{"title":"Security Life Cycle framework for Exploring & Prevention of Zero day attacks in Cyberterrorism","authors":"Bassam Mohammad Elzaghmouri, A. Habboush","doi":"10.47893/ijcct.2023.1439","DOIUrl":"https://doi.org/10.47893/ijcct.2023.1439","url":null,"abstract":"The rise of cyber terrorism poses a significant threat to governments, businesses, and individuals worldwide. Cyber terrorists use information technology to carry out attacks that range from simple hacking attempts to more sophisticated attacks involving malware, ransomware, and zero-day exploits. This paper aims to provide an in-depth understanding of cyber terrorism, with a special focus on zero-day attacks. As the world becomes more digitized and automated, it brings convenience to everyone's lives. However, it also leads to growing concerns about security threats, including data leakage, website hacking, attacks, phishing, and zero-day attacks. These concerns are not only for organizations, businesses, and society, but also for governments worldwide. This paper aims to provide an introductory literature review on the basics of cyber-terrorism, focusing on zero-day attacks. The paper explores the economic and financial destruction caused by zero-day attacks and examines various types of zero-day attacks. It also looks at the steps taken by international organizations to address these issues and the recommendations they have made. Additionally, the paper examines the impact of these externalities on policymaking and society. As cyber-security becomes increasingly important for businesses and policymakers, the paper aims to delve deeper into this aspect, which has the potential to threaten national security, public life, and the economic and financial stability of developed, developing, and underdeveloped economies.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127015917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Employee Attrition System Prediction using Random Forest Classifier","authors":"Soumen Nayak, Pranati Palai","doi":"10.47893/ijcct.2023.1445","DOIUrl":"https://doi.org/10.47893/ijcct.2023.1445","url":null,"abstract":"Despite rising unemployment, most job coverage of the COVID-19 outbreak has concentrated on layoffs. Employees have been fired for reasons related to the epidemic, which has been a less prominent issue. COVID-19 is still doing damage to the country's economy. Companies are in the midst of a recession, so they are beginning to fire off unproductive employees. Making critical decisions like laying off employees or cutting an employee's compensation is a challenging undertaking that must be done with extreme attention and accuracy. Adding negligence would harm the employee's career and the company's image in the industry. In this paper, we have predicted employee attrition using Logistic Regression, Random Forest, and Decision Tree techniques. Random Forest Classifier has outperformed other algorithms in this work. After using different machine learning techniques, we can say that Random Forest gives the best performance with a recall of 70%, and also, we have found Precision, Accuracy, and F1- Score.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nrusingha Tripathy, S. Nayak, Julius Femi Godslove, Ibanga Kpereobong Friday, Sasank Sekhar Dalai
{"title":"Credit Card Fraud Detection Using Logistic Regression and Synthetic Minority Oversampling Technique (SMOTE) Approach.","authors":"Nrusingha Tripathy, S. Nayak, Julius Femi Godslove, Ibanga Kpereobong Friday, Sasank Sekhar Dalai","doi":"10.47893/ijcct.2022.1438","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1438","url":null,"abstract":"Financial fraud is a serious threat that is expanding effects on the financial sector. The use of credit cards is growing as digitization and internet transactions advance daily. The most common issues in today's culture are credit card scams. This kind of fraud typically happens when someone uses someone else's credit card details. Credit card fraud detection uses transaction data attributes to identify credit card fraud, which can save significant financial losses and affluence the burden on the police. The detection of credit card fraud has three difficulties: uneven data, an abundance of unseen variables, and the selection of an appropriate threshold to improve the models' reliability. This study employs a modified Logistic Regression (LR) model to detect credit card fraud in order to get over the preceding difficulties. The dataset sampling strategy, variable choice, and detection methods employed all have a significant impact on the effectiveness of fraud detection in credit card transactions. The effectiveness of naive bayes, k-nearest neighbour, and logistic regression on highly skewed credit card fraud data is examined in this research. The accuracy of the logistic regression technique will be closer to 0.98%; with this accuracy, frauds may be easily detected. The fact that LR receives the highest classifier score illustrates how well LR predicts credit card theft.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115478607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polymer Composites in Green Technology: A Review","authors":"M. Padhy, P. Achary","doi":"10.47893/ijcct.2022.1431","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1431","url":null,"abstract":"Rapid depletion of fossil resources, high demand for energy and global warming together encourage us to look for renewable polymer items with low carbon. ‘Green monomers’ could be derived from bio-refineries, biowastes or renewable oil, plastics-waste. The polymer obtained from such green monomers are renewable and can display good characteristics equivalent to the traditional polymers or sometimes better than the existing polymers. Green technology is a global movement to create vibrant and sustainable cities. Green technology addresses social, economic and environmental values and creates a green economy. Green technology is based on the process of using waste materials for beneficial purposes by managing, and recycling the waste. This technology involves the waste treatment, incineration and management. Many materials prepared form green composites are cost effective in-terms less consumption of electricity, and water, at the same time a significant decrease in CO2 emission, and solid waste generation. The present review presents the effective techniques, difficulties, applications & information on bio-polymers, natural fiber reinforcements, properties of the different green composites and recommendations.