


default search action
2nd ACeS 2020: Penang, Malaysia
- Mohammed Anbar

, Nibras Abdullah
, Selvakumar Manickam
:
Advances in Cyber Security - Second International Conference, ACeS 2020, Penang, Malaysia, December 8-9, 2020, Revised Selected Papers. Communications in Computer and Information Science 1347, Springer 2021, ISBN 978-981-33-6834-7
Internet of Things, Industry 4.0 and Blockchain, and Cryptology
- Mohammed Shuaib

, Shadab Alam
, Salwani Mohd Daud
:
Improving the Authenticity of Real Estate Land Transaction Data Using Blockchain-Based Security Scheme. 3-10 - Zi Hau Chin

, Timothy Tzen Vun Yap
, Ian K. T. Tan
:
Proof-of-Work Difficulty Readjustment with Genetic Algorithm. 11-26 - Abdulla J. Y. Aldarwish

, Ali A. Yassin
, Abdullah Mohammed Rashid
, Aqeel A. Yaseen
, Hamid Ali Abed Al-Asadi
, Ahmed A. Alkadhmawee:
Multi-factor Authentication for an Administrator's Devices in an IoT Environment. 27-47 - Antony Taurshia

, G. Jaspher W. Kathrine
:
Software Defined Networks Centered Group Based Access Control Service for Internet of Things Applications. 48-60 - Salam Al-E'mari

, Mohammed Anbar
, Yousef K. Sanjalawe
, Selvakumar Manickam
:
A Labeled Transactions-Based Dataset on the Ethereum Network. 61-79 - Murtadha A. Alazzawi, Hasanain Abbas Hasan Al-Behadili

, Mohsin N. Srayyih Almalki
, Aqeel Luaibi Challoob
, Mahmood Al Shareeda:
ID-PPA: Robust Identity-Based Privacy-Preserving Authentication Scheme for a Vehicular Ad-Hoc Network. 80-94 - Shatha A. Baker

, Ahmed S. Nori
:
Internet of Things Security: A Survey. 95-117 - Minhaz Bin Farukee

, M. S. Zaman Shabit, Md. Rakibul Haque, A. H. M. Sarowar Sattar:
DDoS Attack Detection in IoT Networks Using Deep Learning Models Combined with Random Forest as Feature Selector. 118-134 - Assim Sulaiman Khaled, Yvonne Hwei-Syn Kam:

Face-Based Graphical Authentication System Using Hybrid Images. 135-147 - Azmi Shawkat Abdulbaqi

, Salwa Mohammed Nejrs
, Sawsan D. Mahmood
, Ismail Yusuf Panessai
:
A Tele Encephalopathy Diagnosis Based on EEG Signal Compression and Encryption. 148-166 - Yean Li Ho

, Michael Teck Hong Gan, Siong-Hoe Lau
, Afizan Azman:
Pilot Evaluation of BlindLoginV2 Graphical Password System for the Blind and Visually Impaired. 167-178 - Jason Chia, Ji-Jian Chin

, Sook-Chin Yip
:
Evaluating Pairing-Free Identity-Based Identification Using Curve25519. 179-193 - Abdul Alif Zakaria

, A. H. Azni, Farida Ridzuan, Nur Hafiza Zakaria, Maslina Daud:
Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. 194-206 - Kean-Wah Cheng, Swee-Huay Heng:

Blockchain-Based Content Sharing and Data Repository System. 207-224 - Ali Abdulrazzaq

, Awos Kh. Ali, Supriyanto Praptodiyono:
The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server. 225-234 - Abhilash Kumar Das, Nirmalya Kar

:
A Novel Approach of Text Encryption Using Random Numbers and Hash Table. 235-247 - Uzma Jafar, Mohd Juzaiddin Ab Aziz

:
A State of the Art Survey and Research Directions on Blockchain Based Electronic Voting System. 248-266 - Bahareh Pahlevanzadeh

, Sara Koleini
, Suzi Iryanti Fadilah
:
Security in IoT: Threats and Vulnerabilities, Layered Architecture, Encryption Mechanisms, Challenges and Solutions. 267-283
Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention
- Abdulaziz Aborujilah, Rasheed Mohammad Nassr, AbdulAleem Al-Othmani, Nor Azlina Ali, Zalizah Awang Long, Mohd Nizam Husen, Tawfik Al Hadhrami, Hideya Ochiai:

SMOTE-Based Framework for IoT Botnet Attack Detection. 287-296 - Sarah K. Taylor

, M. Sharizuan M. Omar, Nooraiman Noorashid, Aswami Ariffin, K. Akram Z. Ariffin
, S. N. Huda S. Abdullah
:
People, Process and Technology for Cryptocurrencies Forensics: A Malaysia Case Study. 297-312 - Amir Zulhilmi, Salama A. Mostafa

, Bashar Ahmed Khalaf
, Aida Mustapha, Siti Solehah Tenah:
A Comparison of Three Machine Learning Algorithms in the Classification of Network Intrusion. 313-324 - Riya Khan, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:

Malware Detection in Word Documents Using Machine Learning. 325-339 - Catherine Lim Siew-Hong, Yu-Beng Leau:

