Journal of Cybersecurity and Information Management最新文献

筛选
英文 中文
An Intelligent Spatial Military Intrusion Detection using Reactive Mobility Unmanned Vehicles Based on IoT and metaheuristic Optimization Algorithm 基于物联网和元启发式优化算法的被动机动无人车空间军事入侵智能检测
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.090203
Lobna Osman
{"title":"An Intelligent Spatial Military Intrusion Detection using Reactive Mobility Unmanned Vehicles Based on IoT and metaheuristic Optimization Algorithm","authors":"Lobna Osman","doi":"10.54216/jcim.090203","DOIUrl":"https://doi.org/10.54216/jcim.090203","url":null,"abstract":"One of the most significant uses of the Internet of Things is military infiltration detection (IoT). Autonomous drones play a major role in IoT-based vulnerability scanning (UVs). By relocating UVs remotely, this work introduces a new algorithm called the Moth-Flame Optimization Algorithm (MFO). In particular, MFO is used to proactively manage UVs under various scenarios and under different intrusion-covering situations. According to actual studies, the suggested algorithm is both profitable and efficient.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121442137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique 基于对称加密和属性加密技术的集中能耗无线传感器网络
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.120101
A. Soni
{"title":"A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique","authors":"A. Soni","doi":"10.54216/jcim.120101","DOIUrl":"https://doi.org/10.54216/jcim.120101","url":null,"abstract":"Wireless sensor networks (WSNs) are increasingly used in a wide variety of settings, including defence, industry, healthcare, and education. Hundreds or even thousands of sensor nodes are spread out across a given area and linked to a central Base Station (BS) in order to keep tabs on the environment. The BS then sends the data out to the users over the internet. The sensor network's adaptability, portability, dependability, and quickness are driving its widespread use across industries. The suggested SHS evaluates the efficiency of well-established symmetric algorithms to see where it stands in the spectrum of security. The Blowfish encryption algorithm was proven to require the least amount of processing power after extensive benchmarking. Therefore, the Blowfish algorithm is selected to protect sensitive medical information. The medical database receives the encrypted health records. Only those with proper permissions should be able to access them. Therefore, the CP-ABE is implemented to regulate access to patient records. The SHS's results on the dataset are compared to those of other existing systems. With SHS, health data may be transmitted to doctors rapidly and securely because it requires less computing time and energy. In addition to these benefits, SHS also offers privacy, authentication, and authorization.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130572595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity in Networking Devices 网络设备中的网络安全
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.080104
Afroj Jahan Badhon, S. Aggarwal
{"title":"Cybersecurity in Networking Devices","authors":"Afroj Jahan Badhon, S. Aggarwal","doi":"10.54216/jcim.080104","DOIUrl":"https://doi.org/10.54216/jcim.080104","url":null,"abstract":"Cybersecurity is training defensive arrangements, systems, and plans to save the information from cyber outbreaks. These virtual outbreaks are typically intended to retrieve, alter, or otherwise extinguish delicate data, extracting currency from manipulators, or disturb usual commercial procedures. System Security defends one’s system and information from breaks, interruptions also other intimidations. Network Security contains admission controller, computer virus and defiant computer virus software program, system safety, system analytics, system-connected protection categories, firewalls, and VPN encoding. System substructure strategies stand the mechanisms of a net that conveyance transportations desired intended for information, submissions, facilities, and multimedia. In this paper, we reflect on Cybersecurity in Networking Devices.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133040471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble 基于导向鲸优化算法的投票集合恶意软件检测与分类
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.100102
M. Eid, M. I. F. Allah
{"title":"Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble","authors":"M. Eid, M. I. F. Allah","doi":"10.54216/jcim.100102","DOIUrl":"https://doi.org/10.54216/jcim.100102","url":null,"abstract":"Malware is software that is designed to cause damage to computer systems. Locating malicious software is a crucial task in the cybersecurity industry. Malware authors and security experts are locked in a never-ending conflict. In order to combat modern malware, which often exhibits polymorphic behavior and a wide range of characteristics, novel countermeasures have had to be created. Here, we present a hybrid learning approach to malware detection and classification. In this scenario, we have merged the machine learning techniques of Random Forest and K-Nearest Neighbor Classifier to develop a hybrid learning model. We used current malware and an updated dataset of 10,000 examples of malicious and benign files, with 78 feature values and 6 different malware classes to deal with. We compared the model's results with those of current approaches after training it for both binary and multi-class classification. The suggested methodology may be utilized to create an anti-malware application that is capable of detecting malware on newly collected data.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explaining feature detection Mechanisms: A Survey 解释特征检测机制:综述
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.060103
Ahmed A. Elngar, Mohamed Arafa, Mustafa Marouf, M. Ahmed, Nehal Fawzy
{"title":"Explaining feature detection Mechanisms: A Survey","authors":"Ahmed A. Elngar, Mohamed Arafa, Mustafa Marouf, M. Ahmed, Nehal Fawzy","doi":"10.54216/jcim.060103","DOIUrl":"https://doi.org/10.54216/jcim.060103","url":null,"abstract":"Feature detection, description and matching are essential components of various computer vision applications; thus, they have received a considerable attention in the last decades. Several feature detectors and descriptors have been proposed in the literature with a variety of definitions for what kind of points in an image is potentially interesting (i.e., a distinctive attribute). This chapter introduces basic notation and mathematical concepts for detecting and describing image features. Then, it discusses properties of perfect features and gives an overview of various existing detection and description methods. Furthermore, it explains some approaches to feature matching. Finally, the chapter discusses the most used techniques for performance evaluation of detection algorithms.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"27 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132363873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Approach to Detecting Deepfake Videos: An Investigation of Feature Extraction Techniques 检测深度假视频的机器学习方法:特征提取技术的研究
