This book provides an opportunity for researchers, scientists, government officials, strategist and operators and mainta
115 69 41MB
English Year 2024
Table of contents :
Committee
About the Conference
Contents
Strengthening Security Mechanisms of Satellites and UAVs Against Possible Attacks from Quantum Computers
1 Introduction
2 Literature Review
2.1 Quantum Key Distribution (QKD)
2.2 Post Quantum Network Security Layer
3 QKD for Satellites, Drones and UAVs
3.1 Difficulties in Implementing QKD Protocols
3.2 Existing QKD Protocols
4 The Osslayer Protocol Implementation
5 Conclusions
References
Evaluating the Security of Open-Source Linux Operating Systems for Unmanned Aerial Vehicles
1 Introduction
2 Literature Review and Background Research
2.1 Components of UAS
2.2 Background Research Focused on UAV Operating Systems
2.3 Background on RTOS and ROS
2.4 Literature Review for RTOS and ROS
3 Experiment Methodology
3.1 Comparing Multiple Approaches on Evaluating Security of the Linux Operating Systems
4 Results
4.1 Vulnerability Scanning
4.2 Auditing
4.3 Potential Privilege Escalation Vectors
5 Validation of the Results
5.1 Vulnerability Scanning
5.2 Auditing the System
5.3 Privilege Escalation
6 Discussion and Conclusions
6.1 Limitations of the Study
6.2 Further Work
References
A Proposed Permissioned Blockchain Consensus Algorithm: Consensus Algorithm Genetically Enhanced (CAGE)
1 Introduction
1.1 Ethics and Sustainability
2 Blockchain Anatomy
3 Genetic Algorithms
4 Cage
4.1 Differences Between PoET and CAGE
5 Method
6 Results and Analysis
6.1 Transactions
6.2 Block Latency
6.3 Node Distribution
7 Conclusion
7.1 Future Work
7.2 Discussion
8 Summary
References
Data Hiding in Anti-forensics—Exploit Delivery Through Digital Steganography
1 Introduction
2 Literature Review
2.1 Introduction to Digital Forensics, Anti-forensics and Current Challenges
2.2 Anti-forensics—Data Hiding
2.3 Steganography Techniques
3 Results and Discussion
3.1 Limitation Od Study and Future Work
4 Conclusion
References
Impact Versus Frequency on Cybersecurity Breach Trends in the Business and Medical Industry to Identify Human Error
1 Introduction
1.1 Synopsis on Cybersecurity Breaches
1.2 Human Factors Relative to the Occurrences of Cybersecurity Breach
1.3 Cyber-Security Concern in Health Records
2 Methodology
2.1 Research Design
2.2 Data Collection
2.3 Data Analysis
3 Datasets
4 Evaluation/Analysis
4.1 Malicious Versus Accidental Attacks
4.2 Impact Versus Frequency
4.3 Trends on States
5 Effect on the Business Industry
6 Effect on the Healthcare Industry
7 Recommendations/Preventative Measures
8 Results
9 Discussion/Conclusion
9.1 Data Breach Trends in Businesses
Appendix 1: Impact of Individuals by State
References
Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis
1 Introduction
2 Strategic Instability in the Digital Domain
2.1 Social Network Warfare
3 Jihadist Cyber and Cognitive Warfare
4 Jihadist Operations in the Cyberspace
4.1 Cyber-Training
4.2 Cyber-Planning and Cyber-Execution
4.3 Financing and Fundraising
4.4 Recruiting New Members
4.5 Online Propaganda
5 A Brief Introduction to Online Counterterrorism
5.1 Identifying Daesh-Related Propaganda with OSINT Tools
5.2 Predictive Analytics and Online Propaganda
6 Methodologies and Tools of Research
6.1 Aim of Our Study
6.2 Research Objectives
6.3 Justification
6.4 Systematic Literature Review
6.5 Literature Review
6.6 Research Phases [51]
6.7 Research Scope and Limitations
7 Conclusions
References
Cyberbullying Detection in Twitter Using Deep Learning Model Techniques
1 Introduction
2 Cyberbullying and Its Impact
3 Neural Network
3.1 Neural Network Algorithm to Detect Cyberbullying
3.2 Naïve Bayes-Based Algorithm to Perform Content-Based Analysis
3.3 Content-Based Analysis Using Icons and Hieroglyphs
3.4 Decision Tree Algorithms to Detect Harmful Words
4 Research Methods
4.1 DEA-RNN Model
4.2 RNN
5 Data Analysis and Critical Discussion
5.1 Data Gathering
5.2 Data Annotation
5.3 Data Pre-processing
5.4 Feature Extraction and Selection
5.5 Data Analysis
6 Conclusion and Future Work
References
A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms
1 Introduction
2 Literature Review
2.1 Signature-Then-Encryption
2.2 Signcryption
2.3 El-Gamal-Based Signcryption
3 Proposed Scheme
3.1 Proposed Scheme Analysis
4 Results Achieved
4.1 Efficiency
4.2 Security Attributes of Proposed Scheme
5 Conclusion
References
ChildSecurity: A Web-Based Game to Raise Awareness of Cybersecurity and Privacy in Children
