{"title":"Spear-Phishing campaigns: Link Vulnerability leads to phishing attacks, Spear-Phishing electronic/UAV communication-scam targeted","authors":"M. S. Baig, Faisal Ahmed, Ali Mobin Memon","doi":"10.1109/ICCIS54243.2021.9676394","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676394","url":null,"abstract":"One of the most important strategies for gaining unauthentic early access to some person/company's computing resources/data is spear phishing. Phishing is, at its core, a sort of social engineering intended to persuade a user to give sensitive information or run a payload that will infect their system. Spear phishing is a type of phishing in which bogus emails are sent to specific businesses with the goal of obtaining confidential information. A successful phishing campaign necessitates the use of a few different resources as well as some setup. Impersonation, inducement, and access- control bypass techniques are among its approaches. In this paper we have studied and found up to date approaches to spear phishing attacks and their preventative measures. The paper also demonstrates the steps to set up and run successful phishing campaign and the results astonishingly shows that even only personality-targeted messaging can alter the response to phishing attacks. As a result of learning the facts, the paper suggests that users should seek to improve their security awareness by becoming familiar with the warning signs of phishing attacks. Moreover, more often in Unmanned Aerial Vehicles (UAV) or drones (which are now being used in various domains including military operations, monitoring, etc.), the resources are deployed as web services which makes them vulnerable to phishing activities. A data mining technique is also suggested as a tool for the detection of phishing attacks in UAVs.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125497652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Approach of GIS and Machine Learning to Assess the Spatio-Temporal Earthquake Vulnerability in South Africa","authors":"Iqra Atif, F. Cawood, M. Mahboob, Sarfraz Ali","doi":"10.1109/ICCIS54243.2021.9676395","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676395","url":null,"abstract":"South Africa is experiencing a high frequency of seismic events which have catastrophic effects on individuals and infrastructure. This study aims to utilize the integrated approach of Geographical Information Systems (GIS) and Machine Learning (ML) based algorithms to analyse the large amount of seismicity data to discover the meaningful patterns and assess the geo-vulnerability of earthquakes with good confidence level in South Africa. Several analytical and modelling techniques including Space-Time Pattern Mining, Artificial Neural Networks (ANN) based hot and cold spots were applied. The results of earthquake data from year 1973 to 2021 revealed that in total there were 1,680 earthquake events that occurred with magnitude ranges from mild to moderate (2 ≤ M ≤ 5). Earthquakes with higher magnitude were concentrated notably in the Gauteng (48%) followed by North-West (31%) provinces of the South Africa. Also, 63% of the magnitude and depth of earthquakes are oriented from North-East to South-West direction. A significant increasing trend of earthquake was observed in some areas of Free State (p ≤ 0.1), Limpopo (p ≤ 0.1), Western Cape (p ≤ 0.5) and Gauteng (p ≤ 0.5) provinces. Whereas decreasing trend was found in areas of North-West (p ≤ 0.1) and Mpumalanga (p ≤ 0.5). The ANN based hot spot analysis predicted the cluster of high magnitude earthquakes (hot spots) in North-West province and low magnitude earthquakes (cold spots) in Gauteng province. Although the earthquake vulnerability is low in Gauteng province but these cold spots could be related to the deep mining activities in the region and have the potential to trigger the rock burst phenomena at the mines. The results can help the disaster management authorities for smart decision making, and urban and regional planning of future activities in the region.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129533505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Areej Kamal, Batul Naushad, Hadia Rafiq, S. Tahzeeb
{"title":"Smart Career Guidance System","authors":"Areej Kamal, Batul Naushad, Hadia Rafiq, S. Tahzeeb","doi":"10.1109/ICCIS54243.2021.9676408","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676408","url":null,"abstract":"We have developed a career guidance system that helps those students who are about to begin their higher education. Most of the time, students are not aware of what career path to follow or which academic major is in accordance with their interests. The system analyzes students' skills, abilities, and interests and recommends the five fields which are most suitable for them. This project helps students identify a specific domain that fits their skills and interests. Smart Career Guidance System is a web-based application built on the Django framework. We have deployed various Machine Learning techniques and algorithms to mimic a one-on-one meeting with an experienced career counselor. The data was collected in the form of a questionnaire that was based on Holland Occupational Themes and the Theory of Multiple Intelligences. A total of 392 graduates completed this online survey. SMOTE oversampling is used to evaluate the machine learning classifiers since the data is highly imbalanced. We tested XGBoost and Random Forest classifiers for recommending the best-suited career options which furnish AUC-ROC performance scores of 0.9952 and 0.9963 respectively. A fine-tuned version of the Random Forest Classifier has successfully attained an AUC-ROC performance score of 0.9976 which indicates the minimal false-positive rate. Ms. Areej Kamal, Ms. Hadia Rafiq and Ms. Batul Naushad have collaboratively conducted all activities of the project including data collection and cleaning, literature review, testing of ML models and development of the final solution. Mr. Shahab Tahzeeb directed and supervised all phases of the project with his immense knowledge and expertise.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"6 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130577610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atta ur Rahman, U. Janjua, Tahir Mustafa Madni, Irfan Kazim, Muhammad Yaseen, Inayat ur Rahman