A Performance Study of a Modified Grey Network Traffic Prediction Mechanism. 340-353 - Collins Uchenna Chimeleze

, Norziana Jamil
, Roslan Ismail, Kwok-Yan Lam:
A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction. 354-370 - Abdullateef Oluwagbemiga Balogun, Shuib Basri, Said Jadid Abdulkadir

, Saipunidzam Mahamad, Malek Ahmad Theeb Almomani, Abdullahi Abubakar Imam, Ganesh M. Kumar
:
Rank Aggregation Based Multi-filter Feature Selection Method for Software Defect Prediction. 371-383 - Waheed Ali H. M. Ghanem, Yousef A. Baker El-Ebiary, Mohamed Abdulnabi

, Mohammad Tubishat, Nayef Abdulwahab Mohammed Alduais, Abdullah B. Nasser, Nibras Abdullah, Ola Ahmed Al-wesabi:
Metaheuristic Based IDS Using Multi-objective Wrapper Feature Selection and Neural Network Classification. 384-401 - Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad

, Engku Fadzli Hasan Syed Abdullah
, Waheed Ali H. M. Ghanem:
An Integrated Model to Email Spam Classification Using an Enhanced Grasshopper Optimization Algorithm to Train a Multilayer Perceptron Neural Network. 402-419 - Sanaa Abduljabbar Ahmed Ghaleb, Mumtazimah Mohamad

, Engku Fadzli Hasan Syed Abdullah
, Waheed Ali H. M. Ghanem:
Spam Classification Based on Supervised Learning Using Grasshopper Optimization Algorithm and Artificial Neural Network. 420-434 - Nazrool Omar

, Selvakumar Manickam
:
Rule-Based SLAAC Attack Detection Mechanism. 435-449 - Kartikeya Gaur, Nitesh Kumar, Anand Handa, Sandeep K. Shukla:

Static Ransomware Analysis Using Machine Learning and Deep Learning Models. 450-467 - W. Q. Janie Lee, Thian Song Ong, Tee Connie

, H. T. Jackson:
Finger Vein Presentation Attack Detection with Optimized LBP Variants. 468-478 - Aws Naser Jaber

, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar
:
The Importance of IDS and IPS in Cloud Computing Environment: Intensive Review and Future Directions. 479-491
Ambient Cloud and Edge Computing, Wireless and Cellular Communication
- Usman Mohammed Gana

, Aman Jantan, Mohd Najwadi Yusoff, Ibrahim Abdullahi
, Muhammad Ubale Kiru, Abdullahi Aminu Kazaure
:
Towards Understanding the Challenges of Data Remanence in Cloud Computing: A Review. 495-507 - Yudhi Fajar Saputra

, Mahmoud Ahmad Al-Khasawneh
:
Big Data Analytics: Schizophrenia Prediction on Apache Spark. 508-522 - Yichiet Aun

, Yen-Min Jasmina Khaw
, Ming-Lee Gan
, Vasaki Ponnusamy
:
Comparing Network Resilience Against Distributed-Denial-of-Service (DDoS) on the Cloud. 523-534 - Poornima Mahadevappa

, Raja Kumar Murugesan
:
Study of Container-Based Virtualisation and Threats in Fog Computing. 535-549 - Aws Naser Jaber

, Shahid Anwar, Nik Zulkarnaen Bin Khidzir, Mohammed Anbar
:
A Detailed Analysis on Intrusion Identification Mechanism in Cloud Computing and Datasets. 550-573
Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News
- Tohari Ahmad

, Herdito Ibnu Dewangkoro
, Waskitho Wibisono, Royyana Muslim Ijtihadie:
Protecting Data by Improving the Performance of Controlling Expansion Method. 577-587 - Qais Saif Qassim, Norziana Jamil

, Maslina Daud, Norhamadi Ja'affar, Wan Azlan Wan Kamarulzaman, Mohammed Najah Mahdi:
Compromising the Data Integrity of an Electrical Power Grid SCADA System. 604-626 - Victor Elijah Adeyemo

, Abdullateef Oluwagbemiga Balogun
, Hammed A. Mojeed
, Noah Oluwatobi Akande, Kayode S. Adewole
:
Ensemble-Based Logistic Model Trees for Website Phishing Detection. 627-641 - Hasanen Alyasiri

:
Evolving Rules for Detecting Cross-Site Scripting Attacks Using Genetic Programming. 642-656 - Jetli Chung, Jing-Zhi Koay, Yu-Beng Leau:

A Review on Social Media Phishing: Factors and Countermeasures. 657-673 - Tee Wee Jing

, Raja Kumar Murugesan
:
Protecting Data Privacy and Prevent Fake News and Deepfakes in Social Media via Blockchain Technology. 674-684 - Jun-Ming Gan, Hang-Yek Ling, Yu-Beng Leau:

A Review on Detection of Cross-Site Scripting Attacks (XSS) in Web Security. 685-709 - Ranil Lee Kotalawela, Jun Hong Lee, Wan Wah Chuah, Kai Wen Luo, Lokman Mohd Fadzil

:
Proposal for Physiological-Resilience Usability Model in Security-Enhanced Mobile Application for Secure Travel. 710-734

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














