scholarly journals A collaborative approach for national cybersecurity incident management

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Oluwafemi Oriola ◽  
Adesesan Barnabas Adeyemo ◽  
Maria Papadaki ◽  
Eduan Kotzé

Purpose Collaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of security skills. However, no existing collaborative approach has been able to cater for multiple regulators, divergent incident views and incident reputation trust issues that national cybersecurity incident management presents. This paper aims to propose a collaborative approach to handle these issues cost-effectively. Design/methodology/approach A collaborative-based national cybersecurity incident management architecture based on ITU-T X.1056 security incident management framework is proposed. It is composed of the cooperative regulatory unit with cooperative and third-party management strategies and an execution unit, with incident handling and response strategies. Novel collaborative incident prioritization and mitigation planning models that are fit for incident handling in national cybersecurity incident management are proposed. Findings Use case depicting how the collaborative-based national cybersecurity incident management would function within a typical information and communication technology ecosystem is illustrated. The proposed collaborative approach is evaluated based on the performances of an experimental cyber-incident management system against two multistage attack scenarios. The results show that the proposed approach is more reliable compared to the existing ones based on descriptive statistics. Originality/value The approach produces better incident impact scores and rankings than standard tools. The approach reduces the total response costs by 8.33% and false positive rate by 97.20% for the first attack scenario, while it reduces the total response costs by 26.67% and false positive rate by 78.83% for the second attack scenario.

2019 ◽  
Author(s):  
Amanda Kvarven ◽  
Eirik Strømland ◽  
Magnus Johannesson

Andrews & Kasy (2019) propose an approach for adjusting effect sizes in meta-analysis for publication bias. We use the Andrews-Kasy estimator to adjust the result of 15 meta-analyses and compare the adjusted results to 15 large-scale multiple labs replication studies estimating the same effects. The pre-registered replications provide precisely estimated effect sizes, which do not suffer from publication bias. The Andrews-Kasy approach leads to a moderate reduction of the inflated effect sizes in the meta-analyses. However, the approach still overestimates effect sizes by a factor of about two or more and has an estimated false positive rate of between 57% and 100%.


2015 ◽  
Vol 2015 ◽  
pp. 1-12
Author(s):  
Siyu Lin ◽  
Hao Wu

Cyber-physical systems (CPSs) connect with the physical world via communication networks, which significantly increases security risks of CPSs. To secure the sensitive data, secure forwarding is an essential component of CPSs. However, CPSs require high dimensional multiattribute and multilevel security requirements due to the significantly increased system scale and diversity, and hence impose high demand on the secure forwarding information query and storage. To tackle these challenges, we propose a practical secure data forwarding scheme for CPSs. Considering the limited storage capability and computational power of entities, we adopt bloom filter to store the secure forwarding information for each entity, which can achieve well balance between the storage consumption and query delay. Furthermore, a novel link-based bloom filter construction method is designed to reduce false positive rate during bloom filter construction. Finally, the effects of false positive rate on the performance of bloom filter-based secure forwarding with different routing policies are discussed.


2021 ◽  
Author(s):  
Ying-Shi Sun ◽  
Yu-Hong Qu ◽  
Dong Wang ◽  
Yi Li ◽  
Lin Ye ◽  
...  

Abstract Background: Computer-aided diagnosis using deep learning algorithms has been initially applied in the field of mammography, but there is no large-scale clinical application.Methods: This study proposed to develop and verify an artificial intelligence model based on mammography. Firstly, retrospectively collected mammograms from six centers were randomized to a training dataset and a validation dataset for establishing the model. Secondly, the model was tested by comparing 12 radiologists’ performance with and without it. Finally, prospectively multicenter mammograms were diagnosed by radiologists with the model. The detection and diagnostic capabilities were evaluated using the free-response receiver operating characteristic (FROC) curve and ROC curve.Results: The sensitivity of model for detecting lesion after matching was 0.908 for false positive rate of 0.25 in unilateral images. The area under ROC curve (AUC) to distinguish the benign from malignant lesions was 0.855 (95% CI: 0.830, 0.880). The performance of 12 radiologists with the model was higher than that of radiologists alone (AUC: 0.852 vs. 0.808, P = 0.005). The mean reading time of with the model was shorter than that of reading alone (80.18 s vs. 62.28 s, P = 0.03). In prospective application, the sensitivity of detection reached 0.887 at false positive rate of 0.25; the AUC of radiologists with the model was 0.983 (95% CI: 0.978, 0.988), with sensitivity, specificity, PPV, and NPV of 94.36%, 98.07%, 87.76%, and 99.09%, respectively.Conclusions: The artificial intelligence model exhibits high accuracy for detecting and diagnosing breast lesions, improves diagnostic accuracy and saves time.Trial registration: NCT, NCT03708978. Registered 17 April 2018, https://register.clinicaltrials.gov/prs/app/ NCT03708978


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Josephine S.F. Chow ◽  
Andrew Hopkins ◽  
Hany Dimitri ◽  
Hui Tie ◽  
Rachael Williams ◽  
...  

