UAE government health agencies’ social media accounts trusted by 15% of respondents. Cardiovascular diseases, diabetes, and hypertension were the most commonly searched topics on social media (29%), followed by nutrition (20%) and skin care (16%). Majority of respondents (41%) rely on reliability of hits on Google search engines, 22% check for health information only from 'reliable' social media sites, while 8% utilize 'logic' to ascertain reliability of health information. As social media has rapidly become an integral part of the health landscape, it is important that health care policy makers, healthcare providers and social media companies collaborate to promote the positive aspects of social media for young people, whilst mitigating the potential negatives. Utilizing popular social media platforms for posting reader-friendly health information will achieve high coverage. Improving youth digital literacy will facilitate easier access to trustworthy information on the internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20media" title="social media">social media</a>, <a href="https://publications.waset.org/abstracts/search?q=United%20Arab%20Emirates" title=" United Arab Emirates"> United Arab Emirates</a>, <a href="https://publications.waset.org/abstracts/search?q=youth%20engagement" title=" youth engagement"> youth engagement</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20literacy" title=" digital literacy"> digital literacy</a> </p> <a href="https://publications.waset.org/abstracts/99961/determinants-of-youth-engagement-with-health-information-on-social-media-platforms-in-united-arab-emirates" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99961.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">119</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">75</span> From the Lack of Trust Law to a Controversial Judicial Case Law: Implications for Perfecting Vietnam’s Legal System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Le%20Bich%20Thuy">Le Bich Thuy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A trust is an alien notion in Vietnamese law until 2021, which not only dissatisfies the practical demands of the nation’s civilians but also results in some detrimental shortcomings. The Judicial Case Law No 2 to be applied in adjudicating subsequent cases is a typical example of such negative consequences, implying a need for an application of trust law into Vietnam’s legal system. This paper first presents the similarity in nature between parties’ relationship in the mentioned case and a proprietary trust relationship, followed by an analysis of such a case from a trusted perspective. Subsequently, an introduction of potential obstacles hindering the introduction of trust law into the Vietnamese legal framework is presented. Finally, some implications are suggested for perfecting Vietnam’s legal system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vietnamese%20case%20law%20no%202" title="Vietnamese case law no 2">Vietnamese case law no 2</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20law" title=" trust law"> trust law</a>, <a href="https://publications.waset.org/abstracts/search?q=private%20property%20management" title=" private property management"> private property management</a>, <a href="https://publications.waset.org/abstracts/search?q=patrimony" title=" patrimony"> patrimony</a> </p> <a href="https://publications.waset.org/abstracts/144667/from-the-lack-of-trust-law-to-a-controversial-judicial-case-law-implications-for-perfecting-vietnams-legal-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144667.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">213</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">74</span> A Contribution to Blockchain Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malika%20Yaici">Malika Yaici</a>, <a href="https://publications.waset.org/abstracts/search?q=Feriel%20Lalaoui"> Feriel Lalaoui</a>, <a href="https://publications.waset.org/abstracts/search?q=Lydia%20Belhoul"> Lydia Belhoul</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As a new distributed point-to-point (P2P) technology, blockchain has become a very broad field of research, addressing various challenges, including privacy preserving, as is the case in all other technologies. In this work, a study of the existing solutions to the problems related to private life in general and in blockchains in particular is performed. User anonymity and transaction confidentiality are the two main challenges to the protection of privacy in blockchains. Mixing mechanisms and cryptographic solutions respond to this problem but remain subject to attacks and suffer from shortcomings. Taking into account these imperfections and the synthesis of our study, we present a mixing model without trusted third parties, based on group signatures, allowing reinforcing the anonymity of the users, the confidentiality of the transactions, with minimal turnaround time and without mixing costs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=blockchain" title=" blockchain"> blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=mixing%20coins" title=" mixing coins"> mixing coins</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a> </p> <a href="https://publications.waset.org/abstracts/194226/a-contribution-to-blockchain-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">12</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">73</span> Monocular Visual Odometry for Three Different View Angles by Intel Realsense T265 with the Measurement of Remote</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Heru%20Syah%20Putra">Heru Syah Putra</a>, <a