Communications of the ACM.

Material type: TextTextSeries: ; Communications of the ACM, Volume 65, Issue 10, October 2022Publication details: New York : Association for Computing Machinery (ACM), c2022.Description: 96 pages : color illustrations ; 28 cmISSN:
  • 0001-0782
Subject(s):
Contents:
Computing’s Grand Challenge for Sustainability -- Quis Custodiet Ipsos Custodes? -- Driving an Innovation Contest into Crisis -- Neurosymbolic AI -- Juris Hartmanis 1928–2022 -- Hidden Malware Ratchets Up Cybersecurity Risk -- Applied AI Teaches Handwriting -- Data Platforms and Network Effects -- Securing the Company Jewels -- Storytelling and Science -- What’s Your Placebo? -- Walk a Mile in Their Shoes -- Linear Address Spaces -- Creating a Revolutionary Academic Program -- Assessing the Quantum-Computing Landscape -- Should Young Computer Scientists Stop Collaborating with Their Doctoral Advisors? -- Traffic Classification in the Era of Deep Learning -- Traffic Classification in an Increasingly Encrypted Web -- Achieve Big with Devices that Track Small Things -- AuraRing: Precise Electromagnetic Finger Tracking -- Card Nim.
Summary: [Article Title: Computing’s Grand Challenge for Sustainability/ Andrew A. Chien, p. 5] https://doi.org/10.1145/3559163Summary: [Article Title: Quis custodiet ipsos custodes?/ Vinton G. Cerf, p. 7] https://doi.org/10.1145/3558590Summary: [Article Title: Driving an innovation contest into crisis/ Aleksandr Romanov, p. 8-9] Abstract: The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts. https://doi.org/10.1145/3554917Summary: [Article Title: Neurosymbolic AI/ Don Monroe, p. 11-13] Abstract: Combining neural networks with symbolic representations might make them more versatile and dependable. https://doi.org/10.1145/3554918Summary: [Article Title: In memoriam: Juris Hartmanis 1928--2022/ Simson Garfinkel, and Eugene H. Spafford, p. 14-15] https://doi.org/10.1145/3559705Summary: [Article Title: Hidden malware ratchets up cybersecurity risks/ Samuel Greengard, p. 16-18] Abstract: Cybercriminals could be hiding malware payloads in places where commercial cybersecurity software is unable to detect it. https://doi.org/10.1145/355492Summary: [Article Title: Applied AI teaches handwriting/ Esther Shein, p. 19-20] Abstract: In an increasingly digital world, how do you teach students cursive handwriting? https://doi.org/10.1145/3554919Summary: [Article Title: Data platforms and network effects/ Michael A. Cusumano, p. 22-24] Abstract: How data-network effects create opportunities and inflate expectations. https://doi.org/10.1145/3555833Summary: [Article Title: Securing the company jewels/ George Neville-Neil, p. 25-26] https://doi.org/10.1145/3555844Summary: [Article Title: Storytelling and science/ Titus Barik, Sumit Gulwani, and Mario Juarez, p. 27-30] https://doi.org/10.1145/3526100Summary: [Article Title: What's your placebo?/ Ryan Bockmon, and Stephen Cooper, p. 31-33] https://doi.org/10.1145/3528085Summary: [Article Title: Walk a mile in their shoes/ Jenna Butler, and Catherine Yeh, p. 34-41] https://doi.org/10.1145/3561989Summary: [Article Title: Linear address spaces/ Poul-Henning Kamp, p. 42-44] https://doi.org/10.1145/3561991Summary: [Article Title: Creating a revolutionary academic program/ Umakishore Ramachandran, and Zvi Galil, p. 46-56] https://doi.org/10.1145/3503915Summary: [Article Title: Assessing the quantum-computing landscape/ Advait Deshpandel, p. 57-65] Abstract: A summative assessment of quantum computing's progress, based on market readiness and investment levels, and its future implications. https://doi.org/10.1145/3524109Summary: [Article Title: Should young computer scientists stop collaborating with their doctoral advisors?/ Ariel Rosenfeld, and Oleg Maksimov, p. 66-72] https://doi.org/10.1145/3529089Summary: [Article Title: Technical perspective: Traffic classification in the era of deep learning/ Athina Markopoulou, p. 74] https://doi.org/10.1145/355664Summary: [Article Title: Traffic classification in an increasingly encrypted web/ Iman Akbari, Mohammad A. Salahuddin, Leni Aniva, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stephane Tuffin, p. 75-83] Abstract: Traffic classification is essential in network management for a wide range of operations. Recently, it has become increasingly challenging with the widespread adoption of encryption in the Internet, for example, as a de facto in HTTP/2 and QUIC protocols. In the current state of encrypted traffic classification using deep learning (DL), we identify fundamental issues in the way it is typically approached. For instance, although complex DL models with millions of parameters are being used, these models implement a relatively simple logic based on certain header fields of the TLS handshake, limiting model robustness to future versions of encrypted protocols. Furthermore, encrypted traffic is often treated as any other raw input for DL, while crucial domain-specific considerations are commonly ignored. In this paper, we design a novel feature engineering approach used for encrypted Web protocols, and develop a neural network architecture based on stacked long short-term memory layers and convolutional neural networks. We evaluate our approach on a real-world Web traffic dataset from a major Internet service provider and mobile network operator. We achieve an accuracy of 95% in service classification with less raw traffic and a smaller number of parameters, outperforming a state-of-the-art method by nearly 50% fewer false classifications. We show that our DL model generalizes for different classification objectives and encrypted Web protocols. We also evaluate our approach on a public QUIC dataset with finer application-level granularity in labeling, achieving an overall accuracy of 99%. https://doi.org/10.1145/3559439Summary: [Article Title: Technical perspective: Achieve big with devices that track small things/ Yang Zhang, p. 84] https://doi.org/10.1145/3556638Summary: [Article Title: AuraRing: precise electromagnetic finger tracking/ Farshid Salemi Parizi, Eric Whitmire, and Shwetak Patel, p. 85-92] https://doi.org/10.1145/3556639Summary: [Article Title: Card Nim/ Dennis Shasha, p. 96] https://doi.org/10.1145/3555723
Item type: Serials
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Serials Serials National University - Manila LRC - Main Periodicals Gen. Ed. - CCIT Communications of the ACM, Volume 65, Issue 10, October 2022 (Browse shelf(Opens below)) c.1 Available PER000000605

