{"title":"The Design Principles of Hash Functions and Their Desirable Properties SHA-3 (KECCAK)","authors":"Saeed Alteneiji, Y. Alsalami","doi":"10.20533/icitst.2022.0003","DOIUrl":"https://doi.org/10.20533/icitst.2022.0003","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121300167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Advanced Encryption Standard Throughput Analysis on Windows and Linux Operating Systems","authors":"Kwame Assa-Agyei, F. Olajide","doi":"10.20533/icitst.2022.0007","DOIUrl":"https://doi.org/10.20533/icitst.2022.0007","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116986087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Automation and Cyber Security Procedures for Business Processes","authors":"Olatorera Williams, F. Olajide","doi":"10.20533/icitst.2022.0014","DOIUrl":"https://doi.org/10.20533/icitst.2022.0014","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security By Design Within The Fourth Industrial Revolution","authors":"A. Caldwell","doi":"10.20533/icitst.2022.0001","DOIUrl":"https://doi.org/10.20533/icitst.2022.0001","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121660512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System using Deep Learning","authors":"O. Ayeni, Stanley C. Ewa, Owolafe Otasowie","doi":"10.20533/icitst.2022.0005","DOIUrl":"https://doi.org/10.20533/icitst.2022.0005","url":null,"abstract":"— Intrusion Detection System (IDS) defined as a Device or software application which monitors the network or system activities and finds if there is any malicious activity occur. Outstanding growth and usage of internet raises concerns about how to communicate and protect the digital information safely. In today’s world hackers use different types of attacks for getting the valuable information. Many of the intrusion detection techniques, methods and algorithms help to detect those several attacks. The main objective of this paper is to provide a complete study about the intrusion detection, types of intrusion detection methods, types of attacks, different tools and techniques, research needs, challenges and finally develop the IDS Tool for Research Purpose That tool are capable of detect and prevent the intrusion from the intruder.","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128500581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese
{"title":"A Postquantum McEliece Cryptosystem for Securing Cloud Data","authors":"H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.20533/icitst.2022.0013","DOIUrl":"https://doi.org/10.20533/icitst.2022.0013","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Social Media Affects the Perception of Tourism Destination Image (TDI) of Potential Visitors to Pakistan","authors":"Rahal Ghazni","doi":"10.20533/icitst.2022.0009","DOIUrl":"https://doi.org/10.20533/icitst.2022.0009","url":null,"abstract":"","PeriodicalId":171403,"journal":{"name":"ICITST-2022 Proceedings","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131634095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}