{"title":"Optimization of Personalized Recommendation Strategy for E-commerce Platform Based on Artificial Intelligence","authors":"F. Yang","doi":"10.31449/inf.v47i2.3981","DOIUrl":"https://doi.org/10.31449/inf.v47i2.3981","url":null,"abstract":"","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83662849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Using Machine Learning in IoT Security and the Challenges Faced by Researchers","authors":"Khawlah M Harahsheh, Chung-Hao Chen","doi":"10.31449/inf.v47i6.4635","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4635","url":null,"abstract":"","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89042565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wafaa Al-Chaab, Z. Abduljabbar, Enas Wahab Abood, V. O. Nyangaresi, Hussein M. Mohammed, Junchao Ma
{"title":"Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography","authors":"Wafaa Al-Chaab, Z. Abduljabbar, Enas Wahab Abood, V. O. Nyangaresi, Hussein M. Mohammed, Junchao Ma","doi":"10.31449/inf.v47i6.4628","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4628","url":null,"abstract":"","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76502470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an efficient approach using graph-based evolutionary algorithm for IoT botnet detection","authors":"Quoc-Dung Ngo, Huy-Trung Nguyen","doi":"10.31449/inf.v47i6.3714","DOIUrl":"https://doi.org/10.31449/inf.v47i6.3714","url":null,"abstract":"In recent years, a large number of Internet of Things devices are used in life, many of which are vulnerable to attacks from a security perspective. Botnet malware is one of the main threats to IoT devices. Hence detection of IoT botnet is one of the most important challenge for IoT devices. This paper proposes an IoT botnet detection approach based on PSI graph data combine with evolutionary algorithm-based technique. In recent years, a large number of Internet of Things devices are used in life, many of which are vulnerable to attacks from a security perspective. Botnet malware is one of the main threats to IoT devices. Hence detection of IoT botnets is one of the most important challenges for IoT devices. In the paper, a IoT botnet detection approach based on PSI graph analysis by using the evolutionary algorithmbased technique. It applies bacterial evolution algorithm (BEA) in the training process on PSI graph multi-architecture IoT Botnet data to detect IoT Botnet. The PSI graphs were extracted from executable files and transform into vectors to feed into the classical machine learning classifiers. The result of the classifiers is then combine using soft voting method with BEA. The proposed method has achieved good experimental results (i.e., Accuracy at 95.30%, F1 at 96.15%). The approach also achieves a relatively low false-positive rate at 4.59%.","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"143 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80321070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASM-based Formal Model for Analysing Cloud Auto-Scaling Mechanisms","authors":"E. K. Gavua, G. Kecskeméti","doi":"10.31449/inf.v47i6.4622","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4622","url":null,"abstract":",","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72889629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of IoT Botnet Cyber Attacks using Machine Learning","authors":"Alaa Dhahi Khaleefah, Haider M. Al-Mashhadi","doi":"10.31449/inf.v47i6.4668","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4668","url":null,"abstract":"Received: February 8, 2023 As of 2018, the number of online devices has outpaced the global human population, a trend expected to surge towards an estimated 80 billion devices by 2024. With the growing ubiquity of Internet of Things (IoT) devices, securing these systems and the data they exchange has become increasingly complex, especially with the escalating frequency of IoT botnet attacks (IBA). The extensive data quantity and pervasive availability provided by these devices present a lucrative prospect for potential hackers, further escalating cybersecurity risks. Hence, one of the paramount challenges concerning IoT is ensuring its security. The primary objective of this research project is the development of a robust, machine learning algorithm-based model capable of detecting and mitigating botnet-based intrusions within IoT networks. The proposed model tackles the prevalent security issue posed by malicious bot activities. To optimize the model's performance, it was trained using the BoT-IoT dataset, employing a diverse range of machine learning methodologies, including linear regression, logistic regression, KNearest Neighbor (KNN), and Support Vector Machine (SVM) models. The efficacy of these models was evaluated using the F-measure, yielding results of 98.0%, 99.0%, 99.0%, and 99.0% respectively. These outcomes substantiate the models' capacity to accurately distinguish between normal and malicious network activities.","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"539 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80212793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provably-Secure LED Block Cipher Diffusion and Confusion based on Chaotic Maps","authors":"Hussain M. Al-Saadi, I. Alshawi","doi":"10.31449/inf.v47i6.4596","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4596","url":null,"abstract":"cryptography algorithms have concentrated on key generation's randomness, unpredictable nature","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"61 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82845091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hussein Albazar, A. Abdel-Wahab, Marwan Alshar'e, Abdallah M. Abualkishik
{"title":"An Adaptive Two-Factor Authentication Scheme Based on the Usage of Schnorr Signcryption Algorithm","authors":"Hussein Albazar, A. Abdel-Wahab, Marwan Alshar'e, Abdallah M. Abualkishik","doi":"10.31449/inf.v47i5.4627","DOIUrl":"https://doi.org/10.31449/inf.v47i5.4627","url":null,"abstract":",","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78272488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review: Investigation of Augmented Reality -BIM Benefits in Design Process in AEC Industry","authors":"Sadeer Hei AL-Dhaimesh, Nooriati Taib Taib","doi":"10.31449/inf.v47i5.4671","DOIUrl":"https://doi.org/10.31449/inf.v47i5.4671","url":null,"abstract":"","PeriodicalId":35802,"journal":{"name":"Informatica (Slovenia)","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73114825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}