Includes bibliographical references.

Computing’s Grand Challenge for Sustainability -- Quis Custodiet Ipsos Custodes? -- Driving an Innovation Contest
into Crisis -- Neurosymbolic AI -- Juris Hartmanis 1928–2022 -- Hidden Malware Ratchets Up Cybersecurity Risk -- Applied AI Teaches Handwriting -- Data Platforms and Network Effects -- Securing the Company Jewels -- Storytelling and Science -- What’s Your Placebo? -- Walk a Mile in Their Shoes -- Linear Address Spaces -- Creating a Revolutionary Academic Program -- Assessing the Quantum-Computing Landscape -- Should Young Computer Scientists Stop Collaborating with Their Doctoral Advisors? -- Traffic Classification in the Era of Deep Learning -- Traffic Classification in an Increasingly Encrypted Web -- Achieve Big with Devices that Track Small Things -- AuraRing: Precise
Electromagnetic Finger Tracking -- Card Nim.

[Article Title: Computing’s Grand Challenge for Sustainability/ Andrew A. Chien, p. 5]

https://doi.org/10.1145/3559163

[Article Title: Quis custodiet ipsos custodes?/ Vinton G. Cerf, p. 7]

https://doi.org/10.1145/3558590

[Article Title: Driving an innovation contest into crisis/ Aleksandr Romanov, p. 8-9]

Abstract: The Communications website, https://cacm.acm.org, features more than a dozen bloggers in the BLOG@CACM community. In each issue of Communications, we'll publish selected posts or excerpts.

https://doi.org/10.1145/3554917

[Article Title: Neurosymbolic AI/ Don Monroe, p. 11-13]

Abstract: Combining neural networks with symbolic representations might make them more versatile and dependable.

https://doi.org/10.1145/3554918

[Article Title: In memoriam: Juris Hartmanis 1928--2022/ Simson Garfinkel, and Eugene H. Spafford, p. 14-15]

https://doi.org/10.1145/3559705

[Article Title: Hidden malware ratchets up cybersecurity risks/ Samuel Greengard, p. 16-18]

