Abstract
New types of constraints are considered. Reasons are described that lead to applications of intelligent, logic-based methods aiming at reduction of risk factors to ATMs. Special attention is paid to applications of Puzzle method in ATMs. To make a more independently functioning ATM, the proposed methods should be applied to data/knowledge/metaknowledge elicitation, knowledge refinement, analysis of different logical connections aiming at information checks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Insight. Intelligence. Information. http://www.atmsecurity.com/ to date
SANS Institute Reading Room site. http://www.sans.org/reading_room/-whitepapers/authentication/biometric-technology-stomps-identity-theft_126 to date
POPSCI. The future now. http://www.popsci.com/technology/-article/2011-06/russian-atm-determines-bankers-identity-and-whether-theyre-telling-truth to date
V. Jotsov, Intelligent information security systems. Sofia: Za Bukvite – O Pismeneh Publ. House (2010), 278 p
Constraint Satisfaction problems. http://www.cis.temple.edu/~giorgio/cis587/readings/constraints.html to date
Crossword Puzzles as Constraint Satisfaction Problems http://www.cs.columbia.edu/~evs/ais/finalprojs/steinthal/ to date
S. Dhurandher et al., Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation, in Proceedings of the 14th Communications and Networking Symposium, San Diego, CA, USA (2011), pp. 5–10
S. Kak, On the method of puzzles for key distribution. Int. J. Parallel Prog. 13(2), 103–109 (1984)
M. Hellman, An overview of public key cryptography. IEEE Communications Magazine 50th Anniversary Issue: Landmark 10 Papers, May 2002, pp. 42–49
Cassowary http://www.cassowary.net to date
Java constraint solver (JaCoP) http://jacop.osolpro.com/ to date
P. Van Hentenryck, L. Michel, Constraint-based local search (The MIT Press, Cambridge, 2009)
Berthier, D., Constraint Resolution Theories (Lulu.com Publishers, 2011)
Ontology-based constraint recognition for free-form service requests. http://www.deg.byu.edu/…/Al-MuhammedEmbley to date
C. Gomes, B. Selman, Heavy-tailed phenomena in satisfiability and constraint satisfaction problems. Journ. Autom. Reasoning 24, 67–100 (2000)
R. Barták, M.A. Salido, F. Rossi, New trends in constraint satisfaction, planning, and scheduling: a survey. Knowl. Eng. Rev. 1–24 (2004)
Security Ontology. http://securityontology.sba-research.org/ to date
A. Herzog, N. Shahmehri, C. Duma, An ontology of information security. Int. J. Inf. Secur. Priv. 1(4), 1–23 (2007)
Ontological Approach toward Cybersecurity in Cloud Computing. http://www.taketaka.com/manuscript/201009sin.pdf
C. Blanco et al., A systematic review and comparison of security ontologies, in Proceedings of International Conference on Availability, Reliability and Security (ARES), Barcelona (2008), pp. 813–820
A. Souag, Towards a new generation of security requirements definition methodology using ontologies, in Proceedings of 24th International Conference on Advanced Information Systems Engineering (CAiSE’12) Gdańsk, Poland, 25–29 June 2012, pp. 1–8
C. Torniai et al., Leveraging folksonomies for ontology evolution in e-learning environments, in Proceedings ICSC’08. Proceedings of the 2008 IEEE International Conference on Semantic Computing (EEE Computer Society Washington, DC, USA, 2008), pp. 206–213
G. Paliouras, D. Constantine, G. Tsatsaronis (eds.), Knowledge-Driven Multimedia Information Extraction and Ontology Evolution. Lecture Notes in Computer Science, IX, vol. 6050 (Springer, Berlin, 2011), 245 p
Protégé. http://protege.stanford.edu to date
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Jotsov, V., Sgurev, V. (2016). Security Applications Using Puzzle and Other Intelligent Methods. In: Hadjiski, M., Kasabov, N., Filev, D., Jotsov, V. (eds) Novel Applications of Intelligent Systems. Studies in Computational Intelligence, vol 586. Springer, Cham. https://doi.org/10.1007/978-3-319-14194-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-14194-7_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14193-0
Online ISBN: 978-3-319-14194-7
eBook Packages: EngineeringEngineering (R0)