{"title":"Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier","authors":"Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arunprasath Raveendran, Rajesh Arunachalam, Deepika Kongara, C. Thangavel","doi":"10.1080/19361610.2021.2002118","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002118","url":null,"abstract":"Abstract Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital for achieving high speed data rate. The degradation occurs due to identification of malicious node and hence, reducing the severity will be a complex problem due to similar characteristics with trusty nodes in sensing area. In this work, Adaptive Neuro Fuzzy Inference System (ANFIS) classifier based defected node identification system is developed. The conviction parameters to be extract of the reliable and malevolent nodes and these parameters are qualified by ANFIS classifier. Further, the individual nodes in MANET are classified in testing mode of classifier. The network performance will be degraded with the increased number of malicious nodes. Certain conditions like packet delivery ratio, throughput, detection rate, energy consumption, and precision value and link failures occur due to malicious node in the network. The anticipated malicious node detection structure be compare by means of the conservative techniques such as Optimized energy efficient routing protocol (OEERP), Low energy adaptive clustering hierarchy (LEACH), Data routing in network aggregation (DRINA)and Base station controlled dynamic clustering protocol (BCDCP). The proposed ANFIS classifier is designed in Matrix Laboratory (MATLAB) and it can be interfaced with NS2 using “c” programming.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"402 - 420"},"PeriodicalIF":1.3,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46484280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One Vote Away: How a Single Supreme Court Seat Can Change History","authors":"H. Cooper","doi":"10.1080/19361610.2021.1969865","DOIUrl":"https://doi.org/10.1080/19361610.2021.1969865","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"648 - 662"},"PeriodicalIF":1.3,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48525894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis","authors":"Kevin F. Steinmetz","doi":"10.1080/19361610.2021.2002119","DOIUrl":"https://doi.org/10.1080/19361610.2021.2002119","url":null,"abstract":"Abstract Penetration testing is an increasingly common strategy adopted by organizations to mitigate security risks including those posed by social engineering—the deception of individuals for the purposes of circumventing information security measures. Drawing from 54 interviews with security auditors, IT professionals, and social engineers, this study explores participant descriptions of the (1) importance of social engineering penetration tests, (2) measurement of assessment outcomes, (3) use of penetration tests as part of security awareness programs, and (4) attitude social engineers should adopt in working with client organizations and their employees. Implications for security research and penetration testing are considered.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"246 - 266"},"PeriodicalIF":1.3,"publicationDate":"2021-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48649278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Policy Compliance in Higher Education: A Theoretical Framework","authors":"Salifu Yusif, Abdul Hafeez-Baig","doi":"10.1080/19361610.2021.1989271","DOIUrl":"https://doi.org/10.1080/19361610.2021.1989271","url":null,"abstract":"Abstract HEIs Higher education institutions (HEIs) are open in their nature, decentralized, rich in population and private data, home to some ground-breaking research and innovations. They attract quite a substantial threat and cyberattacks due to their heavy reliance on the Internet. However, there is poor cybersecurity culture and low awareness that are motivated by generational differences that are characterized by “digital natives” and “digital residents” and gaps in technology savviness impacting cybersecurity compliance in specific higher education environments. The understanding of cybersecurity and organizational culture, compliance theory and protected motivated theory (PMT) respectively is key to achieving cybersecurity compliance.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"267 - 288"},"PeriodicalIF":1.3,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44155242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection Using Pos Tagging and Machine Learning","authors":"Afreen Kansal","doi":"10.1080/19361610.2021.1963605","DOIUrl":"https://doi.org/10.1080/19361610.2021.1963605","url":null,"abstract":"Abstract In this digital era, one major concern is not knowing what news to believe and not to believe. With the ever-growing progress being made in social media and technology, the problem has become more prominent. This also played a very important role in spreading fake information in this pandemic, creating chaos and worry throughout the world. Through the paper, I propose to understand and analyze the underlying writing style that can help in detecting fake news before it can be published, using a style-based approach in detection. An ensemble machine learning classification model was tried out to detect fake news.