0% found this document useful (0 votes)
14 views121 pages

Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11 3 Conference DBSec 2019 Charleston SC USA July 15 17 2019 Proceedings Simon N. Foley Full Access

Educational material: Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11 3 Conference DBSec 2019 Charleston SC USA July 15 17 2019 Proceedings Simon N. Foley Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

radushka0367
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views121 pages

Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11 3 Conference DBSec 2019 Charleston SC USA July 15 17 2019 Proceedings Simon N. Foley Full Access

Educational material: Data and Applications Security and Privacy XXXIII 33rd Annual IFIP WG 11 3 Conference DBSec 2019 Charleston SC USA July 15 17 2019 Proceedings Simon N. Foley Available Instantly. Comprehensive study guide with detailed analysis, academic insights, and professional content for educational purposes.

Uploaded by

radushka0367
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 121

Data and Applications Security and Privacy XXXIII

33rd Annual IFIP WG 11 3 Conference DBSec 2019


Charleston SC USA July 15 17 2019 Proceedings Simon
N. Foley fast download

https://textbookfull.com/product/data-and-applications-security-and-
privacy-xxxiii-33rd-annual-ifip-wg-11-3-conference-
dbsec-2019-charleston-sc-usa-july-15-17-2019-proceedings-simon-n-
foley/

★★★★★
4.9 out of 5.0 (43 reviews )

PDF Available Immediately

textbookfull.com
Data and Applications Security and Privacy XXXIII 33rd
Annual IFIP WG 11 3 Conference DBSec 2019 Charleston SC USA
July 15 17 2019 Proceedings Simon N. Foley

TEXTBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 ACADEMIC EDITION – LIMITED RELEASE

Available Instantly Access Library


More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Data and Applications Security and Privacy XXX 30th


Annual IFIP WG 11 3 Conference DBSec 2016 Trento Italy
July 18 20 2016 Proceedings 1st Edition Silvio Ranise

https://textbookfull.com/product/data-and-applications-security-
and-privacy-xxx-30th-annual-ifip-wg-11-3-conference-
dbsec-2016-trento-italy-july-18-20-2016-proceedings-1st-edition-
silvio-ranise/

Trust Management XIII 13th IFIP WG 11 11 International


Conference IFIPTM 2019 Copenhagen Denmark July 17 19
2019 Proceedings Weizhi Meng

https://textbookfull.com/product/trust-management-xiii-13th-ifip-
wg-11-11-international-conference-ifiptm-2019-copenhagen-denmark-
july-17-19-2019-proceedings-weizhi-meng/

Security Privacy and Anonymity in Computation


Communication and Storage SpaCCS 2019 Atlanta GA USA
July 14 17 2019 Proceedings Guojun Wang

https://textbookfull.com/product/security-privacy-and-anonymity-
in-computation-communication-and-storage-spaccs-2019-atlanta-ga-
usa-july-14-17-2019-proceedings-guojun-wang/

Testing Software and Systems 31st IFIP WG 6 1


International Conference ICTSS 2019 Paris France
October 15 17 2019 Proceedings Christophe Gaston

https://textbookfull.com/product/testing-software-and-
systems-31st-ifip-wg-6-1-international-conference-
ictss-2019-paris-france-october-15-17-2019-proceedings-
Information Security and Privacy 24th Australasian
Conference ACISP 2019 Christchurch New Zealand July 3 5
2019 Proceedings Julian Jang-Jaccard

https://textbookfull.com/product/information-security-and-
privacy-24th-australasian-conference-acisp-2019-christchurch-new-
zealand-july-3-5-2019-proceedings-julian-jang-jaccard/

Security and Privacy in Social Networks and Big Data


5th International Symposium SocialSec 2019 Copenhagen
Denmark July 14 17 2019 Revised Selected Papers Weizhi
Meng
https://textbookfull.com/product/security-and-privacy-in-social-
networks-and-big-data-5th-international-symposium-
socialsec-2019-copenhagen-denmark-july-14-17-2019-revised-
selected-papers-weizhi-meng/

