default search action
3rd ACeS 2021: Penang, Malaysia
- Nibras Abdullah, Selvakumar Manickam, Mohammed Anbar:
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science 1487, Springer 2021, ISBN 978-981-16-8058-8
Internet of Things, Industry 4.0 and Blockchain, and Cryptology
- Faraz Masood, Arman Rasool Faridi:
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. 3-17 - Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. 18-34 - Jamal N. Hasoon, Bashar Ahmed Khalaf, Rasha Subhi Hameed, Salama A. Mostafa, Ali Hussein Fadil:
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. 35-46 - Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde:
An Implementation of Robust User Authentication Technique for Big Data Platform. 47-61 - Munaza Farooq, Aqsa Ashraf Makhdomi, Iqra Altaf Gillani:
Blockchain-Based Incentive Mechanism to Combat Fake News. 62-77 - Abhilash Kumar Das, Nirmalya Kar:
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. 78-94 - Haidar Raad Shakir, Suhad Abbas Yassir:
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. 95-113 - Vu Le, Ramin Moazeni, Melody Moh:
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. 114-127 - Rao Faizan Ali, Amgad Muneer, P. D. D. Dominic, Shakirah Mohd Taib, Ebrahim A. A. Ghaleb:
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. 128-154 - Jason Chia, Ji-Jian Chin, Sook-Chin Yip:
Pluggable Authentication Module Meets Identity-Based Identification. 155-175 - Gerard Ward, Lech J. Janczewski:
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. 176-197 - Alexander Kreppein, Alexander Kies, Robert H. Schmitt:
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. 198-210
Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention
- Kinan Keshkeh, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana:
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. 213-229 - Qais Saif Qassim, Norziana Jamil, Mohammed Najah Mahdi, Zaihisma Che Cob, Fiza Abdul Rahim, Lariyah Mohd Sidek:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. 230-247 - Navaneethan C. Arjuman, Selvakumar Manickam, Shankar Karuppayah:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. 248-276 - Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah:
Analysis of File Carving Approaches: A Literature Review. 277-287 - Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole, Amos Orenyi Bajeh, Rasheed Gbenga Jimoh:
Cascade Generalization Based Functional Tree for Website Phishing Detection. 288-306 - Waddah Saeed:
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. 307-316 - Abdulkareem A. Hezam, Salama A. Mostafa, Azizul Azhar Ramli, Hairulnizam Mahdin, Bashar Ahmed Khalaf:
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. 317-328 - Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza:
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. 329-339 - Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. 340-360 - Reem Alshamy, Mossa Ghurab, Suad Othman, Faisal Alshami:
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. 361-378 - Badiea Abdulkarem Mohammed, Zeyad Ghaleb Al-Mekhlafi:
Optimized Stacking Ensemble Model to Detect Phishing Websites. 379-388 - Alwan Abdullah, Shams-ul-Arfeen Laghari, Ashish Jaisan, Shankar Karuppayah:
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. 389-400 - Abdullah Ahmed Bahashwan, Mohammed Anbar, Selvakumar Manickam, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). 401-416 - Noor Al-Mi'ani, Mohammed Anbar, Yousef K. Sanjalawe, Shankar Karuppayah:
Securing Software Defined Networking Using Intrusion Detection System - A Review. 417-446 - Zeyad Ghaleb Al-Mekhlafi, Badiea Abdulkarem Mohammed:
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. 447-456
Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication
- Rafia Afzal, Raja Kumar Murugesan:
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. 459-468 - Fatina Shukur:
Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. 469-480 - Fadi Abu Zwayed, Mohammed Anbar, Yousef K. Sanjalawe, Selvakumar Manickam:
Intrusion Detection Systems in Fog Computing - A Review. 481-504 - Poornima Mahadevappa, Raja Kumar Murugesan:
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. 505-514 - Ali Haider Shamsan, Arman Rasool Faridi:
Security Issues and Challenges in SDN. 515-535
Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News
- Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli:
CLH: Approach for Detecting Deep Fake Videos. 539-551 - Bui Thanh Khoa, Nguyen Duong Thuc Vi:
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. 552-567 - Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau:
SQL Injection Prevention in Web Application: A Review. 568-585 - Ibrahim M. Ahmed, Manar Younis Kashmoola:
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. 586-600
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.