{"title":"A Brief Survey on the Internet of Things (IoT) Security","authors":"Abdulelah Al Hanif, Mohammad Ilyas","doi":"10.54808/wmsci2023.01.75","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.75","url":null,"abstract":"The Internet of Things (IoT) is considered one of the world's fastest-growing technologies, and it has a tremendous impact on people's lives in many different ways. With notable improvements in the evolution and expansion of technologies, the IoT faces numerous security threats and challenges. IoT technology uses various devices and protocols, making it difficult to apply adequate security control across the whole system and vulnerable to multiple attacks. Using essential technologies such as ML helps in addressing the recent security challenges and attacks on the IoT ecosystem. This paper presents an overview of IoT security. Also, it highlights types of IoT architecture security and explores the various kinds of attacks under each IoT architectural layer. Moreover, this paper discusses the uses of Machine Learning (ML) as a solution in IoT systems.","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"282 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73322905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trans-disciplinary Communication and Multi-disciplinary Research","authors":"Maurício Vieira Kritz","doi":"10.54808/wmsci2023.01.340","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.340","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"259 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76223395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process Approach in Public Sector Institutions and Governance – A Formality or a Necessity?","authors":"L. Ozola, I. Lapiņa","doi":"10.54808/wmsci2023.01.235","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.235","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84316536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walter M. Molina, Lino R. Mac Kay, Daniel Subauste
{"title":"Improving the Integrity of a Voting Process with Biometric Authentication and Data Encryption","authors":"Walter M. Molina, Lino R. Mac Kay, Daniel Subauste","doi":"10.54808/wmsci2023.01.145","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.145","url":null,"abstract":"Throughout the years, the voting process has under-gone a digital transformation, aiming to achieve greater control and optimize time while ensuring the integrity of each vote. While previous solutions have introduced changes in architecture and security processes, there hasn't been a defined secure model for voting. The applications developed in this study employed biometrics and a fingerprint reader for authentication security, along with cryptography algorithms to safeguard the flow of voting data. Experts and individuals involved in the Peruvian electoral process evaluated the web and mobile applications to determine their viability in a real-world context and their potential to enhance the electoral process in Peru. This evaluation was conducted through a case study involving 50 participants and satisfaction surveys, which qualitatively assessed the usability and effectiveness of the applications. The results indicated that the developed applications were well-received, perceived as intuitive, and provided an interactive experience.","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87089276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Claudio Cilli, Giulio Magnanini, Fabrizio Venettoni, Marco Silipigni, Lorenzo Manduca, Cirillo Atalla, Michael Cozzolino, Mukteshwar Mishra
{"title":"\"E-Health\": An E-commerce to Manage the Supply Chain of a Medicine","authors":"Claudio Cilli, Giulio Magnanini, Fabrizio Venettoni, Marco Silipigni, Lorenzo Manduca, Cirillo Atalla, Michael Cozzolino, Mukteshwar Mishra","doi":"10.54808/wmsci2023.01.157","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.157","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90157296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matteo Rizzato, Youssef Laarouchi, Christoph Geißler
{"title":"Using Federated Learning for Collaborative Intrusion Detection Systems","authors":"Matteo Rizzato, Youssef Laarouchi, Christoph Geißler","doi":"10.54808/wmsci2023.01.320","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.320","url":null,"abstract":"Neural networks have become cutting edge machine learning models for detecting network attacks. Traditional implementations provide fast and accurate predictions, but require centralised storage of labelled historical data for training. This solution is not always suitable for real-world applications, where regulatory constraints and privacy concerns hamper the collection of sensitive data into a single server. Federated Learning has recently been proposed as a framework for training a centralised model without the need to share data between different providers. We use the CICIDS2017 dataset provided by the Canadian Institute of Cybersecurity to demonstrate the benefits of Neural Networks-based Federated Learning for the detection of the most relevant types of network attacks. We conclude that a federated-trained neural network outperforms locally-trained models (at isoarchitecture) in terms of F1-score and False Negative detection ratio. Further, such model has a minor loss of performance and convergence rapidity compared to a model trained over a hypothetical centralised dataset.","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79261587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of Technology on the American Printing Industry in the Past 20 Years","authors":"H. Merritt","doi":"10.54808/wmsci2023.01.429","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.429","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75070917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Business Incubators","authors":"Liene Briede, E. Gaile-Sarkane","doi":"10.54808/wmsci2023.01.210","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.210","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85627856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Oganisjana, Magenta Shipsey, Chamika Thathsarani Gawendri de Silva, Malpe Pradeep Pai
{"title":"Factors That Impact Adaptability of Companies to Changing Circumstances with Minimal Destructive Effect During Crises","authors":"K. Oganisjana, Magenta Shipsey, Chamika Thathsarani Gawendri de Silva, Malpe Pradeep Pai","doi":"10.54808/wmsci2023.01.405","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.405","url":null,"abstract":"Since global crises humanity faces are becoming a regular phenomenon, the need to research the mechanisms for reaching business resilience has become crucial. Therefore, this paper explores the factors that influence one component of business resilience: companies' ability to adapt to changing circumstances with minimal destructive effect during crises. The literature review revealed three domains of company adaptability factors - individual, organizational, and external. The qualitative content analysis of responses from 218 heads and owners of companies from Europe, Asia, Africa, and America enabled us to determine factors that have the most significant weight in business adaptability The three tables that systemize 49 categories provide insights into the factors that impact business adaptability, based on the experiences of business practitioners during the Global Financial Crisis of 2007-2008, the COVID-19 pandemic, and Russia's war in Ukraine.","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"79 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73596835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational Platform to Encourage the Writing of the Original Quechua Language in Private Educational Institutions in the Lambayeque Region – Peru","authors":"Luis F. Castillo, O. Osores, Rocio E. Saavedra","doi":"10.54808/wmsci2023.01.294","DOIUrl":"https://doi.org/10.54808/wmsci2023.01.294","url":null,"abstract":"","PeriodicalId":30249,"journal":{"name":"Journal of Systemics Cybernetics and Informatics","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75477956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}