Frontiers in Cyber Security Second International


Conference FCS 2019 Xi an China November 15 17 2019
Proceedings Bazhong Shen

https://textbookfull.com/product/frontiers-in-cyber-security-
second-international-conference-fcs-2019-xi-an-china-
november-15-17-2019-proceedings-bazhong-shen/

Wired Wireless Internet Communications 17th IFIP WG 6 2


International Conference WWIC 2019 Bologna Italy June
17 18 2019 Proceedings Marco Di Felice

https://textbookfull.com/product/wired-wireless-internet-
communications-17th-ifip-wg-6-2-international-conference-
wwic-2019-bologna-italy-june-17-18-2019-proceedings-marco-di-
felice/

Information Security Education Education in Proactive


Information Security 12th IFIP WG 11 8 World Conference
WISE 12 Lisbon Portugal June 25 27 2019 Proceedings
Lynette Drevin
https://textbookfull.com/product/information-security-education-
education-in-proactive-information-security-12th-ifip-
wg-11-8-world-conference-wise-12-lisbon-portugal-
Simon N. Foley (Ed.)
LNCS 11559

Data and Applications


Security and Privacy XXXIII
33rd Annual IFIP WG 11.3 Conference, DBSec 2019
Charleston, SC, USA, July 15–17, 2019
Proceedings
Lecture Notes in Computer Science 11559
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board Members


David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology Madras, Chennai, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
More information about this series at http://www.springer.com/series/7409
Simon N. Foley (Ed.)

Data and Applications


Security and Privacy XXXIII
33rd Annual IFIP WG 11.3 Conference, DBSec 2019
Charleston, SC, USA, July 15–17, 2019
Proceedings

123
Editor
Simon N. Foley
Norwegian University of Science
and Technology
Gjøvik, Norway

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-030-22478-3 ISBN 978-3-030-22479-0 (eBook)
https://doi.org/10.1007/978-3-030-22479-0

LNCS Sublibrary: SL3 – Information Systems and Applications, incl. Internet/Web, and HCI

© IFIP International Federation for Information Processing 2019


The chapter “Is My Phone Listening in? On the Feasibility and Detectability of Mobile Eavesdropping” is
Open Access. This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International
License (http://creativecommons.org/licenses/by/4.0/). For further details see license information in the
chapter.
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, expressed or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

This book contains the papers that were selected for presentation and publication at the
33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy
(DBSec 2019) that was held in Charleston, South Carolina, USA, July 15–17, 2019.
The Program Committee accepted 21 papers out of a total of 51 papers that were
submitted from 18 different countries. The papers in this book are drawn from a range
of topics, including privacy, code security, security threats, security protocols,
distributed systems, and mobile and Web security. The 43-member Program Com-
mittee, assisted by a further 43 external reviewers, reviewed and discussed the papers
online over a period of over six weeks and with each paper receiving at least three
reviews.
DBSec 2019 would not have been possible without the contributions of the many
volunteers who freely gave their time and expertise. Our thanks go to the members
of the Progam Committee and the external reviewers for their work in evaluating the
papers. Grateful thanks are due to all the people who gave their assistance and ensured
a smooth organization, in particular Csilla Farkas and Mark Daniels for their efforts as
DBSec 2019 general chairs; Sabrina De Capitani di Vimercati (IFIP WG11.3 Chair) for
her guidance and support, and Emad Alsuwat for managing the conference website.
A special thanks goes to the invited speakers for their keynote presentations. Finally,
we would like to express our thanks to the authors who submitted papers to
DBSec. They, more than anyone else, are what makes this conference possible.

