Journal of Cybersecurity and Information Management最新文献

筛选
英文 中文
The Viola-Jones Face Detection Algorithm Analysis: A Survey Viola-Jones人脸检测算法分析:综述
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.060201
Ahmed A. Elngar, Mohamed Arafa, A. Naeem, Ahmed Rushdy Essa, Zahra Ahmed shaaban
{"title":"The Viola-Jones Face Detection Algorithm Analysis: A Survey","authors":"Ahmed A. Elngar, Mohamed Arafa, A. Naeem, Ahmed Rushdy Essa, Zahra Ahmed shaaban","doi":"10.54216/jcim.060201","DOIUrl":"https://doi.org/10.54216/jcim.060201","url":null,"abstract":"In this paper, we analysis the Viola-Jones algorithm, the most real-time face detection system has been used. It is consisting from three main concepts to enable a robust detection: the integral image for Haar feature computation, Adaboost for selecting feature and cascade to make resource allocation more efficient. Here we propose each stage starting from Integral image to the end with Cascading and some of algorithmic description for stages. The Viola-Jones algorithm gives multiple detections, a post-processing step which reduce detection redundancy using Adaboost and cascading.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transforming Healthcare Infrastructure for Enhanced Energy Efficiency and Privacy 转变医疗保健基础设施以提高能源效率和隐私
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.120204
Sudeshna Chakraborty, Akanksha Singh
{"title":"Transforming Healthcare Infrastructure for Enhanced Energy Efficiency and Privacy","authors":"Sudeshna Chakraborty, Akanksha Singh","doi":"10.54216/jcim.120204","DOIUrl":"https://doi.org/10.54216/jcim.120204","url":null,"abstract":"The Internet of Medical Things (IoMT) is a revolutionary technique for integrating the IT infrastructure of healthcare organisations with medical apps and equipment. Rapid advancements in this approach in recent years have resulted in game-changing improvements in the healthcare system, illness management, and patient care standards. Both achievements have been made possible by the Internet of Medical Things. People can use the IoMT to access a variety of cloud-based services, including file sharing, patient monitoring, data collection, information gathering, and hospital cleaning. Wireless sensor networks (WSNs), which collect and transmit data, are critical to system operation. In the healthcare system, patients’ privacy and security must be preserved at all costs. Wireless data transmission from these cutting-edge devices may have been intercepted and manipulated without consent. The hybrid and improved (Elliptic Curve Cryptography ECC) Energy-Efficient Routing Protocol (EERP) method, which is based on the elliptic curve encryption protocol, may provide enough protection for sensitive information. ECC-EERP uses pairs of public and private keys known only to each other to decode and encrypt data delivered across a network. As a result, the energy needed to sustain WSNs has dropped. To assess the efficacy of the recommended plan, we did an extensive study and compared our findings to the many other viable courses of action. We did the analysis while taking a variety of aspects into account. The study's findings and conclusion all point to the strategy's ability to significantly increase energy efficiency and security. ECC-EERP is a novel encryption method that increases data security while consuming less energy. Because of its efficacy in improving the whole healthcare system, this strategy has a lot of potential for the future of patient care, illness management, and healthcare delivery in general.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Information Management in Collaborative Environments Using Machine Learning 使用机器学习保护协作环境中的信息管理
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.110203
A. .., Karla .., Rabah Scharif
{"title":"Securing Information Management in Collaborative Environments Using Machine Learning","authors":"A. .., Karla .., Rabah Scharif","doi":"10.54216/jcim.110203","DOIUrl":"https://doi.org/10.54216/jcim.110203","url":null,"abstract":"Recently, there has been a significant increase in the use of collaborative environments for managing and sharing information. However, these environments often present significant security risks due to the potential for unauthorized access, data leakage, and other security breaches. To address these risks, machine learning (ML) techniques have been increasingly used to secure information management in collaborative environments. We propose a novel ML approach to be applied to detect and prevent security threats in collaborative environments. Our approach integrates temporal convolution to detect and prevent security threats by analyzing spatial-temporal patterns in data from various sources, such as network traffic, system logs, and user behavior. Furthermore, we present a case study demonstrating the effectiveness of our model in securing collaborative information management. The case study involves the development of our system for detecting insider threats in a collaborative environment. Extensive experimentation on this case study demonstrates the efficiency and effectiveness of the proposed system for securing information management and promoting further developments.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Feature Subset Selection with Machine Learning based Risk Management for DAS Prediction 基于机器学习的DAS预测风险管理的智能特征子集选择
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.080101
Mohamed Abdel-Basset, M. Elhoseny