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"164 - 179"},"PeriodicalIF":1.3,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47186690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review of the Internet of Things Security","authors":"Maroua Ahmid, O. Kazar","doi":"10.1080/19361610.2021.1962677","DOIUrl":"https://doi.org/10.1080/19361610.2021.1962677","url":null,"abstract":"Abstract Currently, the Internet of Things (IoT) is the most contentious research subject. However, IoT still suffers from many security problems, and the security concerns are overgrowing with substantial IoT deployment. IoT will remain in danger unless understanding and addressing the security challenges. For this reason, this paper implements a full view of the IoT architecture and describes the characteristics and functionality of each layer. For a deeper understanding of IoT security challenges, we focus on identifying security requirements, and vulnerabilities in each IoT layer. Also, we discuss and classified the different security attacks in IoT.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"289 - 305"},"PeriodicalIF":1.3,"publicationDate":"2021-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41411770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien
{"title":"Problems of Proving the Electronic Arbitration Agreement in Applicable International Laws and Agreements","authors":"Muawya Naser Al Dalaien, Ziad Al Enizi, Ahmad Al Dalaien","doi":"10.1080/19361610.2021.1964324","DOIUrl":"https://doi.org/10.1080/19361610.2021.1964324","url":null,"abstract":"<p><b>Abstract</b></p><p>This research deals with the legal problems faced by the proof of the electronic arbitration agreement in the national laws. The research ended with important results, one of them is at the level of national legislation, that some national legislations require the use of public-key technology in order for the electronic arbitration agreement to have evidentiary value, and other legislations do not require the use of a specific technology. The study concluded that the best solution at the international level is to make amendments to the New York Convention.</p>","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"6 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2021-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139103431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Ethnography to Identify Deviant Behaviors, for the Development of Crime Prevention Interventions","authors":"David Harding","doi":"10.1080/19361610.2021.1956268","DOIUrl":"https://doi.org/10.1080/19361610.2021.1956268","url":null,"abstract":"Abstract This paper introduces a crime prevention methodology that focuses on deviant beliefs and behaviors. Situated between developmental and environmental crime prevention approaches, this empirical study utilized ethnographical methods to identify potential and active deviants and their support networks. Interventions were implemented through the community program of Neighborhood Watch, which focused on the identified deviant communities before the actuation of a burglary crime. Comparison between the pre-intervention period and intervention periods show the incidence of burglary crime reducing by 42%. If validated through replication, other fields that engage with active actors, such as insurgents, gangs, and terrorists, may have similar success.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"180 - 201"},"PeriodicalIF":1.3,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1956268","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48336326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulating Interrogation in the Lab: Examining the Effectiveness of Physical Pain, Coercive Verbal Pressure, and Rapport-Building for Obtaining Reliable Information","authors":"S. Houck, Joeann M. Salvati, A. Vrij, L. Newman","doi":"10.1080/19361610.2021.1949954","DOIUrl":"https://doi.org/10.1080/19361610.2021.1949954","url":null,"abstract":"Abstract Three lab experiments used an interrogation simulation to examine the relative effectiveness of pain, coercive verbal pressure, and rapport-building for obtaining reliable information. Investigators questioned participants about information they were instructed to keep secret. We measured how many people gave reliable and unreliable information under pain (Study 1; N = 49), verbal pressure alone and in combination with pain (Study 2; N = 87), and verbal pressure and pain compared to a rapport-based interrogation (Study 3; N = 158). Results empirically support much of what field experts and scholars have previously claimed: pain and psychological coercion result in unreliable information.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"137 - 163"},"PeriodicalIF":1.3,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1949954","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47983981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application and Criminalization of Artificial Intelligence in the Digital Society: Security Threats and the Regulatory Challenges","authors":"A. Mahmud","doi":"10.1080/19361610.2021.1947113","DOIUrl":"https://doi.org/10.1080/19361610.2021.1947113","url":null,"abstract":"Abstract We are living in a technology-based digital society where the application of autonomous machines and artificial intelligence (AI) is growing rapidly and is having an impact on our social life and the public sphere. Like many other technologies, AI will open new doors for criminals, and consequently, social security has been threatened by different modes of AI criminalization. It is imposing a complex challenge to frame an effective regulatory framework. This article provided a structured literature analysis of the application and criminalization of AI by recommending principles for countering the regulatory challenges and protect the right of individuals.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"1 - 15"},"PeriodicalIF":1.3,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/19361610.2021.1947113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41376275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}