href="https://publications.waset.org/abstracts/search?q=Aji%20Tri%20Pamungkas%20Nurcahyo"> Aji Tri Pamungkas Nurcahyo</a>, <a href="https://publications.waset.org/abstracts/search?q=Chuang-Jan%20Chang"> Chuang-Jan Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> MOIL-SDK method refers to the spatial angle that forms a view with a different perspective from the Fisheye image. Visual Odometry forms a trusted application for extending projects by tracking using image sequences. A real-time, precise, and persistent approach that is able to contribute to the work when taking datasets and generate ground truth as a reference for the estimates of each image using the FAST Algorithm method in finding Keypoints that are evaluated during the tracking process with the 5-point Algorithm with RANSAC, as well as produce accurate estimates the camera trajectory for each rotational, translational movement on the X, Y, and Z axes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MOIL-SDK" title="MOIL-SDK">MOIL-SDK</a>, <a href="https://publications.waset.org/abstracts/search?q=intel%20realsense%20T265" title=" intel realsense T265"> intel realsense T265</a>, <a href="https://publications.waset.org/abstracts/search?q=Fisheye%20image" title=" Fisheye image"> Fisheye image</a>, <a href="https://publications.waset.org/abstracts/search?q=monocular%20visual%20odometry" title=" monocular visual odometry"> monocular visual odometry</a> </p> <a href="https://publications.waset.org/abstracts/147340/monocular-visual-odometry-for-three-different-view-angles-by-intel-realsense-t265-with-the-measurement-of-remote" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147340.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">72</span> Preschoolers’ Selective Trust in Moral Promises</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuanxia%20Zheng">Yuanxia Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Min%20Zhong"> Min Zhong</a>, <a href="https://publications.waset.org/abstracts/search?q=Cong%20Xin"> Cong Xin</a>, <a href="https://publications.waset.org/abstracts/search?q=Guoxiong%20Liu"> Guoxiong Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Liqi%20Zhu"> Liqi Zhu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Trust is a critical foundation of social interaction and development, playing a significant role in the physical and mental well-being of children, as well as their social participation. Previous research has demonstrated that young children do not blindly trust others but make selective trust judgments based on available information. The characteristics of speakers can influence children’s trust judgments. According to Mayer et al.’s model of trust, these characteristics of speakers, including ability, benevolence, and integrity, can influence children’s trust judgments. While previous research has focused primarily on the effects of ability and benevolence, there has been relatively little attention paid to integrity, which refers to individuals’ adherence to promises, fairness, and justice. This study focuses specifically on how keeping/breaking promises affects young children’s trust judgments. The paradigm of selective trust was employed in two experiments. A sample size of 100 children was required for an effect size of w = 0.30,α = 0.05,1-β = 0.85, using G*Power 3.1. This study employed a 2×2 within-subjects design to investigate the effects of moral valence of promises (within-subjects factor: moral vs. immoral promises), and fulfilment of promises (within-subjects factor: kept vs. broken promises) on children’s trust judgments (divided into declarative and promising contexts). In Experiment 1 adapted binary choice paradigms, presenting 118 preschoolers (62 girls, Mean age = 4.99 years, SD = 0.78) with four conflict scenarios involving the keeping or breaking moral/immoral promises, in order to investigate children’s trust judgments. Experiment 2 utilized single choice paradigms, in which 112 preschoolers (57 girls, Mean age = 4.94 years, SD = 0.80) were presented four stories to examine their level of trust. The results of Experiment 1 showed that preschoolers selectively trusted both promisors who kept moral promises and those who broke immoral promises, as well as their assertions and new promises. Additionally, the 5.5-6.5-year-old children are more likely to trust both promisors who keep moral promises and those who break immoral promises more than the 3.5- 4.5-year-old children. Moreover, preschoolers are more likely to make accurate trust judgments towards promisor who kept moral promise compared to those who broke immoral promises. The results of Experiment 2 showed significant differences of preschoolers’ trust degree: kept moral promise > broke immoral promise > broke moral promise ≈ kept immoral promise. This study is the first to investigate the development of trust judgement in moral promise among preschoolers aged 3.5-6.5. The results show that preschoolers can consider both valence and fulfilment of promises when making trust judgments. Furthermore, as preschoolers mature, they become more inclined to trust promisors who keep moral promises and those who break immoral promises. Additionally, the study reveals that preschoolers have the highest level of trust in promisors who kept moral promises, followed by those who broke immoral promises. Promisors who broke moral promises and those who kept immoral promises are trusted the least. These findings contribute valuable insights to our understanding of moral promises and trust judgment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=promise" title="promise">promise</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a>, <a href="https://publications.waset.org/abstracts/search?q=moral%20judgement" title=" moral judgement"> moral judgement</a>, <a href="https://publications.waset.org/abstracts/search?q=preschoolers" title=" preschoolers"> preschoolers</a> </p> <a href="https://publications.waset.org/abstracts/186290/preschoolers-selective-trust-in-moral-promises" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/186290.