PurposeThis study has demonstrated how technology may contribute to integrated care solutions by comparing conventional ward telemetry (WT) to a wearable ECG monitor (S-Patch) to detect atrial fibrillation (AF) in patients with stroke.Design/methodology/approach51 patients admitted for stroke workup were recruited across two major tertiary centres to compare WT monitoring for two days versus S-Patch for four days in the detection of AF. The efficacy to detect AF using both technologies was assessed via data extractions and medical officer review. A matrix was used to measure nursing/patient satisfaction and setup/resource times were assessed.FindingsPatients (84–94%) and nursing staff (75–95%) preferred the S-Patch wearable technology. Non-parametric tests indicated significant time saving for removal of S-Patch versus WT [2.2 min vs 5.1 min (p = 0.00)]. Efficacy of S-Patch to detect AF following medical officer review was greater than WT, with seven patients identified with AF by S-Patch versus one using WT. The S-patch had a false positive rate of 78%.Research limitations/implicationsThe S-Patch is sensitive in the detection of AF; however, it showed a high false-positive rate with automated reporting. This study has provided insight into the details of delivery of integrated healthcare using wearable technology.Originality/valueThe technology and partnership were the first-in-kind in Australia. The S-Patch had a higher detection rate of AF compared to WT which allows patients to be anti-coagulated appropriately for the prevention of further stroke. The results of this study will be ideally placed to inform future policy in integrated healthcare using new technologies.


2014 ◽  
Vol 81 (5) ◽  
pp. 1735-1743 ◽  
Author(s):  
Timothy R. Julian ◽  
M. Aminul Islam ◽  
Amy J. Pickering ◽  
Subarna Roy ◽  
Erica R. Fuhrmeister ◽  
...  

ABSTRACTThe increased awareness of the role of environmental matrices in enteric disease transmission has resulted in the need for rapid, field-based methods for fecal indicator bacteria and pathogen detection. Evidence of the specificity of β-glucuronidase-based assays for detection ofEscherichia colifrom environmental matrices relevant to enteric pathogen transmission in developing countries, such as hands, soils, and surfaces, is limited. In this study, we quantify the false-positive rate of a β-glucuronidase-basedE. colidetection assay (Colilert) for two environmental reservoirs in Bangladeshi households (hands and soils) and three fecal composite sources (cattle, chicken, and humans). We investigate whether or not the isolation source ofE. coliinfluences phenotypic and genotypic characteristics. Phenotypic characteristics include results of biochemical assays provided by the API-20E test; genotypic characteristics include the Clermont phylogroup and the presence of enteric and/or environmental indicator genessfmH,rfaI, andfucK. Our findings demonstrate no statistically significant difference in the false-positive rate of Colilert for environmental compared to enteric samples.E. coliisolates from all source types are genetically diverse, representing six of the seven phylogroups, and there is no difference in relative frequency of phylogroups between enteric and environmental samples. We conclude that Colilert, and likely other β-glucuronidase-based assays, is appropriate for detection ofE. colion hands and in soils with low false-positive rates. Furthermore,E. coliisolated from hands and soils in Bangladeshi households are diverse and indistinguishable from cattle, chicken, and human fecal isolates, using traditional biochemical assays and phylogrouping.


2016 ◽  
Vol 46 (4) ◽  
pp. 524-548 ◽  
Author(s):  
Shrawan Kumar Trivedi ◽  
Shubhamoy Dey

Purpose The email is an important medium for sharing information rapidly. However, spam, being a nuisance in such communication, motivates the building of a robust filtering system with high classification accuracy and good sensitivity towards false positives. In that context, this paper aims to present a combined classifier technique using a committee selection mechanism where the main objective is to identify a set of classifiers so that their individual decisions can be combined by a committee selection procedure for accurate detection of spam. Design/methodology/approach For training and testing of the relevant machine learning classifiers, text mining approaches are used in this research. Three data sets (Enron, SpamAssassin and LingSpam) have been used to test the classifiers. Initially, pre-processing is performed to extract the features associated with the email files. In the next step, the extracted features are taken through a dimensionality reduction method where non-informative features are removed. Subsequently, an informative feature subset is selected using genetic feature search. Thereafter, the proposed classifiers are tested on those informative features and the results compared with those of other classifiers. Findings For building the proposed combined classifier, three different studies have been performed. The first study identifies the effect of boosting algorithms on two probabilistic classifiers: Bayesian and Naïve Bayes. In that study, AdaBoost has been found to be the best algorithm for performance boosting. The second study was on the effect of different Kernel functions on support vector machine (SVM) classifier, where SVM with normalized polynomial (NP) kernel was observed to be the best. The last study was on combining classifiers with committee selection where the committee members were the best classifiers identified by the first study i.e. Bayesian and Naïve bays with AdaBoost, and the committee president was selected from the second study i.e. SVM with NP kernel. Results show that combining of the identified classifiers to form a committee machine gives excellent performance accuracy with a low false positive rate. Research limitations/implications This research is focused on the classification of email spams written in English language. Only body (text) parts of the emails have been used. Image spam has not been included in this work. We have restricted our work to only emails messages. None of the other types of messages like short message service or multi-media messaging service were a part of this study. Practical implications This research proposes a method of dealing with the issues and challenges faced by internet service providers and organizations that use email. The proposed model provides not only better classification accuracy but also a low false positive rate. Originality/value The proposed combined classifier is a novel classifier designed for accurate classification of email spam.