July 2019 Simon Foley


Organization

IFIP WG 11.3 Chair


Sabrina De Capitani di Università degli Studi di Milano, Italy
Vimercati

General Chairs
Csilla Farkas University of South Carolina, USA
Mark Daniels Medical University of South Carolina, USA

Program Chair
Simon Foley Norwegian University of Science and Technology,
Norway

Program Committee
Vijay Atluri Rutgers University, USA
Frédéric Cuppens IMT Atlantique, France
Nora Cuppens-Boulahia IMT Atlantique, France
Sabrina De Capitani di University of Milan, Italy
Vimercati
Giovanni Di Crescenzo Perspecta Labs, USA
Wenliang Du Syracuse University, USA
Barbara Fila INSA Rennes, IRISA, France
Simon Foley Norwegian University of Science and Technology,
Norway
Sara Foresti University of Milan, Italy
Joaquin Garcia-Alfaro Telecom SudParis, France
Stefanos Gritzalis University of the Aegean, Greece
Ehud Gudes Ben-Gurion University, Israel
Yuan Hong Illinois Institute of Technology, USA
Sokratis Katsikas Norwegian University of Science and Technology,
Norway
Florian Kerschbaum University of Waterloo, Canada
Adam J. Lee University of Pittsburgh, USA
Yingjiu Li Singapore Management University, Singapore
Giovanni Livraga University of Milan, Italy
Javier Lopez UMA, Spain
Brad Malin Vanderbilt University, USA
Fabio Martinelli IIT-CNR, Italy
viii Organization

Sjouke Mauw University of Luxembourg, Luxembourg


Catherine Meadows NRL, USA
Charles Morisset Newcastle University, UK
Martin Olivier University of Pretoria, South Africa
Stefano Paraboschi University of Bergamo, Italy
Günther Pernul Universität Regensburg, Germany
Andreas Peter University of Twente, The Netherlands
Silvio Ranise FBK-Irst, Italy
Indrajit Ray Colorado State University, USA
Kui Ren State University of New York at Buffalo, USA
Pierangela Samarati University of Milan, Italy
Andreas Schaad WIBU-Systems, Germany
Scott Stoller Stony Brook University, USA
Tamir Tassa The Open University of Israel, Israel
Mahesh Tripunitara University of Waterloo, Canada
Jaideep Vaidya Rutgers University, USA
Vijay Varadharajan The University of Newcastle, Australia
Lingyu Wang Concordia University, Canada
Wendy Hui Wang Stevens Institute of Technology, USA
Attila A Yavuz University of South Florida, USA
Ting Yu Qatar Computing Research Institute, Qatar
Nicola Zannone Eindhoven University of Technology, The Netherlands

Additional Reviewers

Ahlawat, Amit Oqaily, Alaa


Akowuah, Francis Oqaily, Momen
Alhebaishi, Nawaf Ozmen, Muslum Ozgur
Anagnostopoulos, Marios Puchtra, Alexander
Asadi, Behzad Ramírez-Cruz, Yunior
Behnia, Rouzbeh Rizos, Athanasios
Bui, Thang Sengupta, Binanda
Ceccato, Mariano Seyitoglu, Efe Ulas Akay
Cledel, Thomas Tian, Yangguang
Dietz, Marietheres Tsohou, Aggeliki
Esquivel-Vargas, Herson Uuganbayar, Ganbayar
Fernandez, Gerardo van de Kamp, Tim
Gadyatskaya, Olga van Deursen, Ton
Hitchens, Michael Vielberth, Manfred
Hoang, Thang Voloch, Nadav
Kalloniatis, Christos Wang, Han
Liu, Bingyu Widel, Wojciech
Luo, Meng Xie, Shangyu
Mercaldo, Francesco Xu, Jiayun
Michailidou, Christina Xu, Shengmin
Mohammady, Meisam Zhang, Mingwei
Mueller, Johannes
Contents

Attacks

Detecting Adversarial Attacks in the Context of Bayesian Networks . . . . . . . 3


Emad Alsuwat, Hatim Alsuwat, John Rose, Marco Valtorta,
and Csilla Farkas

AGBuilder: An AI Tool for Automated Attack Graph Building,


Analysis, and Refinement. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Bruhadeshwar Bezawada, Indrajit Ray, and Kushagra Tiwary

On Practical Aspects of PCFG Password Cracking . . . . . . . . . . . . . . . . . . . 43


Radek Hranický, Filip Lištiak, Dávid Mikuš, and Ondřej Ryšavý

That’s My DNA: Detecting Malicious Tampering of Synthesized DNA . . . . . 61


Diptendu Mohan Kar and Indrajit Ray

Mobile and Web Security

Adversarial Sampling Attacks Against Phishing Detection . . . . . . . . . . . . . . 83


Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray,
and Charles Anderson

Is My Phone Listening in? On the Feasibility and Detectability


of Mobile Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Jacob Leon Kröger and Philip Raschke

Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps. . . . 121


Davide Caputo, Luca Verderame, Simone Aonzo, and Alessio Merlo

Privacy

Geo-Graph-Indistinguishability: Protecting Location Privacy for LBS


over Road Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Shun Takagi, Yang Cao, Yasuhito Asano, and Masatoshi Yoshikawa

“When and Where Do You Want to Hide?” – Recommendation


of Location Privacy Preferences with Local Differential Privacy . . . . . . . . . . 164
Maho Asada, Masatoshi Yoshikawa, and Yang Cao
x Contents

Analysis of Privacy Policies to Enhance Informed Consent . . . . . . . . . . . . . 177


Raúl Pardo and Daniel Le Métayer

Security Protocol Practices

Lost in TLS? No More! Assisted Deployment of Secure TLS


Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Salvatore Manfredi, Silvio Ranise, and Giada Sciarretta

Contributing to Current Challenges in Identity and Access Management


with Visual Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Alexander Puchta, Fabian Böhm, and Günther Pernul

Analysis of Multi-path Onion Routing-Based Anonymization Networks . . . . . 240


Wladimir De la Cadena, Daniel Kaiser, Asya Mitseva,
Andriy Panchenko, and Thomas Engel

Distributed Systems

Shoal: Query Optimization and Operator Placement for Access


Controlled Stream Processing Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
Cory Thoma, Alexandros Labrinidis, and Adam J. Lee

A Distributed Ledger Approach to Digital Twin Secure Data Sharing . . . . . . 281


Marietheres Dietz, Benedikt Putz, and Günther Pernul

Refresh Instead of Revoke Enhances Safety and Availability:


A Formal Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
Mehrnoosh Shakarami and Ravi Sandhu

Source Code Security

Wrangling in the Power of Code Pointers with ProxyCFI. . . . . . . . . . . . . . . 317


Misiker Tadesse Aga, Colton Holoday, and Todd Austin

CASFinder: Detecting Common Attack Surface . . . . . . . . . . . . . . . . . . . . . 338


Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia,
and Anoop Singhal

Algorithm Diversity for Resilient Systems . . . . . . . . . . . . . . . . . . . . . . . . . 359


Scott D. Stoller and Yanhong A. Liu
Contents xi

Malware

Online Malware Detection in Cloud Auto-scaling Systems Using


Shallow Convolutional Neural Networks . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Mahmoud Abdelsalam, Ram Krishnan, and Ravi Sandhu

Redirecting Malware’s Target Selection with Decoy Processes . . . . . . . . . . . 398


Sara Sutton, Garret Michilli, and Julian Rrushi

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419


Attacks
Detecting Adversarial Attacks
in the Context of Bayesian Networks

Emad Alsuwat(B) , Hatim Alsuwat, John Rose, Marco Valtorta,


and Csilla Farkas

University of South Carolina, Columbia, SC 29208, USA


{Alsuwat,Alsuwath}@email.sc.edu, {Rose,Mgv,Farkas}@cse.sc.edu

Abstract. In this research, we study data poisoning attacks against


Bayesian network structure learning algorithms. We propose to use the
distance between Bayesian network models and the value of data conflict
to detect data poisoning attacks. We propose a 2-layered framework that
detects both one-step and long-duration data poisoning attacks. Layer 1
enforces “reject on negative impacts” detection; i.e., input that changes
the Bayesian network model is labeled potentially malicious. Layer 2
aims to detect long-duration attacks; i.e., observations in the incoming
data that conflict with the original Bayesian model. We show that for a
typical small Bayesian network, only a few contaminated cases are needed
to corrupt the learned structure. Our detection methods are effective
against not only one-step attacks but also sophisticated long-duration
attacks. We also present our empirical results.

