Victor Funmipe Olofinlade, B. K. Alese, A. Thompson, A. O. Adetunmbi
{"title":"Decision-making Scheme Using Prisoner’s Dilemma: Fraud Detection in Financial Transactions","authors":"Victor Funmipe Olofinlade, B. K. Alese, A. Thompson, A. O. Adetunmbi","doi":"10.20533/icitst.2021.0025","DOIUrl":"https://doi.org/10.20533/icitst.2021.0025","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hash Encoding to Safely Transmit Personal Identifiable Information on Unsecured Methods","authors":"Andre Bordokan","doi":"10.20533/icitst.2021.0010","DOIUrl":"https://doi.org/10.20533/icitst.2021.0010","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"End-to-End Call Authorization in Public Telephony","authors":"Joel Samper, Aspen Olmsted","doi":"10.20533/icitst.2021.0019","DOIUrl":"https://doi.org/10.20533/icitst.2021.0019","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115673519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. J. Gabriel, Oluwatosin Helen Oluwole, O. Ayeni, B. Alese
{"title":"Development of a Security Audit Management System","authors":"A. J. Gabriel, Oluwatosin Helen Oluwole, O. Ayeni, B. Alese","doi":"10.20533/icitst.2021.0009","DOIUrl":"https://doi.org/10.20533/icitst.2021.0009","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State Sponsored Cyber Attacks in South Asian Countries and its Implications","authors":"Tanvir Hassan Zoha, Sifat Nur Billah","doi":"10.20533/icitst.2021.0017","DOIUrl":"https://doi.org/10.20533/icitst.2021.0017","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Cybersecurity Threats Related to Cyber Ranges","authors":"S. Noponen, Juha Parssinen, J. Salonen","doi":"10.20533/icitst.2021.0004","DOIUrl":"https://doi.org/10.20533/icitst.2021.0004","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Container Based Virtualization: A Modern Approach To Deliver The Cloud Services","authors":"Mahendra Pratap Yadav","doi":"10.20533/icitst.2021.0002","DOIUrl":"https://doi.org/10.20533/icitst.2021.0002","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese
{"title":"A Lightweight NTRU Lattice Cryptography based Cloud Data Security System","authors":"H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.20533/icitst.2021.0011","DOIUrl":"https://doi.org/10.20533/icitst.2021.0011","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust Device Authentication Using Non-Standard Classification Features","authors":"Supriya Yadav, P. Khanna, G. Howells","doi":"10.20533/icitst.2021.0014","DOIUrl":"https://doi.org/10.20533/icitst.2021.0014","url":null,"abstract":"This paper investigates the use of novel hardware features derived from the physical and behavioral characteristics of electronic devices to identify such devices uniquely. Importantly, the features examined exhibit nonstandard and multimodal distributions which present a significant challenge to model and characterize. Specifically, the potency of four data classification methods is compared whilst employing such characteristics, proposed model Multivariate Gaussian Distribution (MVGD -address multimodality), Logistic Regression (LogR), Linear Discriminant Analysis (LDA), Support Vector Machine (SVM). Performance is measured based on its accuracy, precision, recall and f measure. The experimental results reveal that by addressing multimodal features with proposed model Multivariate Gaussian Distribution classifier, the overall performance is better than the other classifiers. Keywords—Security, ICMetric, Authentication, Classifiers, Key generation, Multidimensional space.","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Patricia Yetunde Oni, A. J. Gabriel, A. Thompson, B. Alese
{"title":"Monte Carlo Game Theoretic Model for Network Access Control","authors":"Patricia Yetunde Oni, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.20533/icitst.2021.0006","DOIUrl":"https://doi.org/10.20533/icitst.2021.0006","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}