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">54</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">71</span> New Media Impact on Newspaper Readership</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umar%20Lawal%20Maradun">Umar Lawal Maradun</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Newspapers are very important sources of information and are trusted by majority of populations in America, Latin America, Europe and many parts of the world. In the mid-1950s newspapers were at the forefront of providing people with information. However, in the 1970s television took over, while in the 1980s cable satellites became popular and in the 1990s the Internet and World Wide Web became major sources of media content and also major threats to the print media form. This paper looks at how newspaper readership has been affected by new media technology, especially the Internet. It uses empirical data by reviewing available literature within the context of change that is likely to threaten conventional media. It discovers that there is a growing decline in newspaper readership as a result of widespread use of the Internet. The decline in readership has been discovered to be a global phenomenon. The paper suggests strategies for the survival and revenue generation for print-based newspapers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Internet" title="Internet">Internet</a>, <a href="https://publications.waset.org/abstracts/search?q=media" title=" media"> media</a>, <a href="https://publications.waset.org/abstracts/search?q=newspaper" title=" newspaper"> newspaper</a>, <a href="https://publications.waset.org/abstracts/search?q=press" title=" press"> press</a> </p> <a href="https://publications.waset.org/abstracts/38663/new-media-impact-on-newspaper-readership" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/38663.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">251</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">70</span> USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nir%20Nissim">Nir Nissim</a>, <a href="https://publications.waset.org/abstracts/search?q=Ran%20Yahalom"> Ran Yahalom</a>, <a href="https://publications.waset.org/abstracts/search?q=Tomer%20Lancewiki"> Tomer Lancewiki</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuval%20Elovici"> Yuval Elovici</a>, <a href="https://publications.waset.org/abstracts/search?q=Boaz%20Lerner"> Boaz Lerner</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=USB" title="USB">USB</a>, <a href="https://publications.waset.org/abstracts/search?q=device" title=" device"> device</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20security" title=" cyber security"> cyber security</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a>, <a href="https://publications.waset.org/abstracts/search?q=detection" title=" detection"> detection</a> </p> <a href="https://publications.waset.org/abstracts/50734/usbware-a-trusted-and-multidisciplinary-framework-for-enhanced-detection-of-usb-based-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50734.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">398</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">69</span> Using Focus Group Method to Identify Citizen Requirements to Saudi Mobile Government Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Alotaibi">S. Alotaibi</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Roussinov"> D. Roussinov</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile government services implementation faces several challenges in developing countries. This paper studies some of those challenges in the context of Saudi Arabia. The study aims to investigate factors affecting m-government acceptance in Saudi Arabia, including ease of use, usefulness, service quality, trust, intention to use and users’ satisfaction. Our investigation will help in integrating the m-government services in citizens’ everyday life. We collected and analyzed our data from focus groups. These focus groups are from King Saud University and Imam Muhammed Bin Saud University, so the samples size are five and seven participants, respectively. We found that there are some factors to identifying citizen requirements to Saudi mobile government services. These services should be easy to use and not require too much effort. Also, these services must be fully trusted. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-government" title="e-government">e-government</a>, <a href="https://publications.waset.org/abstracts/search?q=m-government" title=" m-government"> m-government</a>, <a href="https://publications.waset.org/abstracts/search?q=focus%20group" title=" focus group"> focus group</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20mobile%20government%20services" title=" Saudi mobile government services"> Saudi mobile government services</a> </p> <a href="https://publications.waset.org/abstracts/59830/using-focus-group-method-to-identify-citizen-requirements-to-saudi-mobile-government-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">68</span> Governance Framework for an Emerging Trust Ecosystem with a Blockchain-Based Supply Chain</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ismael%20%C3%81vila">Ismael Ávila</a>, <a href="https://publications.waset.org/abstracts/search?q=Jos%C3%A9%20Reynaldo%20F.