


default search action
3rd ACeS 2021: Penang, Malaysia
- Nibras Abdullah

, Selvakumar Manickam
, Mohammed Anbar
:
Advances in Cyber Security - Third International Conference, ACeS 2021, Penang, Malaysia, August 24-25, 2021, Revised Selected Papers. Communications in Computer and Information Science 1487, Springer 2021, ISBN 978-981-16-8058-8
Internet of Things, Industry 4.0 and Blockchain, and Cryptology
- Faraz Masood

, Arman Rasool Faridi
:
A Blockchain Framework to Increase the Security and Verifiability of Educational Certificates. 3-17 - Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:

A Conceptual Model to Identify Illegal Activities on the Bitcoin System. 18-34 - Jamal N. Hasoon

, Bashar Ahmed Khalaf
, Rasha Subhi Hameed
, Salama A. Mostafa
, Ali Hussein Fadil
:
A Light-Weight Stream Ciphering Model Based on Chebyshev Chaotic Maps and One Dimensional Logistic. 35-46 - Galal A. AL-Rummana, Abdulrazzaq H. A. Al-Ahdal, G. N. Shinde:

An Implementation of Robust User Authentication Technique for Big Data Platform. 47-61 - Munaza Farooq, Aqsa Ashraf Makhdomi

, Iqra Altaf Gillani
:
Blockchain-Based Incentive Mechanism to Combat Fake News. 62-77 - Abhilash Kumar Das, Nirmalya Kar

:
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function $\varGamma \Big (-\frac{\alpha }{\beta }\Big ) = -\frac{\beta }{\alpha }\, \varGamma \Big (\frac{\beta -\alpha }{\beta }\Big )$. 78-94 - Haidar Raad Shakir

, Suhad Abbas Yassir
:
Image Encryption-Compression Method Based on Playfair, OTP and DWT for Secure Image Transmission. 95-113 - Vu Le, Ramin Moazeni, Melody Moh:

Improving Security and Performance of Distributed IPFS-Based Web Applications with Blockchain. 114-127 - Rao Faizan Ali

, Amgad Muneer
, P. D. D. Dominic
, Shakirah Mohd Taib
, Ebrahim A. A. Ghaleb:
Internet of Things (IoT) Security Challenges and Solutions: A Systematic Literature Review. 128-154 - Jason Chia, Ji-Jian Chin

, Sook-Chin Yip
:
Pluggable Authentication Module Meets Identity-Based Identification. 155-175 - Gerard Ward

, Lech J. Janczewski:
Using Knowledge Synthesis to Identify Multi-dimensional Risk Factors in IoT Assets. 176-197 - Alexander Kreppein, Alexander Kies, Robert H. Schmitt:

Novel Maturity Model for Cybersecurity Evaluation in Industry 4.0. 198-210
Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention
- Kinan Keshkeh

, Aman Jantan, Kamal Alieyan, Usman Mohammed Gana:
A Review on TLS Encryption Malware Detection: TLS Features, Machine Learning Usage, and Future Directions. 213-229 - Qais Saif Qassim, Norziana Jamil

, Mohammed Najah Mahdi, Zaihisma Che Cob
, Fiza Abdul Rahim, Lariyah Mohd Sidek
:
A Short Review: Issues and Threats Pertaining the Security of SCADA Systems. 230-247 - Navaneethan C. Arjuman

, Selvakumar Manickam
, Shankar Karuppayah
:
An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network. 248-276 - Nor Ika Shahirah Ramli, Syifak Izhar Hisham, Gran Badshah:

Analysis of File Carving Approaches: A Literature Review. 277-287 - Abdullateef Oluwagbemiga Balogun, Kayode S. Adewole

, Amos Orenyi Bajeh
, Rasheed Gbenga Jimoh:
Cascade Generalization Based Functional Tree for Website Phishing Detection. 288-306 - Waddah Saeed

:
Comparison of Automated Machine Learning Tools for SMS Spam Message Filtering. 307-316 - Abdulkareem A. Hezam, Salama A. Mostafa

, Azizul Azhar Ramli
, Hairulnizam Mahdin
, Bashar Ahmed Khalaf:
Deep Learning Approach for Detecting Botnet Attacks in IoT Environment of Multiple and Heterogeneous Sensors. 317-328 - Islam Debicha

, Thibault Debatty
, Jean-Michel Dricot
, Wim Mees, Tayeb Kenaza:
Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems. 329-339 - Taief Alaa Alamiedy, Mohammed Anbar

, Bahari Belaton, Arkan Hammoodi Hasan Kabla, Baidaa Hamza Khudayer:
Ensemble Feature Selection Approach for Detecting Denial of Service Attacks in RPL Networks. 340-360 - Reem Alshamy

, Mossa Ghurab
, Suad Othman, Faisal Alshami:
Intrusion Detection Model for Imbalanced Dataset Using SMOTE and Random Forest Algorithm. 361-378 - Badiea Abdulkarem Mohammed

, Zeyad Ghaleb Al-Mekhlafi
:
Optimized Stacking Ensemble Model to Detect Phishing Websites. 379-388 - Alwan Abdullah, Shams-ul-Arfeen Laghari

, Ashish Jaisan, Shankar Karuppayah:
OSINT Explorer: A Tool Recommender Framework for OSINT Sources. 389-400 - Abdullah Ahmed Bahashwan

, Mohammed Anbar
, Selvakumar Manickam
, Iznan Husainy Hasbullah, Mohammad Adnan Aladaileh
:
Propose a Flow-Based Approach for Detecting Abnormal Behavior in Neighbor Discovery Protocol (NDP). 401-416 - Noor Al-Mi'ani

, Mohammed Anbar
, Yousef K. Sanjalawe
, Shankar Karuppayah
:
Securing Software Defined Networking Using Intrusion Detection System - A Review. 417-446 - Zeyad Ghaleb Al-Mekhlafi

, Badiea Abdulkarem Mohammed
:
Using Genetic Algorithms to Optimized Stacking Ensemble Model for Phishing Websites Detection. 447-456
Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication
- Rafia Afzal, Raja Kumar Murugesan

:
A Model to Detect Location Anomalies in a Cellular Network Using Travel Time and Distance Correlation. 459-468 - Fatina Shukur:

Analysing Security Concerns About the Massive Increase of Sharing Data over the Cloud During the Pandemic of Covid-19. 469-480 - Fadi Abu Zwayed

, Mohammed Anbar
, Yousef K. Sanjalawe
, Selvakumar Manickam
:
Intrusion Detection Systems in Fog Computing - A Review. 481-504 - Poornima Mahadevappa

, Raja Kumar Murugesan
:
Review of Data Integrity Attacks and Mitigation Methods in Edge Computing. 505-514 - Ali Haider Shamsan

, Arman Rasool Faridi
:
Security Issues and Challenges in SDN. 515-535
Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News
- Amrita Shivanand Hedge, M. N. Vinutha, Kona Supriya, S. Nagasundari, Prasad B. Honnavalli

:
CLH: Approach for Detecting Deep Fake Videos. 539-551 - Bui Thanh Khoa

, Nguyen Duong Thuc Vi
:
Consumer Information Sharing in Facebook: The Negative Role of Perceived Privacy Risk. 552-567 - Joanna Hazaline Binti Johny, Wafa Athilah Fikriah Binti Nordin, Nurrina Mizana Binti Lahapi, Yu-Beng Leau:

SQL Injection Prevention in Web Application: A Review. 568-585 - Ibrahim M. Ahmed, Manar Younis Kashmoola:

Threats on Machine Learning Technique by Data Poisoning Attack: A Survey. 586-600

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