{"title":"Intelligent Feature Subset Selection with Machine Learning based Risk Management for DAS Prediction","authors":"Mohamed Abdel-Basset, M. Elhoseny","doi":"10.54216/jcim.080101","DOIUrl":"https://doi.org/10.54216/jcim.080101","url":null,"abstract":"In the current epidemic situations, people are facing several mental disorders related to Depression, Anxiety, and Stress (DAS). Numerous scales are developed for computing the levels for DAS, and DAS-21 is one among them. At the same time, machine learning (ML) models are applied widely to resolve the classification problem efficiently, and feature selection (FS) approaches can be designed to improve the classifier results. In this aspect, this paper develops an intelligent feature selection with ML-based risk management (IFSML-RM) for DAS prediction. The IFSML-RM technique follows a two-stage process: quantum elephant herd optimization-based FS (QEHO-FS) and decision tree (DT) based classification. The QEHO algorithm utilizes the input data to select a valuable subset of features at the primary level. Then, the chosen features are fed into the DT classifier to determine the existence or non-existence of DAS. A detailed experimentation process is carried out on the benchmark dataset, and the experimental results showcased the betterment of the IFSML-RM technique in terms of different performance measures.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126219695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator 一种基于融合变换和边缘算子的改进图像加密算法
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.080105
Vandana Roy
{"title":"An Improved Image Encryption Consuming Fusion Transmutation and Edge Operator","authors":"Vandana Roy","doi":"10.54216/jcim.080105","DOIUrl":"https://doi.org/10.54216/jcim.080105","url":null,"abstract":"The field of cryptography oversees the development of methods for transforming information between coherent and incoherent formats. Encryption and decryption techniques controlled by keys maintain the privacy of the substance and who can access it. Private key cryptography refers to methods of encryption and decryption that employ the same secret key. The alternative is public key cryptography, wherever the encryption and decryption keys are different. It is essential for the sanctuary of any crypto scheme that the confusion and diffusion properties be met. While the diffusion property rearranges the pixels in an image, the confusion property simply replaces the pixel values. In-depth discussion of a genetic-algorithm-based hybrid approach to secure and complex three-dimensional chaos-based image encryption (SCIE) has been presented. Here, we use mathematics edge, multipoint edges operator, and coupled transmutation operatives to accomplish permutation. In this method, a key stream is created using a 3D CSI (Compound Sine and ICMIC) map. Using a private key, hybrid operators are used to encrypt data. Several metrics were considered while evaluating the suggested algorithm's efficacy, including the UACI (Unified Average Change Intensity), correlation constant, NPCR (Net Pixel Change Rate). Experiments with the same have shown promising results in protecting real-time photos.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Neutrosophic Proposed Model for Evaluation Blockchain Technology in Secure Enterprise Distributed Applications 安全企业分布式应用中评估区块链技术的中性建议模型
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.110101
Nada A. Nabeeh, Alshaimaa A. Tantawy
{"title":"A Neutrosophic Proposed Model for Evaluation Blockchain Technology in Secure Enterprise Distributed Applications","authors":"Nada A. Nabeeh, Alshaimaa A. Tantawy","doi":"10.54216/jcim.110101","DOIUrl":"https://doi.org/10.54216/jcim.110101","url":null,"abstract":"Applications that are enabled by blockchain technology have been infused with a decentralized system without the need for intermediate entities. Blockchain technology indicates opportunities with various technologies and applications. Recently, a meteoric rise in the amount of interest has been indicated by academics in blockchain technology. Nevertheless, the acceptance of this blockchain technology paradigm in corporate distributed systems is not exactly promising. Executives and technocrats in a business are required to engage in multiple-criteria decision-making (MCDM) with operating uncertainty factors for the acceptance of new technologies. The proposed model aims to develop a model to identify and keep track of major elements that contribute to the sluggish pace for blockchain technology to be adopted by the general public. The study applied the Evaluation Based on the Distance from Average Solution (EDAS) approach to its interval-valued neutrosophic variant, which has the benefit of concurrently with the consideration of a decision maker's truthiness, falsity, and indeterminacy. The EDAS considers the distances of alternatives from the actual solutions considered by each criterion. In addition, the proposed model illustrated the use of neutrosophic theory with the EDAS method to rank blockchain technology in enterprise-distributed applications in uncertain conditions to aid decision-makers in optimal solutions. A numerical case study is illustrated to show the effectiveness of the proposed model in aiding decision-makers to achieve optimal solutions in uncertain conditions.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Security in Healthcare Systems: Integration of Information Security and Information Management 医疗保健系统中的数据安全:信息安全和信息管理的集成
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.110202
A. Abdelaziz, A. N. Mahmoud
{"title":"Data Security in Healthcare Systems: Integration of Information Security and Information Management","authors":"A. Abdelaziz, A. N. Mahmoud","doi":"10.54216/jcim.110202","DOIUrl":"https://doi.org/10.54216/jcim.110202","url":null,"abstract":"Effective management of patient data is critical for improving the quality of care and patient outcomes in healthcare systems. However, ensuring the confidentiality, integrity, and availability of patient data while complying with regulatory requirements can be challenging. To address this challenge, this work proposes an artificial intelligence (AI)-enabled framework that integrates information security (IS) and information management (IM) capabilities into a unified solution for improving the overall functionality of healthcare systems. The proposed framework leverages AI algorithms to automate managerial transactions of healthcare systems, while ensuring they are secure against possible threats. By automating these tasks, the framework can reduce the burden on healthcare staff, improve the accuracy and speed of information processing, and reduce the risk of human error. Our framework provides accurate and timely information to healthcare providers, enabling them to make informed decisions and provide better care to patients.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126815058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Cyber Threat Intelligence Sharing through a Privacy-Preserving Federated Learning Approach 通过保护隐私的联邦学习方法加强网络威胁情报共享