{"title":"The Temporal Distance Issues and their Mitigation Strategies in (GSD): A Systematic Literature Review","authors":"Atta ur Rahman, U. Janjua, Tahir Mustafa Madni, Irfan Kazim, Muhammad Yaseen, Inayat ur Rahman","doi":"10.1109/ICCIS54243.2021.9676378","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676378","url":null,"abstract":"GSD offers several benefits that facilitate software organizations to adopt this trend, such as highly skilled employees, reduced cost, cheap labour, improved marketplace, etc. To achieve these benefits, communication among the distributed teams should be adequate. Communication is a significant challenge in development, particularly in GSD. Communication risk is further divided into temporal, Geographical, and sociocultural distance issues. Among these, the temporal distance issue is affecting more GSD activities. It produces a significant problem in distributed development. While using mitigation strategies, organizations can minimize these issues and achieve the desired quality within budget and time constraints. Therefore, the current study aims to recognize temporal distance issues and their mitigation strategies in GSD. A Systematic Literature Review (SLR) has been performed to find all the temporal distance issues and their mitigating strategies in GSD. A conceptual framework has been proposed.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125894751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Substation Monitoring & Control System Using Arduino with Data Logging","authors":"Sadiq Ur Rehman, Halar Mustafa, Ali Raza Larik","doi":"10.1109/ICCIS54243.2021.9676384","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676384","url":null,"abstract":"Monitoring and controlling the substations is a significant task in this period of automation to provide consumers with safe electricity. But the danger of blackouts, brownouts, and fires is rapidly increasing due to the old configuration of distribution grids (substations) and the absence of automation systems to monitor the vital conditions in substations systems. The substation includes various electronic components such as transformers, breakers, and relays. Overheating can lead to transformer fluid leakage or internal insulation breakdown problems. The old technique requires manual system checking that occurs periodically and with very little precision. Moreover, substations in urban areas are more difficult to check physically and thus take additional time to carry out related activities. We proposed a system that is low cost, user friendly, and works in auto mode to avoid labor involvement, electricity loss. The results of the system are displayed in many ways to assure that the system parameters will be monitored and controlled by more than one person because of safety and protection reasons. The uniqueness of this system is the display of results on desktop and mobile phones simultaneously. The result on the CAYENNE platform validates the performance of our proposed system in real-time monitoring, data logging, and controlling.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128933828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Approaches for Non-Functional Requirement Modeling: A Literature Survey","authors":"Saman Tariq, Sehrish Munawar Cheema","doi":"10.1109/ICCIS54243.2021.9676398","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676398","url":null,"abstract":"The term ‘non-functional requirement’ plays an important role for the success and failure of any software project. It have been studied since over 4 decades, however there are many consensus in software engineering community due to that many of research questions are significantly important to researchers. Non-Functional Requirements (NFRs) such as security, accuracy, safety and performance are crucial for the system in order to deliver good and reliable product and to achieve customer satisfaction. These aspects should consider developing and maintaining a system successfully. This paper surveys the existing techniques and tools in terms of their working, applicability while considering the context of the project. The main focus of this study is to identify and analyze the approaches available in literature to elicit, model and integrate non-functional requirements (NFRs). We performed a detailed analysis of existing approaches on the basis of our significant research questions and derive the suitability of these approaches in specific contexts and projects.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125422756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nehan Abdul Ghani, Yumna Shahid, Zahra Mubeen, Mahnoor Khursheed, Sundus Ali, M. Aslam