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Food emergency dispatching method based on optimized fireworks algorithm","authors":"Xie Ya, Pan Lijun, Degang Xu","doi":"10.47893/ijcct.2022.1450","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1450","url":null,"abstract":"In order to solve the problem of food emergency dispatching under emergencies, a food emergency dispatching method based on the optimal fireworks algorithm was proposed. The fitness function was used to measure the individual merits of fireworks, the tabu table was set to avoid the fireworks algorithm falling into the local optimal, and the tournament strategy was adopted as the iterative strategy of fireworks population. The goal of the fitness function is to maximize the satisfaction of demand points and minimize the vehicle travel time.In order to accurately predict the amount of food required at the point of demand, an infectious disease model (SEIR) was used.By comparing with the basic fireworks algorithm and genetic algorithm, the simulation results show that the proposed algorithm has higher computational efficiency and can be used in food emergency dispatching.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Personalized Learning Resource Recommendation Based on Knowledge Graph Technology","authors":"Bozhi 1, Sainan Wang, Yuyi 3","doi":"10.47893/ijcct.2022.1440","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1440","url":null,"abstract":"In the face of the dilemma of learners' \"learning loss\" and \"information overload\" in information resources, a personalized learning resource recommendation algorithm is proposed by conducting in-depth and extensive research on the knowledge graph. This algorithm relies on the similarity or correlation between learners' characteristics and course knowledge (learning resources) for recommendation. It analyzes learners' characteristics in depth from four aspects: data collection and processing, model construction, resource and path recommendation, and model application, and establishes a multi layered dynamic feature model for learners; Analyze the core elements of the curriculum knowledge graph, decompose the curriculum knowledge into nanoscale knowledge granularity, and construct a curriculum knowledge graph model. The experimental results indicate that this algorithm improves learners' learning efficiency and promotes their personalized development","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130367949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Analysis of Machine Learning algorithms in Fake News detection","authors":"B. Devi, Sudhir Senapati","doi":"10.47893/ijcct.2022.1432","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1432","url":null,"abstract":"Social media is the finest venue for thinking and expressing in the modern world. And this is the best place to share information about your identity, culture, religion, and customs. It entails an immediate information interchange that covers news from every industry. These days, social media has a big impact on how we live and how society functions. Currently, social media is the best medium for expressing your thoughts. Social media has also evolved into a channel for disseminating information about nearby events. how the locals in the other place are made aware of what is going on there. People benefit from this through learning about various cultures. However, some evil people use social media to spread their lies, which affects society and our everyday lives. Furthermore, fake news spreads like a forest fire if it is not dealt with promptly. And this bogus news offends certain individuals and occasionally sparks riots in public places. We need instruments in the modern day that can confirm any news, whether it is real or fraudulent. The current work considers a variety of machine-learning techniques for detecting false news, including Random Forest (RF), Decision Tree (DT), and Support Vector Machine (SVM). The performance evaluation was then conducted using several criteria, including F-1 score, recall, accuracy, and precision. The empirical investigation shows DT has the greatest accuracy level at 100%.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Accurate Recommendation of Learning Resources based on Graph Neural Networks and Convolutional Algorithms","authors":"Sainan Wang, Bozhi 1, Yuyi 3","doi":"10.47893/ijcct.2022.1448","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1448","url":null,"abstract":"In response to the challenges of \"learning confusion\" and \"information overload\" in online learning, a personalized learning resource recommendation algorithm based on graph neural networks and convolution is proposed to address the cold start and data scarcity issues of existing traditional recommendation algorithms. Analyze the characteristics of the Knowledge graph of learners and curriculum resources in depth, use the graph Auto encoder to extract the auxiliary information and features in the Knowledge graph and establish the corresponding feature matrix, and use Convolutional neural network for classification and prediction. The experimental results show that this algorithm improves the performance of recommendation systems, improves learners' learning efficiency, and promotes personalized development.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed Web Application for Guidance and Support of Students: SmartLAD","authors":"Mukul Aggarwal, Himanshu Tariyal","doi":"10.47893/ijcct.2022.1425","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1425","url":null,"abstract":"SmartLAD is a Support Platform that connects students, mentors, and professionals of the field and enables them to share their knowledge and experience. We equip the students with a powerful network to rely on, skill-oriented courses that impart real-life skills, and experienced mentors to guide them. Our platform helps students to stay focused on their goals and keep on working hard to achieve their dreams. SmartLAD works as a Support Platform that helps students in their journey of being successful and excelling in their careers by providing them with skills, resources, guidance, and network. We help the students by providing them with a Network that the students can use without any charges and limits and can connect to people and share knowledge.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Application of Artificial Neural Network (ANN) for Landslide Hazard Mapping, Susceptibility and Early Warning System: A Review","authors":"Praveen Mukhia Titimus, R. Mandal","doi":"10.47893/ijcct.2022.1421","DOIUrl":"https://doi.org/10.47893/ijcct.2022.1421","url":null,"abstract":"Landslides are the most common recurrent and prominent natural\u0000disaster in Darjeeling hill region. Darjeeling region has been subjected to a\u0000number of extreme landslides especially during monsoon that resulted in a\u0000significant loss of life and materials. Thus it required to search a solution towards\u0000alertness and development to reduce losses connected with natural disaster\u0000landslides. The possibility to develop an early warning system is by applying the\u0000modern technology. In modern days, the Artificial Neural Network (ANNs) is\u0000widely used in multiple domains. These paper studies the effectiveness and\u0000efficiency of using Artificial Neural Network (ANNs) in landslides Mapping,\u0000Susceptibility and predictions.","PeriodicalId":220394,"journal":{"name":"International Journal of Computer and Communication Technology","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115655575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}