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.090204
Preeti Singh, Khyati Chaudhary, Gopal Chaudhary, Manju Khari, Bharat Rawal
{"title":"A Machine Learning Approach to Detecting Deepfake Videos: An Investigation of Feature Extraction Techniques","authors":"Preeti Singh, Khyati Chaudhary, Gopal Chaudhary, Manju Khari, Bharat Rawal","doi":"10.54216/jcim.090204","DOIUrl":"https://doi.org/10.54216/jcim.090204","url":null,"abstract":"Deepfake videos are a growing concern today as they can be used to spread misinformation and manipulate public opinion. In this paper, we investigate the use of different feature extraction techniques for detecting deepfake videos using machine learning algorithms. We explore three feature extraction techniques, including facial landmarks detection, optical flow, and frequency analysis, and evaluate their effectiveness in detecting deepfake videos. We compare the performance of different machine learning algorithms and analyze their ability to detect deepfakes using the extracted features. Our experimental results show that the combination of facial landmarks detection and frequency analysis provides the best performance in detecting deepfake videos, with an accuracy of over 95%. Our findings suggest that machine learning algorithms can be a powerful tool in detecting deepfake videos, and feature extraction techniques play a crucial role in achieving high accuracy.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128244321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Hot Spot Problem in Wireless Sensor Networks using Political Optimizer Based Unequal Clustering Technique 基于政治优化的不平等聚类技术缓解无线传感器网络中的热点问题
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.080201
Sahil Verm, Sanjukta Gain
{"title":"Mitigating Hot Spot Problem in Wireless Sensor Networks using Political Optimizer Based Unequal Clustering Technique","authors":"Sahil Verm, Sanjukta Gain","doi":"10.54216/jcim.080201","DOIUrl":"https://doi.org/10.54216/jcim.080201","url":null,"abstract":"Wireless Sensor Network (WSN) encompasses a set of wirelessly connected sensor nodes in the network for tracking and data gathering applications. The sensors in WSN are constrained in energy, memory, and processing capabilities. Despite the benefits of WSN, the sensors closer to the base station (BS) expels their energy faster. It suffers from hot spot issues and can be resolved by the use of unequal clustering techniques. In this aspect, this paper presents a political optimizer-based unequal clustering scheme (POUCS) for mitigating hot spot problems in WSN. The goal of the POUCS technique is to choose cluster heads (CHs) and determine unequal cluster sizes. The POUCS technique derives a fitness function involving different input parameters to minimize energy consumption and maximize the lifetime of the network. To showcase the enhanced performance of the POUCS technique, a comprehensive experimental analysis takes place, and the detailed comparison study reported the better performance of the POUCS technique over the recent techniques.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130735333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cybersecurity Detection Model using Machine Learning Techniques 使用机器学习技术的网络安全检测模型
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.120104
Mustafa El .., Aaras Y Y.kraidi
{"title":"Cybersecurity Detection Model using Machine Learning Techniques","authors":"Mustafa El .., Aaras Y Y.kraidi","doi":"10.54216/jcim.120104","DOIUrl":"https://doi.org/10.54216/jcim.120104","url":null,"abstract":"The use of machine learning methods in cybersecurity is only one of many examples of how this once-emerging innovation has entered the mainstream. Anomaly-based identification of common assaults on vital infrastructures is only one instance of the various applications of malware analysis. Scholars are using machine learning-based identification in numerous cybersecurity solutions since signature-based approaches are inadequate at identifying zero-day threats or even modest modifications of established assaults. In this work, we introduce the machine-learning models-based security framework to detect cyber-attacks. This paper used three machine learning models Logistic Regression, Random Forest, and K-Nearest Neighbor This framework not only reduces the computational difficulty of the framework by minimizing the feature parameters, but it also performs well in terms of accuracy in forecasting unknown scenarios in the tests. Finally, we ran trials using cybersecurity datasets to measure the machine learning model's performance using metrics including precision, recall, and accuracy.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"47 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things 基于有效雾计算的物联网网络攻击分布式预测
Journal of Cybersecurity and Information Management Pub Date : 1900-01-01 DOI: 10.54216/jcim.120201
Vandana Roy
{"title":"An Effective FOG Computing Based Distributed Forecasting of Cyber-Attacks in Internet of Things","authors":"Vandana Roy","doi":"10.54216/jcim.120201","DOIUrl":"https://doi.org/10.54216/jcim.120201","url":null,"abstract":"Existing cloud based security procedures are insufficient to manage the ever-increasing assaults in IoT due to the volume of data generated and the processing latency. IoT applications are vulnerable to cyberattacks, and some of these assaults might have catastrophic results if not stopped or mitigated quickly enough. As a result, IoT calls for self-protect security systems that can automatically interpret attacks in IoT traffic and efficiently handle the attack situation by activating the proper response quickly. Fog computing satisfies this need because it can embed the intelligent self-protection mechanism in the distributed fog nodes, allowing them to swiftly deal with the assault scenario and safeguard the IoT application with little in the way of human interaction. At the fog nodes, the forecasting method employs distributed Gaussian process regression. The cyber-attack may be predicted more quickly and with less mistake for both low- and high-rate attacks thanks to the local forecasting about the IoT traffic characteristics at fog node. One of the fundamental necessities of an IoT security mechanism is the ability to forecast attacks in a timely manner with a high degree of accuracy, and the simulation results highlight this fact.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128561278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信