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.090205
A. Sleem, Ibrahim Elhenawy
{"title":"Enhancing Cyber Threat Intelligence Sharing through a Privacy-Preserving Federated Learning Approach","authors":"A. Sleem, Ibrahim Elhenawy","doi":"10.54216/jcim.090205","DOIUrl":"https://doi.org/10.54216/jcim.090205","url":null,"abstract":"This paper proposes a privacy-preserving federated learning approach to enhance cyber threat intelligence sharing. Cyber threats are becoming more sophisticated and are posing serious security risks to organizations. Sharing threat intelligence information can help to detect and mitigate these threats quickly. However, privacy concerns and data protection regulations hinder the sharing of sensitive information. Federated learning is a promising approach that allows multiple parties to collaborate in building a global model while preserving data privacy. We propose a framework that utilizes federated learning to train a global threat intelligence model without compromising the privacy of individual organizations' data. Our approach also includes a differential privacy mechanism to ensure the anonymity of the participating organizations. We demonstrate the effectiveness of our approach through experiments conducted on real-world datasets, showing that it achieves high accuracy while maintaining data privacy. The proposed approach has the potential to facilitate more effective and secure cyber threat intelligence sharing among organizations.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129076614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust Aware Aquila Optimizer based Secure Data Transmission for Information Management in Wireless Sensor Networks 基于信任感知Aquila优化器的无线传感器网络信息管理安全数据传输
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.090104
A. Abualkishik, A. Alwan
{"title":"Trust Aware Aquila Optimizer based Secure Data Transmission for Information Management in Wireless Sensor Networks","authors":"A. Abualkishik, A. Alwan","doi":"10.54216/jcim.090104","DOIUrl":"https://doi.org/10.54216/jcim.090104","url":null,"abstract":"The province of wireless sensor network (WSN) is increasing continuously because of wide-ranging applications, namely, monitoring environmental conditions, military, and many other fields. But trust management in the WSN is the main objective as trust was utilized once cooperation among nodes becomes crucial to attaining reliable transmission. Thus, a new trust-based routing protocol is introduced to initiate secure routing. This study focuses on the design of Trust Aware Aquila Optimizer based Secure Data Transmission for Information Management (TAAO-SDTIM) in WSN. The presented TAAO-SDTIM model mainly intends to achieve maximum security and information management in WSN. The presented TAAO-SDTIM model determines optimum set of routes to base station (BS) utilizing a fitness function involving three parameters like residual energy (RE), distance to BS (DBS), and trust level (TL). The incorporation of the trust level of the nodes in the route selection process aids in appropriately selecting highly secure nodes in the data transmission procedure. For ensuring the enhanced performance of the TAAO-SDTIM model, a wide range of experiments are executed and the results pointed out the improved outcomes of the TAAO-SDTIM model over the other recent approaches.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131530483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Proposed Blockchain based System for Secure Data Management of Computer Networks 一种基于区块链的计算机网络安全数据管理系统
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.110204
Taif Khalid Shakir, Rabah Scharif, Manal M. Nasir
{"title":"A Proposed Blockchain based System for Secure Data Management of Computer Networks","authors":"Taif Khalid Shakir, Rabah Scharif, Manal M. Nasir","doi":"10.54216/jcim.110204","DOIUrl":"https://doi.org/10.54216/jcim.110204","url":null,"abstract":"As technology continues to evolve, the importance of information security and management becomes more crucial than ever. Blockchain and machine learning (ML) are two technologies that are gaining increasing attention in this field. Blockchain provides a secure and decentralized platform for storing and sharing information, while ML can help detect patterns and anomalies in data to identify potential security threats. This paper proposes a blockchain-based ML system for securing information management by providing an automated service for detecting anomalies in Ethereum transactions. The system utilizes a blockchain network to securely store and manage data, and ML algorithms to analyze and detect potential security threats. We present a case study using the Ethereum Fraud Detection Dataset to demonstrate the effectiveness of our proposed system in detecting fraudulent transactions. Our results show that our system outperforms traditional ML algorithms in terms of accuracy (99.55%), and F1-score (99.98%), highlighting the potential of blockchain-based ML for improving information security and management in various industries.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"752 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123873614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信