A. M. Qamar, Abdulrahman Saad Altami, Ali Ayeel Alsamanni
{"title":"Quantitative Analysis of Global Research Trends in Crowd Management for Tawaf: A Bibliometric Study (1997–2023)","authors":"A. M. Qamar, Abdulrahman Saad Altami, Ali Ayeel Alsamanni","doi":"10.18280/ijsse.140107","DOIUrl":"https://doi.org/10.18280/ijsse.140107","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"27 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140409039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advances in Malware Analysis and Detection in Cloud Computing Environments: A Review","authors":"S. M. Rao, Arpit Jain","doi":"10.18280/ijsse.140122","DOIUrl":"https://doi.org/10.18280/ijsse.140122","url":null,"abstract":"Cloud computing, integral for data storage and online services, presents significant advantages over traditional data storage and distribution methods, including enhanced convenience, on-demand storage, scalability, and cost efficiency. Its growing adoption in securing Internet of Things (IoT) and cyber-physical systems (CPS) against various cyber threats offers numerous opportunities. Despite the continuous evolution of malware and the lack of a universally effective detection method, cloud environments provide a promising approach for malware detection. Cloud computing, recognized for its efficiency, scalability, flexibility, and reliability on elastic resources, is widely utilized in the IT industry to support IT infrastructure and services. However, one of the foremost security challenges faced is malware attacks. Certain antivirus scanners struggle to detect metamorphic or encrypted malware in cloud environments due to complexity and scale, allowing such threats to evade detection. High detection rates with precision in reducing false positives are essential. Machine learning (ML) classifiers, a vital component in Artificial Intelligence (AI) systems, require training on extensive data volumes to develop credible models with high detection rates. Traditional detection methods face challenges in identifying complex malware, as modern malware employs contemporary packaging and obfuscation techniques to circumvent security measures. This paper provides a detailed discussion on detecting malware in cloud environments and the advantages of cloud computing in safeguarding IoT and CPS from cyber attacks. It presents a survey on malware analysis and detection models, aiding researchers in identifying limitations of traditional malware detection models in cloud environments and inspiring the design of innovative models with enhanced quality of service","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"16 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140412234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdellah Abid, Mariem Jarjar, Mourad Kattass, Hicham Rrghout, A. Jarjar, A. Benazzi
{"title":"Genetic Algorithm Using Feistel and Genetic Operator Acting at the Bit Level for Images Encryption","authors":"Abdellah Abid, Mariem Jarjar, Mourad Kattass, Hicham Rrghout, A. Jarjar, A. Benazzi","doi":"10.18280/ijsse.140102","DOIUrl":"https://doi.org/10.18280/ijsse.140102","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140415182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zina Oudina, Ahmed Dib, Mohamed Amine Yakoubi, M. Derdour, Kodali Ramu
{"title":"Comprehensive Risk Classification and Mitigation in the Petroleum Cyber-Physical Systems of the Oil and Gas Industry","authors":"Zina Oudina, Ahmed Dib, Mohamed Amine Yakoubi, M. Derdour, Kodali Ramu","doi":"10.18280/ijsse.140110","DOIUrl":"https://doi.org/10.18280/ijsse.140110","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"2016 24","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140416372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hasnaa Berrada, J. Boutahar, Souhaïl El Ghazi El Houssaïni
{"title":"Roadmap and Information System to Implement Information Technology Risk Management","authors":"Hasnaa Berrada, J. Boutahar, Souhaïl El Ghazi El Houssaïni","doi":"10.18280/ijsse.130602","DOIUrl":"https://doi.org/10.18280/ijsse.130602","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"10 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Safety and Security: Facilities for Wheelchair Users in Marine Tourism Area","authors":"Sunardi, Ali Muntaha, D. Setyohadi, A. Isdianto","doi":"10.18280/ijsse.130619","DOIUrl":"https://doi.org/10.18280/ijsse.130619","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Qaddoori, Ina’am Fathi, Modhar A. Hammoudy, Qutaiba I. Ali
{"title":"Advancing Public Health Monitoring through Secure and Efficient Wearable Technology","authors":"S. Qaddoori, Ina’am Fathi, Modhar A. Hammoudy, Qutaiba I. Ali","doi":"10.18280/ijsse.130603","DOIUrl":"https://doi.org/10.18280/ijsse.130603","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"10 s4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139157768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Okokpujie, I. Okokpujie, Fortune T. Young, R. E. Subair
{"title":"Development of an Affordable Real-Time IoT-Based Surveillance System Using ESP32 and TWILIO API","authors":"K. Okokpujie, I. Okokpujie, Fortune T. Young, R. E. Subair","doi":"10.18280/ijsse.130609","DOIUrl":"https://doi.org/10.18280/ijsse.130609","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"19 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139157800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}