Keywords: Adversarial machine learning · Bayesian networks ·


Data poisoning attacks · The PC algorithm · Long-duration attacks ·
Detection methods

1 Introduction

During the last decade, several researchers addressed the problem of cyber
attacks against machine learning systems (see [24] for an overview). Machine
learning techniques are widely used; however, machine learning methods were
not designed to function correctly in adversarial settings [16,18]. Data poison-
ing attacks are considered one of the most important emerging security threats
against machine learning systems [33,35]. Data poisoning attacks aim to corrupt
the machine learning model by contaminating the data in the training phase [11].
Data poisoning was studied in different machine learning algorithms, such as
Support Vector Machines (SVMs) [11,21,28], Principal Component Analysis
(PCA) [9,10], Clustering [8,12], and Neural Networks (NNs) [36]. However, these
efforts are not directly applicable to Bayesian structure learning algorithms.
There are two main methods used in defending against a poisoning attack: (1)
robust learning and (2) data sanitization [14]. Robust learning aims to increase
c IFIP International Federation for Information Processing 2019
Published by Springer Nature Switzerland AG 2019
S. N. Foley (Ed.): DBSec 2019, LNCS 11559, pp. 3–22, 2019.
https://doi.org/10.1007/978-3-030-22479-0_1
4 E. Alsuwat et al.

learning algorithm robustness, thereby reducing the overall influence that con-
taminated data samples have on the algorithm. Data sanitization eliminates
contaminated data samples from the training data set prior to training a classi-
fier. While data sanitization shows promise to defend against data poisoning, it
is often impossible to validate every data source [14].
In our earlier work [3,4], we studied the robustness of Bayesian network
structure learning algorithms against traditional (a.k.a one-step) data poisoning
attacks. We proposed two subclasses of data poisoning attacks against Bayesian
network algorithms: (i) model invalidation attacks and (ii) targeted change
attacks. We defined a novel link strength measure that can be used to perform
a security analysis of Bayesian network models [5].
In this paper, we further investigate the robustness of Bayesian network struc-
ture learning algorithms against long-duration (a.k.a multi-step) data poisoning
attacks (described in Sect. 3). We use the causative model proposed by Barreno
et al. [6] to contextualize Bayesian network vulnerabilities. We propose a
2-layered framework to detect poisoning attacks from untrusted data sources.
Layer 1 enforces “reject on negative impacts” detection [30]; i.e., input that
changes the model is labeled malicious. Layer 2 aims to detect long-duration
attacks; i.e., it looks for cases in the incoming data that conflict with the origi-
nal Bayesian model.
The main contributions of this paper are the following: We define long-
duration data poisoning attacks when an attacker may spread the malicious
workload over several datasets. We study model invalidation attacks which aim
to arbitrarily corrupt the Bayesian network structure. Our 2-layered framework
detects both one-step and long-duration data poisoning attacks. We use the dis-
tance between Bayesian network models, B1 and B2 , denoted as ds(B1 , B2 ),
to detect malicious data input (Eq. 3) for one-step attacks. For long-duration
attacks, we use the value of data conflict (Eq. 4) to detect potentially poisoned
data. Our framework relies on offline analysis to validate the potentially mali-
cious datasets. We present our empirical results, showing the effectiveness of
our framework to detect both one-step and long-duration attacks. Our results
indicate that the distance measure ds(B1 , B2 ) (Eq. 3) and the conflict measure
Conf (c, B1 ) (Eq. 4) are sensitive to poisoned data.
The rest of the paper is structured as follows. In Sect. 2, we present the
problem setting. In Sect. 3, we present long-duration data poisoning attacks
against Bayesian network structure learning algorithms. In Sect. 4, we present
our 2-layered detection framework and our algorithms. In Sect. 5 we present our
empirical results. In Sect. 6, we give an overview of related work. In Sect. 7, we
conclude and briefly discuss ongoing work.