%20Filho"> José Reynaldo F. Filho</a>, <a href="https://publications.waset.org/abstracts/search?q=Vasco%20Varanda%20Picchi"> Vasco Varanda Picchi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The ever-growing consumer awareness of food provenance in Brazil is driving the creation of a trusted ecosystem around the animal protein supply chain. The traceability and accountability requirements of such an ecosystem demand a blockchain layer to strengthen the weak links in that chain. For that, direct involvement of the companies in the blockchain transactions, including as validator nodes of the network, implies formalizing a partnership with the consortium behind the ecosystem. Yet, their compliance standards usually require that a formal governance structure is in place before they agree with any membership terms. In light of such a strategic role of blockchain governance, the paper discusses a framework for tailoring a governance model for a blockchain-based solution aimed at the meat supply chain and evaluates principles and attributes in terms of their relevance to the development of a robust trust ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=governance" title=" governance"> governance</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20ecosystem" title=" trust ecosystem"> trust ecosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=supply%20chain" title=" supply chain"> supply chain</a>, <a href="https://publications.waset.org/abstracts/search?q=traceability" title=" traceability"> traceability</a> </p> <a href="https://publications.waset.org/abstracts/153296/governance-framework-for-an-emerging-trust-ecosystem-with-a-blockchain-based-supply-chain" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">67</span> Technological Applications in Automobile Manufacturing Sector - A Case Study Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raja%20Kannusamy">Raja Kannusamy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The research focuses on the applicable technologies in the automobile industry and their effects on the productivity and annual revenue of the industry. A study has been conducted on 6 major automobile manufacturing industries represented in this research as M1, M2, M3, M4, M5 and M6. The results indicate that M1, which is a pioneer in technological applications, remains the market leader, followed by M5 & M2 taking the second and third positions, respectively. M3, M6 and M4 are the followers and are placed next in positions. It has also been observed that M1 and M2 have entered into an agreement to share the basic structural technologies and they maintain long-term and trusted relationships with their suppliers through the Keiretsu system. With technological giants such as Apple, Microsoft, Uber and Google entering the automobile industry in recent years, an upward trend is expected in the futuristic market with self-driving cars to dominate the automobile sector. To keep up with the market trend, it is essential for automobile manufacturers to understand the importance of developing technological capabilities and skills to be competitive in the marketplace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=automobile%20manufacturing%20industries" title="automobile manufacturing industries">automobile manufacturing industries</a>, <a href="https://publications.waset.org/abstracts/search?q=competitiveness" title=" competitiveness"> competitiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20improvement" title=" performance improvement"> performance improvement</a>, <a href="https://publications.waset.org/abstracts/search?q=technological%20applications" title=" technological applications"> technological applications</a> </p> <a href="https://publications.waset.org/abstracts/141724/technological-applications-in-automobile-manufacturing-sector-a-case-study-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/141724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">175</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> Digital Watermarking Based on Visual Cryptography and Histogram</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Rama%20Kishore">R. Rama Kishore</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunesh"> Sunesh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20watermarking" title="digital watermarking">digital watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=visual%20cryptography" title=" visual cryptography"> visual cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=histogram" title=" histogram"> histogram</a>, <a href="https://publications.waset.org/abstracts/search?q=butter%20worth%20filter" title=" butter worth filter"> butter worth filter</a> </p> <a href="https://publications.waset.org/abstracts/48320/digital-watermarking-based-on-visual-cryptography-and-histogram" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48320.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> Application of Neural Networks to Predict Changing the Diameters of Bubbles in Pool Boiling Distilled Water</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=V.