1 Introduction
2 Literature Review
3 Survey Analysis and Design Specification
4 Conceptual Framework
4.1 Attention
4.2 Relevance
4.3 Confidence
4.4 Satisfaction
5 ChildSecurity Implementation
5.1 Skill Tree
5.2 Malicious Links
5.3 Cyberbullying
5.4 Sensitive Information
5.5 Password Security
5.6 Evaluation
6 Conclusion
References
Subverting Biometric Security Using 3D Printed Biometrics Characteristics
1 Introduction
2 Background
2.1 Biometrics
2.2 3D Printing
3 Experimental Setup
3.1 Experimental Setup
4 Findings and Results
5 Conclusion and Future Research
References
Image Band-Distributive PCA Based Face Recognition Technique
1 Introduction
1.1 PCA for Face Recognition
1.2 Eigen Faces
2 Proposed Technique
2.1 Pre-Processing
2.2 Multi-image Generation
2.3 Principal Component Analysis
2.4 Matching
3 Experiments and Results
3.1 Database
3.2 Methodology
3.3 Experimental Results and Observations
4 Conclusion
References
RAFA Model. Rethinking Cyber Risk Management in Organizations
1 Introduction
2 The BANI World-Brittle, Anxious, Non-linear and Incomprehensible
3 Cyber Risk. A Systemic Risk
4 The False Sense of Security. The Comfort Zone of Standards and Best Practices
5 RAFA Model. Rethinking Cyber Risk Management
6 Conclusions
References
AI and Ethics: Embedding Good Aspects of AI
1 Introduction
2 Ethics and AI
3 Developing Trustworthy AI
4 AI is Good for Society!
5 Box–Jenkins Model—Safe AI
6 Implications
7 Conclusion
References
Cyber Security-Related Awareness in Bangladesh: Relevant Challenges and Strategies
1 Introduction
2 Problem Statement
3 Literature Review
4 Methodology
5 Cyber Security in the Global Village
6 Challenges to Bangladesh and Bangladesh Government
7 Recommendations to Raise Cybersucurity Awareness in Bangladesh
8 Conclusion
References
Credit Card Fraud Detection Using Machine Learning
1 Introduction
2 Artificial Intelligence
2.1 Machine Learning
2.2 Logistic Regression
2.3 Decision Tree
2.4 Random Forest
2.5 XGBoost
3 Related Works
4 Research Methods
4.1 Google Colaboratory
4.2 Proposed Approach
4.3 Data Analysis
4.4 Data Standardisation
4.5 Handling Missing Value
4.6 Splitting the Data
4.7 Sampling Data
5 Model Creation
5.1 Hyper Parameter Tuning in Logistic Regression
5.2 Hyper Parameter Tuning in Decision Tree Classifier
5.3 Hyperparameter Tuning in XGBoost
5.4 Hyper Parameter Tuning in Random Forest
6 Model Evaluation
6.1 Confusion Matrix
7 Analysis
7.1 Data Analysis
7.2 Model Evaluation
8 Conclusions and Future Work
References
The Role of Trust and Ethics in IT Administration and Its Impact on an Organisation
1 Introduction
2 Literature Review
2.1 The Importance of IT Administration in the Information Age
2.2 Trust
2.3 Ethics
3 Research Gaps
4 Methodology
4.1 In-Depth Interviews and Recruitment
5 Method of Analysis
6 Results and Analysis