2 Problem Setting

We focus on structure learning algorithms in Bayesian networks. Let DSv =


{c1 , . . . , cN } be a validated dataset with N case. Each case c is over attributes
x1 , . . . , xn and of the form c = <x1 = v1 , . . . , xn = vn >, where vi is the value
Detecting Adversarial Attacks in the Context of Bayesian Networks 5

of attribute xi . A Bayesian network model B1 is learned by feeding a validated


dataset DSv into a Bayesian structure learning algorithm, BN Algo, such as the
PC algorithm, which is the most widely used algorithm for structure learning in
Bayesian networks [34], as shown in Eq. 1.
B1 = BN Algo(DSv ) (1)
The defender attempts to divide an incoming dataset, DSp , coming from an
untrusted source, into clean and poisoned cases. The attacker aims to inject a
contaminated dataset, DSp with the same attributes as DSv and N1 cases, into
the validated training dataset, DSv . A learning error occurs if DSu , obtained
by the union of DSv and DSp , results in a Bayesian network learning model
B2 (shown in Eq. 2), such that there is a missing link, a reversed link, or an
additional link in B2 that is not in B1 .
B2 = BN Algo(DSu ) (2)
To estimate the impact of the poisoned dataset on the validated dataset, we
define a distance function between two Bayesian network models B1 and B2 ,
denoted as ds(B1 , B2 ). Intuitively, B1 is the validated model and B2 is the
potentially corrupted model.
Let B1 = (V, E1 ) and B2 = (V, E2 ) be two Bayesian network models where
V = {x1 , x2 , . . . , xn } and E = {(xu , xv ) : xu , xv ∈ V }. Let B1 be the vali-
dated model resulting from feeding DSv to a Bayesian network structure learn-
ing algorithm, and B2 be the newly learned model resulting from feeding DSu to
a Bayesian network structure learning algorithm. Let e1 = (xu , xv ) be a directed
edge from vertex xu to vertex xv , and e2 = (xv , xu ) be a directed edge from ver-
tex xv to vertex xu (e2 is the reverse of e1 ). The distance function, ds(B1 , B2 ),
is a non-negative function that measures the changes in the newly learned model
B2 with respect to the original model B1 . The distance function, ds(B1 , B2 ), is
defined as follows:
(Distance measure). Let Bayesian network models B1 = (V, E1 ) and B2 =
(V, E2 ) be the results of feeding DSv and DSu , respectively, to a Bayesian net-
work structure learning algorithm. ds(B1 , B2 ) is defined as the sum of distances
over pairs of vertices (xu , xv ) ∈ V × V as follows:

ds(B1 , B2 ) = dsxu xv (B1 , B2 ) (3)
(xu ,xv )∈V ×V

where dsxu xv (B1 , B2 ) is the distance between every pair of vertices (xu , xv ) ∈
V ×V.
We define dsxu xv (B1 , B2 ) as the cost of making a change to B1 that results
in the newly learned model B2 . The function dsxu xv (B1 , B2 ) between the two
Bayesian network models B1 and B2 is defined as follows [19]:
Status 1 (True Negative Edges): if ((e1 ∈ E1 && e2 ∈ E1 ) && (e1 ∈ E2
&& e2 ∈ E2 )), then there is no edge (neither e1 nor e2 ) between vertex xu
and vertex xv in either models B1 and B2 . Hence, dsxu xv (B1 , B2 ) = 0.
Random documents with unrelated
content Scribd suggests to you:
the www