Abstract: Cybercriminals could be hiding malware payloads in places where commercial cybersecurity software is unable to detect it.

https://doi.org/10.1145/355492

[Article Title: Applied AI teaches handwriting/ Esther Shein, p. 19-20]

Abstract: In an increasingly digital world, how do you teach students cursive handwriting?

https://doi.org/10.1145/3554919

[Article Title: Data platforms and network effects/ Michael A. Cusumano, p. 22-24]

Abstract: How data-network effects create opportunities and inflate expectations.

https://doi.org/10.1145/3555833

[Article Title: Securing the company jewels/ George Neville-Neil, p. 25-26]

https://doi.org/10.1145/3555844

[Article Title: Storytelling and science/ Titus Barik, Sumit Gulwani, and Mario Juarez, p. 27-30]

https://doi.org/10.1145/3526100

[Article Title: What's your placebo?/ Ryan Bockmon, and Stephen Cooper, p. 31-33]

https://doi.org/10.1145/3528085

[Article Title: Walk a mile in their shoes/ Jenna Butler, and Catherine Yeh, p. 34-41]

https://doi.org/10.1145/3561989

[Article Title: Linear address spaces/ Poul-Henning Kamp, p. 42-44]

https://doi.org/10.1145/3561991

[Article Title: Creating a revolutionary academic program/ Umakishore Ramachandran, and Zvi Galil, p. 46-56]

https://doi.org/10.1145/3503915

[Article Title: Assessing the quantum-computing landscape/ Advait Deshpandel, p. 57-65]

Abstract: A summative assessment of quantum computing's progress, based on market readiness and investment levels, and its future implications.

https://doi.org/10.1145/3524109

[Article Title: Should young computer scientists stop collaborating with their doctoral advisors?/ Ariel Rosenfeld, and Oleg Maksimov, p. 66-72]

https://doi.org/10.1145/3529089

[Article Title: Technical perspective: Traffic classification in the era of deep learning/ Athina Markopoulou, p. 74]

https://doi.org/10.1145/355664

[Article Title: Traffic classification in an increasingly encrypted web/ Iman Akbari, Mohammad A. Salahuddin, Leni Aniva, Noura Limam, Raouf Boutaba, Bertrand Mathieu, Stephanie Moteau, and Stephane Tuffin, p. 75-83]

Abstract: Traffic classification is essential in network management for a wide range of operations. Recently, it has become increasingly challenging with the widespread adoption of encryption in the Internet, for example, as a de facto in HTTP/2 and QUIC protocols. In the current state of encrypted traffic classification using deep learning (DL), we identify fundamental issues in the way it is typically approached. For instance, although complex DL models with millions of parameters are being used, these models implement a relatively simple logic based on certain header fields of the TLS handshake, limiting model robustness to future versions of encrypted protocols. Furthermore, encrypted traffic is often treated as any other raw input for DL, while crucial domain-specific considerations are commonly ignored. In this paper, we design a novel feature engineering approach used for encrypted Web protocols, and develop a neural network architecture based on stacked long short-term memory layers and convolutional neural networks. We evaluate our approach on a real-world Web traffic dataset from a major Internet service provider and mobile network operator. We achieve an accuracy of 95% in service classification with less raw traffic and a smaller number of parameters, outperforming a state-of-the-art method by nearly 50% fewer false classifications. We show that our DL model generalizes for different classification objectives and encrypted Web protocols. We also evaluate our approach on a public QUIC dataset with finer application-level granularity in labeling, achieving an overall accuracy of 99%.

https://doi.org/10.1145/3559439

[Article Title: Technical perspective: Achieve big with devices that track small things/ Yang Zhang, p. 84]

https://doi.org/10.1145/3556638

[Article Title: AuraRing: precise electromagnetic finger tracking/ Farshid Salemi Parizi, Eric Whitmire, and Shwetak Patel, p. 85-92]

https://doi.org/10.1145/3556639

[Article Title: Card Nim/ Dennis Shasha, p. 96]

https://doi.org/10.1145/3555723

There are no comments on this title.

to post a comment.