6.1 Profile
6.2 Solution Implementation
6.3 Trust
7 Discussion and Future Recommendations
8 Limitations and Future Research
9 Conclusion
References
How Explainable Artificial Intelligence (XAI) Models Can Be Used Within Intrusion Detection Systems (IDS) to Enhance an Analyst's Trust and Understanding
1 Introduction
1.1 Background
2 Related Work
2.1 AI Technologies
2.2 Measuring Trust in AI Technologies
2.3 AI-Embedded Intrusion Detection Systems (IDS)
2.4 Explainable AI (XAI)
2.5 Using XAI Models Within IDSs
3 Research Methodology and Design of Practical Work
3.1 Methodology
3.2 Design of Practical Work
4 Data Analysis and Evaluation
5 Key Findings and Recommendations
5.1 Key Findings
5.2 Recommendations
6 Conclusions and Future Developments
6.1 Conclusion
6.2 Future Developments
6.3 Ethical Conclusions
References
Could Adam Smith Live in a Smart City?
1 Introduction
2 Neuroscience: Are We Capable of Acting in Our Own Best Interests?
3 Moral Frameworks
4 Big Data Versus the Individual
5 The Information Economy: Trust Versus Transparency
6 Smart Cities: The Conclusion?
References
An Analysis of Blockchain Adoption in Zimbabwean Mining Land Title Management (MLTM) Using NVivo
1 Introduction
2 New Institutionalism (NI), Actor Network Theory (ANT) and Implications for Governance
3 Digital Transformation of Mining Title Management in Zimbabwe: The Cadastre System
3.1 The Cadastre System or Concept
3.2 Implementation of the Computerised Mining Cadastre System: Lessons Learned from Implementing African Countries
3.3 Deployment of the Cadastre System in Zimbabwe
4 Blockchain Technology and Its Implications for Land Title Management
4.1 Blockchain in Cadastre
4.2 Peculiar Features of the Land Mining Sector and the Applicability of Blockchain-SSI Technology to Mining Title Management: Adaptation or Adoption?
4.3 Qualitative Analysis of Data on Mining Disputes
4.4 Qualitative Data Organisation Technique
5 Conclusion
References
Cybersecurity at the Core: A Study on IT Experts’ Policy Adherence
1 Introduction
2 Background and Motivations
3 Research Methodology
4 Results and Discussion
5 Conclusion
References
Metaverse Application Forensics: Unravelling the Virtual Truth
1 Introduction
2 Methodology
3 Experimental Findings
3.1 Results of RAM Analysis
3.2 Results of HDD Analysis
4 Conclusions
References
Cloud-Based Secure Electronic Medical Data Sharing System Using Blockchain Technology (Simulation of a Ransomware Attack with OWASP)
1 Introduction
2 Literature Review
3 Electronic Medical Data Sharing System Using Blockchain
4 Ransomware Attack Mitigation Using Blockchain
5 Research Methods
5.1 Conventional Software Architecture Versus Proposed Software Architecture
5.2 Algorithm
5.3 System Implementation/Design
5.4 Doctor’s Registration Page
6 Critical Discussion
7 Conclusion
References