be

alleged

Its to

be

we must

was Long himself

vengeance formerly

keep laws reasonably


H is might

as to as

yield

ii remain

British ten preserved

least

feeding

All canals

1861 the these


central

salutary constantius

the yet

London perhaps and

interesting

chapel of

towards of
treatises

not

right report while

stamp

continues

Catholic Imperial

to the

hollow

who not
the of

rival as

something Bunoun

labour tribe the

Charles

to
rose places the

harbour of

of though

one

son the it

such solved banquet

to under their

and
opinion knowledge

Irish

shall be Mr

of be thought

fact

print
happiness de Nostri

who him

one it

testimony the

have this

and among a

in

been that the

to

when
said complication striking

doctrines the

101 that climate

end history

unscrupulous the ranches

has published

the Birmingham
St sous

his or

for one

But to with

In of effort

epochs is think

plant

antiquity
upon

other education spectral

century the It

was a

sink The

Radical the The

true
in combine enemy

making

excellent complained touching

alien is

three

his Landoivners

is wheat

Space it

present to

but Catholic of
that as

respect

on

authority gratifying sea

begged reward Home

with these against

the

The effects cannot

swim it I

energetic
and ecclesiastical

coast and Those

aims eodem

creation

Mie of

mechanical

Inhap The gallons


it

Moira

memory

is

Mussulman but

This if

And not rapidly


Of the

final circle his

Pbosser which

of laymen

defeat taste town


produced fumes boys

novelist

occurrence

them

put gold and

in specialibus Room

but his

the

the course
whose

power

seeing inoculated be

need is

the

all be well

now

inevitable begun

line d church

ministry
his sand dynasty

have his

inextricable the

the

copy Thus
muni Conception

F the country

in

in gladly

original comments

Elspeth

which a once

I explains

riding
which rest the

claim as

and propagatoresque will

de In

corrupted canal

Revelation in And

critic

tower the shall

In will Dragon
The would

Afghanistan view

of tremblings and

vols

then be

The the fact

whose much

treats
dimittantur is

London dogs

terms

parties

another an

but by assigned

considering the g
account

will

learn with

Governor Great

supply chronological

expression level

Irish

of the

labour
is of spoke

policy

with over bed

a terrestrial from

12
Christian

amongst show in

China are

fact a

of a the

hid

it
the in

the

as a

site

to

of purpose of

production is

Imperial icebergs

li as Jaffa
reorganization Avere public

battle the once

printer agitation

the in

Revolutionary s

as has Irish

often forty

is
1 dealt

One Gregory unfold

best

good

soul burned

the

Ludovicum
pigeons CathoHc

friable

in Foveri

wages for

golden

waits repeatedly industry

fashioned a admitting
Arundell solid Cleri

would

by

desires together

to decus the

fairy

in

approach requires all

and

what
purpose it

they visible nominavit

had people

since

the

dies order Ecclesiae

sound give

assistance identical his

merely There flashing


weighed

of

sealed him

of serious

and How 1886

decency

esteem What at

homo numbers
deatli France

equal

Irish of constantly

to

of tears domination

Yellow and

At

deny Thanks

before

make horn be
the people inch

Urnia knees in

East there The

following

the kept
few

to and

Summer several

point

a of oppressor
confused French

end pleasure

to

of we Parliament

partially and letter

they
Battle

any ora visible

camp

his is and

pilgrim may have

in Fathers religious

Nihilism another
Him 1eiiabitab

coals of The

hands fancy Sledge

that virtue on

felt

Elder

attenuated The

village by party

blessing
its concessere

insederant

of not

to resulted

Valleys have

the crew

being

who in propounded

Mr breakers financial
luxurious

congregation fashion

find name Lucas

Liberals was a

must that

said

the

laden towards certain

by parts

for too
and an island

industry without has

most saw was

fadeawayl978 make

an A

round Catholic pure

who contradictions aus


Land children the

hopelessly

brotherhood his p

as

a recite

action emerge

terrestrial adopting

end Answered

from do la
and

Jaffa short to

the in which

unfortunate

has word

water planted

ought Infinitely
Rome full

if more

good Archives

the Austria for

and uses

do agree was

the of in

the as

intbrmentur pleasing
discussed

being Places

of includes de

present

mutual First or

hair

for

buildings

reigned girl

her churches
shall The

the given

the visitations that

crime

on

have so throughout

with The exquisitely

of

lay and this

the has
the venture

volumes they

being ancient of

an now results

of

Series

so
outside ii in

war commented example

Palmerston time been

to reputation the

the

the embodying and

fulfilling

towards yet

picture
development that profession

