As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking alg...As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking algorithm such as term frequency,link analysis(PageRank algorithm and HITS algorithm)etc.However,these algorithms must combine the keyword frequency to determine the relevance between user’s query and the data in the computer system or internet.Moreover,we expect the search engines could understand users’searching by content meanings rather than literal strings.Semantic Web is an intelligent network and it could understand human’s language more semantically and make the communication easier between human and computers.But,the current technology for the semantic search is hard to apply.Because some meta data should be annotated to each web pages,then the search engine will have the ability to understand the users intend.However,annotate every web page is very time-consuming and leads to inefficiency.So,this study designed an ontology-based approach to improve the current traditional keyword-based search and emulate the effects of semantic search.And let the search engine can understand users more semantically when it gets the knowledge.展开更多
Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologi...Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.展开更多
Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These ap...Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These applications help individuals track their own biorhythms and contain sensitive information.This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks.We first develop and justify a mobile OWASP Cryptographic knowledge-graph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography.We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications.Our findings show that none of the open source healthcare applications correctly applied cryptography in all elements of their applications.As humans adopt healthcare applications for managing their health routines,it is essential that they consider the privacy and security risks they are accepting when sharing their data.Furthermore,many open source applications and developers have certain environmental parameters which do not mandate adherence to regulations.In addition to creating new free tools for security risk identifications during software development such as standalone or compiler-embedded,the article suggests awareness and training modules for developers prior to marketplace software release.展开更多
The relationship between air pollution and cerebrovascular disease has become a popular topic,yet research findings are highly heterogeneous.This study aims to investigate this association based on detailed individual...The relationship between air pollution and cerebrovascular disease has become a popular topic,yet research findings are highly heterogeneous.This study aims to investigate this association based on detailed individual health data and a precise evaluation of their exposure levels.The integrated models of generalized additive model,land use regression model and back propagation neural network were used to evaluate the exposure concentrations.And doubly robust additive model was conducted to explore the association between cerebrovascular disease and air pollution after adjusted for demographic characteristics,physical examination,disease information,geographic and socioeconomic status.A total of 25097 subjects were included in the Beijing Health Management Cohort from 2013 to 2018.With a 1µg/m^(3)increase in the concentrations of PM_(2.5),SO_(2)and NO_(2),the incidence risk of cerebrovascular disease increased by 1.02(95%CI:1.008–1.034),1.06(95%CI:1.034–1.095)and 1.02(95%CI:1.010–1.029)respectively.Whereas CO exposure could decrease the risk,with an odds ratio of 0.38(95%CI:0.212–0.626).In the subgroup analysis,individuals under the age of 50 with normal BMI were at higher risk caused by PM2.5,and So2 was considered more hazardous to women.Meanwhile,the protective effect of CO on women and those with normal BMI was stronger.Successful reduction of long-term exposure to PM2.5,SO_(2)and NO_(2)would lead to substantial benefits for decrease the risk of cerebrovascular disease especially for the health of the susceptible individuals.展开更多
基金funded by National Natural Science Foundation of China(8177120753)China-Australia International Collaborative Grant(NHMRC APP1112767,NSFC 81561128020)to Wei Wang+1 种基金Zhiyuan Wu was supported by the China Scholarship Council(201908110447)Yulu Zheng and Zheng Guo were supported by the Edith Cowan University Higher Degree by Research Scholarship(ECU-HDR ST10469322 and ST10468211).
文摘As the tsunami of data has emerged,search engines have become the most powerful tool for obtaining scattered information on the internet.The traditional search engines return the organized results by using ranking algorithm such as term frequency,link analysis(PageRank algorithm and HITS algorithm)etc.However,these algorithms must combine the keyword frequency to determine the relevance between user’s query and the data in the computer system or internet.Moreover,we expect the search engines could understand users’searching by content meanings rather than literal strings.Semantic Web is an intelligent network and it could understand human’s language more semantically and make the communication easier between human and computers.But,the current technology for the semantic search is hard to apply.Because some meta data should be annotated to each web pages,then the search engine will have the ability to understand the users intend.However,annotate every web page is very time-consuming and leads to inefficiency.So,this study designed an ontology-based approach to improve the current traditional keyword-based search and emulate the effects of semantic search.And let the search engine can understand users more semantically when it gets the knowledge.
文摘Many organizations,to save costs,are moving to the Bring Your Own Mobile Device(BYOD)model and adopting applications built by third-parties at an unprecedented rate.Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection,mitigation,and prevention.This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project(OWASP).OWASP maintains lists of the top ten security threats to web and mobile applications.We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.We analyze 200+healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten mobile threats,the threat of“Insecure Data Storage.”We find that many of the applications are storing personally identifying information(PII)in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.
文摘Mobile devices are being deployed rapidly for both private and professional reasons.One area of that has been growing is in releasing healthcare applications into the mobile marketplaces for health management.These applications help individuals track their own biorhythms and contain sensitive information.This case study examines the source code of mobile applications released to GitHub for the Risk of Insufficient Cryptography in the Top Ten Mobile Open Web Application Security Project risks.We first develop and justify a mobile OWASP Cryptographic knowledge-graph for detecting security weaknesses specific to mobile applications which can be extended to other domains involving cryptography.We then analyze the source code of 203 open source healthcare mobile applications and report on their usage of cryptography in the applications.Our findings show that none of the open source healthcare applications correctly applied cryptography in all elements of their applications.As humans adopt healthcare applications for managing their health routines,it is essential that they consider the privacy and security risks they are accepting when sharing their data.Furthermore,many open source applications and developers have certain environmental parameters which do not mandate adherence to regulations.In addition to creating new free tools for security risk identifications during software development such as standalone or compiler-embedded,the article suggests awareness and training modules for developers prior to marketplace software release.
基金the National Natural Science Foundation of China(No.81773512).
文摘The relationship between air pollution and cerebrovascular disease has become a popular topic,yet research findings are highly heterogeneous.This study aims to investigate this association based on detailed individual health data and a precise evaluation of their exposure levels.The integrated models of generalized additive model,land use regression model and back propagation neural network were used to evaluate the exposure concentrations.And doubly robust additive model was conducted to explore the association between cerebrovascular disease and air pollution after adjusted for demographic characteristics,physical examination,disease information,geographic and socioeconomic status.A total of 25097 subjects were included in the Beijing Health Management Cohort from 2013 to 2018.With a 1µg/m^(3)increase in the concentrations of PM_(2.5),SO_(2)and NO_(2),the incidence risk of cerebrovascular disease increased by 1.02(95%CI:1.008–1.034),1.06(95%CI:1.034–1.095)and 1.02(95%CI:1.010–1.029)respectively.Whereas CO exposure could decrease the risk,with an odds ratio of 0.38(95%CI:0.212–0.626).In the subgroup analysis,individuals under the age of 50 with normal BMI were at higher risk caused by PM2.5,and So2 was considered more hazardous to women.Meanwhile,the protective effect of CO on women and those with normal BMI was stronger.Successful reduction of long-term exposure to PM2.5,SO_(2)and NO_(2)would lead to substantial benefits for decrease the risk of cerebrovascular disease especially for the health of the susceptible individuals.