%20Nikkhah%20Rashidabad">V. Nikkhah Rashidabad</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Manteghian"> M. Manteghian</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Masoumi"> M. Masoumi</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Mousavian"> S. Mousavian</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Ashouri"> D. Ashouri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this research, the capability of neural networks in modeling and learning complicated and nonlinear relations has been used to develop a model for the prediction of changes in the diameter of bubbles in pool boiling distilled water. The input parameters used in the development of this network include element temperature, heat flux, and retention time of bubbles. The test data obtained from the experiment of the pool boiling of distilled water, and the measurement of the bubbles form on the cylindrical element. The model was developed based on training algorithm, which is typologically of back-propagation type. Considering the correlation coefficient obtained from this model is 0.9633. This shows that this model can be trusted for the simulation and modeling of the size of bubble and thermal transfer of boiling. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bubble%20diameter" title="bubble diameter">bubble diameter</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20flux" title=" heat flux"> heat flux</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=training%20algorithm" title=" training algorithm"> training algorithm</a> </p> <a href="https://publications.waset.org/abstracts/2793/application-of-neural-networks-to-predict-changing-the-diameters-of-bubbles-in-pool-boiling-distilled-water" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2793.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">443</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Flexible and Integrated Transport System in India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aayushi%20Patidar">Aayushi Patidar</a>, <a href="https://publications.waset.org/abstracts/search?q=Nishant%20Parihar"> Nishant Parihar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the principal causes of failure in existing vehicle brokerage solutions is that they require the introduction of a single trusted third party to whom transport offers and requirements are sent, and which solves the scheduling problem. Advances in planning and scheduling could be utilized to address the scalability issues inherent here, but such refinements do not address the key need to decentralize decision-making. This is not to say that matchmaking of potential transport suppliers to consumers is not essential, but information from such a service should inform rather than determining the transport options for customers. The approach that is proposed, is the use of intelligent commuters that act within the system and to identify options open to users, weighing the evidence for desirability of each option given a model of the user’s priorities, and to drive dialogue among commuters in aiding users to solve their individual (or collective) transport goals. Existing research in commuter support for transport resource management has typically been focused on the provider. Our vision is to explore both the efficient use of limited transport resources and also to support the passengers in the transportation flexibility & integration among various modes in India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=flexibility" title="flexibility">flexibility</a>, <a href="https://publications.waset.org/abstracts/search?q=integration" title=" integration"> integration</a>, <a href="https://publications.waset.org/abstracts/search?q=service%20design" title=" service design"> service design</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/28118/flexible-and-integrated-transport-system-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28118.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">352</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> Mobile Agent Security Using Reference Monitor Based Security Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sandhya%20Armoogum">Sandhya Armoogum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20agents" title=" mobile agents"> mobile agents</a>, <a href="https://publications.waset.org/abstracts/search?q=reference%20monitor" title=" reference monitor"> reference monitor</a>, <a href="https://publications.waset.org/abstracts/search?q=trust" title=" trust"> trust</a> </p> <a href="https://publications.waset.org/abstracts/31788/mobile-agent-security-using-reference-monitor-based-security-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31788.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">440</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Meshari%20Aljohani">Meshari Aljohani</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephan%20Olariu"> Stephan Olariu</a>, <a href="https://publications.waset.org/abstracts/search?q=Ravi%20Mukkamala"> Ravi Mukkamala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blockchain" title="blockchain">blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20marketplace" title=" data marketplace"> data marketplace</a>, <a href="https://publications.waset.org/abstracts/search?q=smart%20contract" title=" smart contract"> smart contract</a>, <a href="https://publications.waset.org/abstracts/search?q=reputation%20system" title=" reputation system"> reputation system</a> </p> <a href="https://publications.waset.org/abstracts/149122/decentralized-data-marketplace-framework-using-blockchain-based-smart-contract" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149122.