sassani (sarrafpour), bahman a. alkorbi, mohammed jamil, noreen naeem, m. asif mirza, farhaan
Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise environment where sensitive data is stored on storage devices, such as financial or military data, encryption is used in the sto...
Miguez, Manuel
RESEARCH MOTIVATION: The objective of this research is to investigate how to increase the detection rate and increase the tracking rate of APT and TA in their early attack phases within an environment of distributed networks. ABSTRACT: Today's world has networks without clear frontiers, where employees can and do work outside the company protection...
Alomirah, Abdulaziz Abdulrahman
RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows: How many observer nodes would be enough for a wireless sensor network to detect the Sybil attack? How often should an observer node collect information about neighbouring nodes? ...
Yesuf, AS. Probst, Christian
Industry is continuously developing, deploying, and maintaining e-services to transform traditional offerings. While protection of traditional services is well understood, their digital transformation often is vulnerable to known and new attacks. These vulnerabilities open the door for fraudsters to exploit the weaknesses of the new systems and ass...
Al-Jarrah, Zaid
Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, technology has started to control a big part of our assets. These assets could be data medical assets, financial assets, etc. For...
Airehrour, David Gutierrez, J. Ray, S. K.
The concept of Trust has been applied in many information systems such as e-commerce, social networks and smart grid networks. It is currently getting attention on the Internet of Things. The fundamental concept in Trust, is the ability of a user to evaluate its neighbour, or a recommended neighbour with the hope of being able to trust that user. I...
Airehrour, David Nair, N.K.C. Madanian, S.
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in sight. This research study assessed the major aspects and underlying concepts of social engineering attacks and their influence in...
Airehrour, David Gutierrez, J. Ray, S. K.
The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed to secure the RPL protocol, and simulation studies have been put forward as the main research method, while testbed experiments, ...
Kolahi, Samad Barmada, Bashar Mudaliar, Keysha
This research evaluates the performance of different defence mechanisms used in IPv6 networks to protect against router advertisement (RA) flood attacks that rely in ICMPv6 Router Advertisement messages to flood the network. Three types of RA flood attacks are considered: the default RA flood attack, RA flood attack with fragmented packets and RA f...
Ho, K. Liesaputra, Veronica Yongchareon, Dr. Sira Mohaghegh, Dr Mahsa
Despite several benefits to modern communities and businesses, Twitter has attracted many spammers overwhelming legitimate users with unwanted and disruptive advertising and fake information. Detecting spammers is always challenging because there is a huge volume of data that needs to be analyzed while at the mean time spammers continue learning an...