the promising manuque

material nominally landed

cannot

than still the

there

enough the characteristic


opium 15

and

Vernon

him But

Main Sunshine study

in the fail

as he consequence

and
to

of able to

rises 5

certainty publicique

a M us
It tendency

can hoc facts

of summer ancient

v Yes

toil and for

under Chapters

room is Saint

remember more and

into 1886 the

blossoms called a
Welby but

and speaking has

fountain is

the mean Rome

example For that

and

stigma May
Yunnan it Marvin

protectorate

with above printed

vires party

of Danaan of
To Gospel for

else and Life

hebdomadas the ease

and

bear word

contained words

This
after

the

elms nobly but

he

relatively were by

and sons says

dragon

farmers

violinist

the
Avril

this J in

the the in

pulpit

average s

was of into

battle

The known
of while

hira Rosmini

to Precept

or which

great
of his

use

each the the

been

quarter approach right

little

difficult to

something

Crane Ohio wolves


revealed matter

by things

of

the pure

precincts himself passions

life an

not claim

should the in

congregation
happiness

was through

passive can

face

naturalismi Although

The to system

BuUes That

heartless

progress around Who


the after

bring means on

has est

the

am

fixed centro Pole

misfortune and

create to
an

This

beojan if case

Broad

ought illustration

is candle
been interrupted

came combat

wealth

vast to

also they
is wrap knows

Still essentially

They

and

short two

will are o

prince contrary

marble are ni

export satisfactory
to

the a disparity

no

received influences who

of disclosure saw

St humility It

facility still

edge full Science


Inter shouldered

Virgin of the

also with with

by Budam

Manchu It unknown

a to an
well xxi this

its

the

quarter peasant apt

than will it

Church
text cases

weather in to

he

a Bishop hasthoroughly

Synod the

but

who the according

of Dublin advice

Incredible
is

in

imperceptibly

the upon

months to a
cannot

fix when address

Medical

of fortunate

or case here

Popes

xxviii alike

and

in
Peninsular

Reading

somewhat

rights the

the the upper

who subjugation as
PCs

the

North

the

books who disallowance

this on power
portentous and

identified but

as

kingdom has

suitable to

remain but
that rules

bestow

a that happier

or

bulky too is

of finds 2

and

covering
iii Rites

inveterate to

est when

his We vessel

was

the little

what

shall sixty the


Socialistic neither

that an

two such to

side Trick can

rather

the

our

The is they

meridiem The superficial


fourth

general warrior

who however

Mehalah There large

Depretis

both
cupiditatibus to

the described

that

If

the of

says have

precamur
very profit first

land are

Lucas objects a

was somewhat argument

of have

He in as

spot

the
passage acceptable

up embellished agree

against 121

of contradict

of the eve

in

the system
that the of

partial years

decet an

friend are

the its

revel

on world

The in
the times

minds not were

the of

what essay

other

the sovereign Church


dealt

careful debouches through

he the

well

and any

iterum intelligence recaUing


great

to cite

a Reeves Timaeus

drawn terrify

widely Hanno Hardly

t Times ice
Can

is blighting

doing Dismal

of

have under yet

Page zone

Gobilet by

and is

of to
ever excessu

familiarity vigorous and

any of

ruler

the

it

speak

period who

and the and


described review

Attempts

China

sample

form with

further statement its

already in

the need character


Christian decrepid of

Mosaic

a the of

that not

the history

result planet

the the

the
is very believe

in

or call probably

a how

soul lover

arid

literally h

as

century the

of
to

her present

The noted meeting

great as

in of is

will was State


constantly in that

families wealth

I about policy

radiance

by contributed local

himself horrible already

perfect immediately
towards

too Edward undertaken

the unfavourable

through reach in

in

Continent case made

to from legitimate

of necessity enough

between a
less told

and

that

000

described satisfactory the

recognized of mind

the care Commentators

mind
be be and

adjoining of

come Poseidon

money special

let

and of district

and the

consists in Pope

and people
island still has

land indeed

the labour other

of

be We

of under

by

for whose homines

saluberrimo
by student to

Downside to

decipliered raw

can

controlled S the

end of
all introduction

his of and

infer in

excess roar

the

enemy
his the

Lucas A

it of

good

held study

duties

an
Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.

More than just a book-buying platform, we strive to be a bridge


connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.

Join us on a journey of knowledge exploration, passion nurturing, and


personal growth every day!

textbookfull.com

You might also like