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">158</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> Functional Specifications of Diesel Electric Locomotives</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rohan%20Sarker">Rohan Sarker</a>, <a href="https://publications.waset.org/abstracts/search?q=Cory%20Smith"> Cory Smith</a> </p> <p class="card-text"><strong>Abstract:</strong></p> ROMIC Group UK is a leading provider of diesel electric locomotives, specializing in innovative and efficient solutions for rail transportation. With a strong focus on sustainability and performance, ROMIC's diesel electric locomotives are engineered to reduce fuel consumption while maximizing operational efficiency. The company's locomotives incorporate advanced technologies such as regenerative braking systems and precision control software, which enhance fuel economy and minimize environmental impact. ROMIC's extensive experience in the rail sector enables it to deliver reliable and powerful locomotives that meet the demands of both freight and passenger services. These locomotives are designed for heavy-duty applications, offering superior traction and load-carrying capacity across various terrains. The company's commitment to cutting-edge engineering and customer satisfaction ensures that its locomotives are a trusted choice for rail operators looking for high performance and low operational costs. ROMIC Group UK continues to drive innovation in the rail industry with its sustainable locomotive solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=diesel" title="diesel">diesel</a>, <a href="https://publications.waset.org/abstracts/search?q=electric" title=" electric"> electric</a>, <a href="https://publications.waset.org/abstracts/search?q=engines" title=" engines"> engines</a>, <a href="https://publications.waset.org/abstracts/search?q=locomotives" title=" locomotives"> locomotives</a> </p> <a href="https://publications.waset.org/abstracts/191488/functional-specifications-of-diesel-electric-locomotives" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/191488.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">18</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Hilani">M. Hilani</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20Nassih"> B. Nassih</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=e-mail" title=" e-mail"> e-mail</a>, <a href="https://publications.waset.org/abstracts/search?q=NLP%20preprocessing" title=" NLP preprocessing"> NLP preprocessing</a>, <a href="https://publications.waset.org/abstracts/search?q=CNN" title=" CNN"> CNN</a>, <a href="https://publications.waset.org/abstracts/search?q=e-mail%20filtering" title=" e-mail filtering"> e-mail filtering</a> </p> <a href="https://publications.waset.org/abstracts/157571/email-phishing-detection-using-natural-language-processing-and-convolutional-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Identifying Family Needs, Support, and Barriers for More Effective Involvement in Early Intervention Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadeem%20A.%20Alolayan">Sadeem A. Alolayan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of early intervention (EI) programs and services is to minimize the impact of disability on children ages 0-5 and to reduce future special education costs. This literature review identifies the status of families of children with special needs. Four major themes emerged from this literature review. The first was the family’s needs and the expressed desire for services to be obtained or outcomes to be achieved. The second was family support, meaning any information or skills needed to facilitate parents’ role as professionals in order to enable them to train and provide their child with the best quality of life. The third theme, barriers, was defined as parents’ actions or life circumstances that hindered families in obtaining appropriate EI services. The conclusions derived from the recommendations are that effective parent participation involves careful planning, establishing and maintaining a trusted rapport between parents, and EI providers that understand parents’ individual needs and interests, thus motivating effective parent involvement in early intervention programs. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=early%20intervention" title="early intervention">early intervention</a>, <a href="https://publications.waset.org/abstracts/search?q=individuals%20with%20disabilities%20education%20act" title=" individuals with disabilities education act"> individuals with disabilities education act</a>, <a href="https://publications.waset.org/abstracts/search?q=parents" title=" parents"> parents</a>, <a href="https://publications.waset.org/abstracts/search?q=recommendations" title=" recommendations"> recommendations</a> </p> <a href="https://publications.waset.org/abstracts/147272/identifying-family-needs-support-and-barriers-for-more-effective-involvement-in-early-intervention-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147272.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">196</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Husnul%20Isa%20Harahap">Husnul Isa Harahap</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Islamic%20values" title="Islamic values">Islamic values</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20movement" title=" social movement"> social movement</a>, <a href="https://publications.waset.org/abstracts/search?q=peaceful%20group" title=" peaceful group"> peaceful group</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20issue" title=" sensitive issue"> sensitive issue</a> </p> <a href="https://publications.waset.org/abstracts/71566/the-third-islamic-defend-action-the-completeness-model-of-islamic-peace-movement-in-indonesia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71566.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trusted&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trusted&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trusted&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>