


default search action
3rd ACeS 2021: Penang, Malaysia
- Nibras Abdullah
, Selvakumar Manickam
, Mohammed Anbar
:
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science 1487, Springer 2021, ISBN 978-981-16-8058-8
Internet of Things, Industry 4.0 and Blockchain, and Cryptology
- Faraz Masood
, Arman Rasool Faridi
:
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. 3-17 - Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. 18-34 - Jamal N. Hasoon
, Bashar Ahmed Khalaf
, Rasha Subhi Hameed
, Salama A. Mostafa
, Ali Hussein Fadil
:
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. 35-46 - Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde:
An Implementation of Robust User Authentication Technique for Big Data Platform. 47-61 - Munaza Farooq, Aqsa Ashraf Makhdomi
, Iqra Altaf Gillani
:
Blockchain-Based Incentive Mechanism to Combat Fake News. 62-77 - Abhilash Kumar Das, Nirmalya Kar
:
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. 78-94 - Haidar Raad Shakir
, Suhad Abbas Yassir
:
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. 95-113 - Vu Le, Ramin Moazeni, Melody Moh:
Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. 114-127 - Rao Faizan Ali
, Amgad Muneer
, P. D. D. Dominic
, Shakirah Mohd Taib
, Ebrahim A. A. Ghaleb:
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. 128-154 - Jason Chia, Ji-Jian Chin
, Sook-Chin Yip
:
Pluggable Authentication Module Meets Identity-Based Identification. 155-175 - Gerard Ward
, Lech J. Janczewski:
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. 176-197 - Alexander Kreppein, Alexander Kies, Robert H. Schmitt:
Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. 198-210
Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention
- Kinan Keshkeh
, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana:
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. 213-229 - Qais Saif Qassim, Norziana Jamil
, Mohammed Najah Mahdi, Zaihisma Che Cob
, Fiza Abdul Rahim, Lariyah Mohd Sidek
:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. 230-247 - Navaneethan C. Arjuman
, Selvakumar Manickam
, Shankar Karuppayah
:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. 248-276 - Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah:
Analysis of File Carving Approaches: A Literature Review. 277-287 - Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole
, Amos Orenyi Bajeh
, Rasheed Gbenga Jimoh:
Cascade Generalization Based Functional Tree for Website Phishing Detection. 288-306 - Waddah Saeed
:
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. 307-316 - Abdulkareem A. Hezam, Salama A. Mostafa
, Azizul Azhar Ramli
, Hairulnizam Mahdin
, Bashar Ahmed Khalaf:
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. 317-328 - Islam Debicha
, Thibault Debatty
, Jean-Michel Dricot
, Wim Mees, Tayeb Kenaza:
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. 329-339 - Taief Alaa Alamiedy, Mohammed Anbar
, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. 340-360 - Reem Alshamy
, Mossa Ghurab
, Suad Othman, Faisal Alshami:
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. 361-378 - Badiea Abdulkarem Mohammed
, Zeyad Ghaleb Al-Mekhlafi
:
Optimized Stacking Ensemble Model to Detect Phishing Websites. 379-388 - Alwan Abdullah, Shams-ul-Arfeen Laghari
, Ashish Jaisan, Shankar Karuppayah:
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. 389-400 - Abdullah Ahmed Bahashwan
, Mohammed Anbar
, Selvakumar Manickam
, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh
:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). 401-416 - Noor Al-Mi'ani
, Mohammed Anbar
, Yousef K. Sanjalawe
, Shankar Karuppayah
:
Securing Software Defined Networking Using Intrusion Detection System - A Review. 417-446 - Zeyad Ghaleb Al-Mekhlafi
, Badiea Abdulkarem Mohammed
:
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. 447-456
Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication
- Rafia Afzal, Raja Kumar Murugesan
:
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. 459-468 - Fatina Shukur:
Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. 469-480 - Fadi Abu Zwayed
, Mohammed Anbar
, Yousef K. Sanjalawe, Selvakumar Manickam
:
Intrusion Detection Systems in Fog Computing - A Review. 481-504 - Poornima Mahadevappa
, Raja Kumar Murugesan
:
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. 505-514 - Ali Haider Shamsan
, Arman Rasool Faridi
:
Security Issues and Challenges in SDN. 515-535
Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News
- Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli
:
CLH: Approach for Detecting Deep Fake Videos. 539-551 - Bui Thanh Khoa
, Nguyen Duong Thuc Vi
:
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. 552-567 - Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau:
SQL Injection Prevention in Web Application: A Review. 568-585 - Ibrahim M. Ahmed, Manar Younis Kashmoola:
Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. 586-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.