{"title":"Prototype Implementation of Device-to-Device Communication","authors":"Nehan Abdul Ghani, Yumna Shahid, Zahra Mubeen, Mahnoor Khursheed, Sundus Ali, M. Aslam","doi":"10.1109/ICCIS54243.2021.9676389","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676389","url":null,"abstract":"In this paper, we present a low-cost, prototype ZigBee implementation of device-to-device (D2D) communication. We implemented two different scenarios related to D2D communication using ZigBee and Arduino modules. In first scenario, we achieved a single-hop D2D communication for direct data transmission between user equipment (UE). In this implementation, controlling functions are performed by a ZigBee controller serving as a base station whereas data transfer takes place between UEs without need of the controller. In second scenario, we implemented multi-hop communication in which first UE is placed beyond the coverage region of the base station and other UE serves as a relay to establish communication between first UE and the base station. Hence, this implementation reflects the range-extension application of D2D communication. We have also evaluated performance of single-hop and multi-hop communication network and have presented the same in this paper.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132798879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. J. Muhammad, Jamila Musa Amshi, S. Usman, I. Badi, I. .. Mohammed, O. S. Dada, Ahmed Abba Haruna
{"title":"Deep Learning Models for Classification and Localization of COVID-19 Abnormalities on Chest Radiographs","authors":"L. J. Muhammad, Jamila Musa Amshi, S. Usman, I. Badi, I. .. Mohammed, O. S. Dada, Ahmed Abba Haruna","doi":"10.1109/ICCIS54243.2021.9676401","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676401","url":null,"abstract":"COVID-19 pandemic is five times more deadly than flu and other disease. It causes serious morbidity and mortality across the world. Like other pneumonias, pulmonary infection with COVID-19 results in fluids in the lungs and inflammation. Equally, the disease looks very similar to other bacterial and viral pneumonias on chest radiographs; as such it is very difficult to be diagnosed. In this work, Convolutional Neural Network (CNN), Faster Region Based Convolutional Neural Network (Faster R-CNN) and Chest X-ray Network (CheXNet) deep learning algorithms were used to develop models for classification and localization of COVID-19 abnormalities on chest radiographs models for normal and opacity (typical, atypical, indeterminate) cases in order to help medical doctors, radiologists and other health workers to provide fast and confident diagnosis of the COVID-19. Hence, CheXNet based model has comparatively outperformed other models for being able to classify chest radiographs as negative for pneumonia or typical, indeterminate and atypical for COVID-19 pandemic with 97% accuracy and more so for its ability to correctly classify chest radiographs for typical, indeterminate and atypical COVID-19 pandemic cases the model has comparatively outperformed other models with 93% precision. However, for the ability to correctly classify the chest radiographs as negative for pneumonia, Faster R-CNN based model outperformed other models with 94% recall.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132223329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tahniyat Aslam, Irfan Uddin Ahmed, Sundus Ali, M. Aslam
{"title":"TeraHertz Communication and Associated Challenges in 6G Cellular Networks","authors":"Tahniyat Aslam, Irfan Uddin Ahmed, Sundus Ali, M. Aslam","doi":"10.1109/ICCIS54243.2021.9676382","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676382","url":null,"abstract":"Due to the rapid growth of connected devices, the demand of high data rate services have also increased, which has been a major enabler for the evolution of wireless technologies from the past decade. Wireless communication at the TeraHertz (THz) frequency band is considered as one of the key technologies of 6th Generation cellular networks (6G). Owing to the availability of the wider bandwidth, the THz frequencies can provide significant increase in wireless capacity to support multi Gigabit-per-second (Gbps) data rates and maintaining highly secure transmission. Despite of numerous advantages of using THz communications, there are some challenges associated with THz communications that degrade the performance of wireless system. These challenges include increased interference, co-tier interference, effect of blockages, fading, molecular absorption loss and higher path loss etc. In this paper, we have investigated the significance of a THz band enabled 6G cellular network and have also highlighted some critical issues and challenges that should be taken into consideration when deploying THz enabled 6G cellular network. Our contribution, is presentation of a consolidated and summarized overview on various use cases, applications and challenges of THz communication enabled in 6G Cellular Networks.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114800709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Propane Demand Generation with Autoregressive Artificial Neural Networks","authors":"A. Siddiqui, S. A. Raza","doi":"10.1109/ICCIS54243.2021.9676379","DOIUrl":"https://doi.org/10.1109/ICCIS54243.2021.9676379","url":null,"abstract":"Propane is a major crude oil byproduct generated by oil refineries. Its applications range from home heating to varied industrial and commercial purposes. Due to the nonlinear nature of the demand generation process, predicting this demand with traditional econometric approaches leads to inaccurate results. In this paper, we thus propose an alternative Autoregressive Neural Network (ARNN) based approach. We also employed the Autoregressive Integrated Moving Average (ARIMA) model to benchmark the performance of ARNN. The results show a 55% reduction in Mean Squared Error when ARNN is used over ARIMA. This improvement bears significant consequences for planning and decision-making by refineries.","PeriodicalId":165673,"journal":{"name":"2021 4th International Conference on Computing & Information Sciences (ICCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129893967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}