scispace - formally typeset
Search or ask a question
Author

Bohan Chen

Bio: Bohan Chen is an academic researcher. The author has contributed to research in topics: Computer science & Interface (matter). The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: A systematic review of intelligent threat profiling techniques for APT attacks, covering three aspects: data, methods, and applications, is provided in this paper , which summarizes the latest research in applications, proposes the research framework and technical architecture, and provides insights into future research trends.

4 citations

Proceedings ArticleDOI
26 Oct 2022
TL;DR: In this paper , a cross-platform metaverse data management system (CMDMS) is proposed to allow users to employ their own profile and space across different metaverse platforms.
Abstract: The current extended reality(XR) community is developing rapidly, and is promoting the development of the metaverse industry. Each XR community could be deemed as a sub-metaverse. This has attracted a group of internet giants and individual developers to generate their own forms of metaverse products. While there is not such a system that is able to achieve the goal of crossing all these metaverse, which appear to be contradictory to the original concept of the metaverse: relating every virtual world to a universe.To handle this problem, this paper proposes a cross-platform metaverse data management system(CMDMS), which is committed to allowing users to employ their own profile and space across different metaverse platforms.

2 citations


Cited by
More filters
Proceedings ArticleDOI
30 Jan 2023
TL;DR: TTPHunter as discussed by the authors fine-tunes linear classifiers, which take input as BERT (Bidirectional Encoder Representations from Transformers) embeddings of sentences, to extract TTPs from APT reports.
Abstract: With the proliferation of attacks from various Advanced Persistent Threats (APT) groups, it is essential to comprehend the threat actor’s attack patterns to accelerate threat detection and response. The MITRE ATT&CK framework’s Tactics, Techniques, and Procedures (TTPs) help to decipher attack patterns. The APT reports, published by security firms, contain rich information on tools and techniques used by threat actors. These reports are available in unstructured and natural language texts. There is a need for an automated tool to extract TTPs present in natural language text. However, there are few tools available in the literature, but their performance is not very satisfactory. In this work, we propose TTPHunter, to extract TTPs from APT reports by mapping sentence context to relevant TTPs. We fine-tune linear classifiers, which take input as BERT (Bidirectional Encoder Representations from Transformers) embeddings of sentences. We create two datasets: sentence-based (8,387 sentence samples) and document-based (50 threat reports) to validate TTPHunter. TTPHunter achieves the F1-score of 88% and 75% for both datasets, respectively. We compare the TTPHunter with rcATT and AttacKG baseline models, and it outperforms both baselines.

1 citations

Journal ArticleDOI
TL;DR: In this paper , the authors describe different standards for IOC representation and discuss the associated challenges that restrict security investigators from developing IOCs in the industrial sectors, and also discuss the potential IOCs against cyber-attacks in ICS systems.
Abstract: Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be taken post-incident are crucial to reduce damage, restore control, and identify attack actors involved. By monitoring Indicators of Compromise (IOCs), the incident responder can detect malicious activity triggers and respond quickly to a similar intrusion at an earlier stage. However, to implement IOCs in critical infrastructures, we need to understand their contexts and requirements. Unfortunately, there is no survey paper in the literature on IOC in the ICS environment, and only limited information is provided in research articles. In this article, we describe different standards for IOC representation and discuss the associated challenges that restrict security investigators from developing IOCs in the industrial sectors. We also discuss the potential IOCs against cyber-attacks in ICS systems. Furthermore, we conduct a critical analysis of existing works and available tools in this space. We evaluate the effectiveness of identified IOCs’ by mapping these indicators to the most frequently targeted attacks in the ICS environment. Finally, we highlight the lessons to be learned from the literature and the future problems in the domain along with the approaches that might be taken.
Proceedings ArticleDOI
09 Jan 2023
TL;DR: In this paper , an overview of the metaverse applications in the near future is presented, which aims to understand the usage and importance of metaverse in various fields by using augmented and virtual reality.
Abstract: The Digital Future of the World is on the verge of being revolutionized. The Technology, wisdom, and internet thinking of Metaverse will extend the impacts on all aspects of life including education, economy, politics, life, and culture. This study is an overview of the metaverse applications in the near future. The outcomes of this review are aimed to understand the usage and importance of metaverse in various fields by using augmented and virtual realities. Finally, we propose the application of Metaverse in education, economy, politics, and entertainment because of its huge future implications.
Proceedings ArticleDOI
15 Sep 2020
TL;DR: Based on the MILP model for CCHP, the authors studies the impact of various electricity price mechanisms, such as fixed tariff, time-of-use tariff, two-part tariff and its combination, on the investment and operation planning of CCHPs, as well as on the characteristics of power exchange.
Abstract: Electricity price mechanism has an important influence on the operation and investment planning of CCHP under the non-island operation. Based on the MILP model for CCHP, this paper studies the impact of the various electricity price mechanisms, such as fixed tariff, time-of-use tariff, two-part tariff and its combination, on the investment and operation planning of CCHP, as well as on the characteristics of power exchange between CCHP and distribution network. Based on the actual load of a hospital in Shanghai, the research shows that time-of-use price mechanism can significantly reduce the investment and operation cost of CCHP, improve primary energy efficiency, and guide CCHP to participate in peak load shifting. If two-part tariff with TOU is adopted, the power exchange characteristics between CCHP and grid, as well as the economic indexes of the investment and operation planning of CCHP, can be further improved while ensuring the income of the grid.
Journal ArticleDOI
TL;DR: MetaOpera as discussed by the authors is a generalized cross-metaverse interoperability protocol, which is designed for specific interoperating scenarios and does not generalize for all types of metaverses.
Abstract: With the rapid evolution of metaverse technologies, numerous metaverse applications have arisen for various purposes and scenarios. This makes interoperability across metaverses becomes one of the fundamental technology enablers in the metaverse space. The aim of interoperability is to provide a seamless experience for users to interact with metaverses. However, the development of cross-metaverse interoperability is still in its initial stage in both industry and academia. In this paper, we review the state-of-the-art cross-metaverse interoperability schemes. These schemes are designed for specific interoperating scenarios and do not generalize for all types of metaverses. To this end, we propose MetaOpera, a generalized cross-metaverse interoperability protocol. By connecting to the MetaOpera, users, and objects in metaverses that rely on centralized servers or decentralized blockchains are able to interoperate with each other. We also develop a proof-of-concept implementation for MetaOpera, evaluate its performance, and compare it with a state-of-the-art cross-metaverse scheme based on Sidechains. Simulation results demonstrate that the size of cross-metaverse proof and the average time of cross-metaverse transactions using the proposed solution are respectively about eight times and three times smaller than the Sidechains scheme. This paper also suggests a number of open issues and challenges faced by cross-metaverse interoperability that may inspire future research.