2019 ◽  
Vol 9 (4) ◽  
pp. 737-747 ◽  
Author(s):  
Akarsh Aggarwal ◽  
Anuj Rani ◽  
Manoj Kumar

Purpose The purpose of this paper is to explore the challenges faced by the automatic recognition systems over the conventional systems by implementing a novel approach for detecting and recognizing the vehicle license plates in order to increase the security of the vehicles. This will also increase the societal discipline among vehicle users. Design/methodology/approach From a methodological point of view, the proposed system works in three phases which includes the pre-processing of the input image from the database, applying segmentation to the processed image, and finally extracting and recognizing the image of the license plate. Findings The proposed paper provides an analysis that demonstrates the correctness of the algorithm to correctly capture the license plate using performance metrics such as detection rate and false positive rate. The obtained results demonstrate that the proposed algorithm detects vehicle license plates and provides detection rate of 93.34 percent with false positive rate of 6.65 percent. Research limitations/implications The proposed license plate detection system eliminates the need of manually used systems for managing the traffic by installing the toll-booths on freeways and bridges. The design implemented in this paper attempts to capture the license plate by using three phase detection process that helps to increase the level of security and contribute in making a sustainable city. Originality/value This paper presents a distinctive approach to detect the license plate of the vehicles using the various image processing techniques such as dilation, grey-scale conversion, edge processing, etc. and finding the region of interest of the segmented image to capture the license plate of the vehicles.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
K. Sujatha ◽  
V. Udayarani

PurposeThe purpose of this paper is to improve the privacy in healthcare datasets that hold sensitive information. Putting a stop to privacy divulgence and bestowing relevant information to legitimate users are at the same time said to be of differing goals. Also, the swift evolution of big data has put forward considerable ease to all chores of life. As far as the big data era is concerned, propagation and information sharing are said to be the two main facets. Despite several research works performed on these aspects, with the incremental nature of data, the likelihood of privacy leakage is also substantially expanded through various benefits availed of big data. Hence, safeguarding data privacy in a complicated environment has become a major setback.Design/methodology/approachIn this study, a method called deep restricted additive homomorphic ElGamal privacy preservation (DR-AHEPP) to preserve the privacy of data even in case of incremental data is proposed. An entropy-based differential privacy quasi identification and DR-AHEPP algorithms are designed, respectively, for obtaining privacy-preserved minimum falsified quasi-identifier set and computationally efficient privacy-preserved data.FindingsAnalysis results using Diabetes 130-US hospitals illustrate that the proposed DR-AHEPP method is more significant in preserving privacy on incremental data than existing methods. A comparative analysis of state-of-the-art works with the objective to minimize information loss, false positive rate and execution time with higher accuracy is calibrated.Originality/valueThe paper provides better performance using Diabetes 130-US hospitals for achieving high accuracy, low information loss and false positive rate. The result illustrates that the proposed method increases the accuracy by 4% and reduces the false positive rate and information loss by 25 and 35%, respectively, as compared to state-of-the-art works.


2002 ◽  
Vol 41 (01) ◽  
pp. 37-41 ◽  
Author(s):  
S. Shung-Shung ◽  
S. Yu-Chien ◽  
Y. Mei-Due ◽  
W. Hwei-Chung ◽  
A. Kao

Summary Aim: Even with careful observation, the overall false-positive rate of laparotomy remains 10-15% when acute appendicitis was suspected. Therefore, the clinical efficacy of Tc-99m HMPAO labeled leukocyte (TC-WBC) scan for the diagnosis of acute appendicitis in patients presenting with atypical clinical findings is assessed. Patients and Methods: Eighty patients presenting with acute abdominal pain and possible acute appendicitis but atypical findings were included in this study. After intravenous injection of TC-WBC, serial anterior abdominal/pelvic images at 30, 60, 120 and 240 min with 800k counts were obtained with a gamma camera. Any abnormal localization of radioactivity in the right lower quadrant of the abdomen, equal to or greater than bone marrow activity, was considered as a positive scan. Results: 36 out of 49 patients showing positive TC-WBC scans received appendectomy. They all proved to have positive pathological findings. Five positive TC-WBC were not related to acute appendicitis, because of other pathological lesions. Eight patients were not operated and clinical follow-up after one month revealed no acute abdominal condition. Three of 31 patients with negative TC-WBC scans received appendectomy. They also presented positive pathological findings. The remaining 28 patients did not receive operations and revealed no evidence of appendicitis after at least one month of follow-up. The overall sensitivity, specificity, accuracy, positive and negative predictive values for TC-WBC scan to diagnose acute appendicitis were 92, 78, 86, 82, and 90%, respectively. Conclusion: TC-WBC scan provides a rapid and highly accurate method for the diagnosis of acute appendicitis in patients with equivocal clinical examination. It proved useful in reducing the false-positive rate of laparotomy and shortens the time necessary for clinical observation.


Sign in / Sign up

Export Citation Format

Share Document