Journal articles on the topic 'International Journal of Computer Science and Information Security (IJCSIS)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'International Journal of Computer Science and Information Security (IJCSIS).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bayan, Almulhim, and Alghamdi Rami. "Effective Information Security Awareness Emails." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 1–2. https://doi.org/10.5281/zenodo.7505534.

Full text
Abstract:
<strong>Abstract:</strong> What are the factors that affect the awareness emails? How do I know if my emails have been read by the employees or not? How can a department protect critical information resources through efficient awareness? What types of procedures work best for an organization? These types of questions are commonly heard nowadays. Strong security awareness programs are the first line of defence against cybersecurity attacks. Because no matter how many tools an organization uses, there is always room for development. In this paper, we will discuss some of the crucial security awareness aspects that could influence behavioural shifts for the better. <strong>Keywords:</strong> Information security, Human factor, Cybersecurity, Analysis. <strong>Title:</strong> Effective Information Security Awareness Emails <strong>Author:</strong> Bayan Almulhim, Rami Alghamdi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 1, January 2023 - March 2023</strong> <strong>Page No: 1-2</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 05-January-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7505534</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effective-information-security-awareness-emails</strong>
APA, Harvard, Vancouver, ISO, and other styles
2

Fahad, Jasim Alanezi. "Effective Information Security Policy." International Journal of Computer Science and Information Technology Research 12, no. 4 (2024): 1–4. https://doi.org/10.5281/zenodo.13892941.

Full text
Abstract:
<strong>Abstract:</strong> With the growth of technologies, interconnected systems and digitalization, establishing an effective information security policy becomes a crucial step for organizations toward protecting their data and information asset from unauthorized access, cyber threats, and data breaches. To ensure the policy is both practical and widely adopted, it should be well-structured, aligned with the organization&rsquo;s business objectives and clearly communicated. The key steps to endorse and implement effective information security policy include engaging senior management to help prioritize information security across the organization, align with business goals and risk management strategy, communicate and enforce the policy, and conduct regular review and update. This research paper is going to define the information security policy and how to be effective. Also, it will provide the characteristics of successful information security policy, the associated responsibilities with the entities in the organization and the lifecycle of this policy. <strong>Keywords:</strong><em> </em>Information Security Policy, policy lifecycle, Policy Development, Policy Adoption, publication, responsibilities, characteristics. <strong>Title:</strong> Effective Information Security Policy <strong>Author:</strong> Fahad Jasim Alanezi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 4, October 2024 - December 2024</strong> <strong>Page No: 1-4</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 05-October-2024</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.13892941</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/effective-information-security-policy</strong>
APA, Harvard, Vancouver, ISO, and other styles
3

Siddiqui, Sana Afreen. "Analytical Study on Network Security Breach's." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 300–303. https://doi.org/10.5281/zenodo.3892611.

Full text
Abstract:
Throughout the previous few years, Computer systems were principally utilized by association for correspondence between various divisions. Under these conditions security was not a significant concern and it didnt get part of consideration. Be that as it may, presently, there is an extraordinary effect of between organize job in every single residents life, from Banking &acirc;&euro;&ldquo; Hospitals Education Transportation and so forth. However, presently arrange has sprouted different security concerns. In any case, presently with the expanding utilization of Computer in everyday action there is a serious requirement for robotized devices for securing touchy information and data put away on the Computer. Especially for the situation for a mutual framework, for example, time sharing framework and where the need is significantly increasingly intense for frameworks that is available for an open phone or an information organize. The standard name for the assortment of devices to ensure information and to forestall Hackers is Computer Security . This proposition talk about and depicts spoofing , which is if an aggressor can tune in for a customers ask for and imitate an answer before the genuine location server can, at that point the customer will utilize the data gave by the hacker. This is known as spoofing. Siddiqui Sana Afreen &quot;Analytical Study on Network Security Breach&rsquo;s&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30403.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30403/analytical-study-on-network-security-breach%E2%80%99s/siddiqui-sana-afreen
APA, Harvard, Vancouver, ISO, and other styles
4

Jumanah, Hasan AlSanad. "Cybersecurity In Education." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 51–61. https://doi.org/10.5281/zenodo.12566761.

Full text
Abstract:
<strong>Abstract</strong><strong>:</strong> In this research, we presented an explanation of the definition of cybersecurity, its importance, and its types. We also explained the difference between information security and cybersecurity, as well as the importance of both. we also mentioned how cyber security is important in the education sector and the Role of training and education in enhancing Cybersecurity. <strong>Keywords:</strong> cybersecurity, information security, education sector. <strong>Title:</strong> Cybersecurity In Education <strong>Author:</strong> Jumanah Hasan AlSanad <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 51-61</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 27-June-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.12566761</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/cybersecurity-in-education</strong>
APA, Harvard, Vancouver, ISO, and other styles
5

Mosaddeque, Ananna, Mantaka Rowshon, Tamim Ahmed, Umma Twaha, and Binso Babu. "The Role of AI and Machine Learning in Fortifying Cybersecurity Systems in the US Healthcare Industry." Inverge Journal of Social Sciences 1, no. 2 (2022): 70–81. https://doi.org/10.63544/ijss.v1i2.101.

Full text
Abstract:
The digital transformation of healthcare has brought about unprecedented advancements, but it has also introduced significant cybersecurity risks. Cyberattacks targeting sensitive patient data, employee information, and critical operational systems are on the rise, demanding innovative and robust security measures. Enter the powerful duo of Artificial Intelligence (AI) and Machine Learning (ML). These cutting-edge technologies offer a powerful arsenal against these cyber threats. AI algorithms can analyse massive datasets from various sources, such as network traffic, user behaviour, and medical device logs, to identify anomalies and detect malicious activity in real-time. This proactive approach allows security teams to swiftly respond to threats, minimizing the impact of cyberattacks and protecting patient safety. Furthermore, AI can leverage threat intelligence from diverse sources, including cybersecurity feeds, social media, and dark web forums, to proactively identify and mitigate emerging threats. This proactive approach empowers healthcare organizations to stay ahead of the curve, anticipating and neutralizing cyberattacks before they can cause significant damage. However, challenges remain. Implementing and maintaining AI/ML-based security solutions requires significant investment, both in terms of infrastructure and skilled personnel. Concerns surrounding data privacy and the potential for algorithmic bias also need careful consideration. Despite these challenges, the potential benefits of AI and ML in healthcare cybersecurity are undeniable. By embracing these technologies, healthcare organizations can enhance patient safety, improve operational efficiency, and build a more secure and resilient future in the face of evolving cyber threats. References Aarav, M., &amp; Layla, R. (2019). Cybersecurity in the cloud era: Integrating AI, firewalls, and engineering for robust protection. International Journal of Trend in Scientific Research and Development, 3(4), 1892-1899. Abie, H. (2019, May). Cognitive cybersecurity for CPS-IoT enabled healthcare ecosystems. In 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT) (pp. 1-6). IEEE. Aitazaz, F. (2018). Fortifying technology: Computer science solutions for cyber-attacks and cloud security. Alabdulatif, A., Khalil, I., &amp; Saidur Rahman, M. (2020). Security of blockchain and AI-empowered smart healthcare: Application-based analysis. Applied Sciences, 12(21), 11039. Alizai, S. H., Asif, M., &amp; Rind, Z. K. (2021). Relevance of Motivational Theories and Firm Health. Management (IJM), 12(3), 1130-1137. Asif, M. (2021). Contingent Effect of Conflict Management towards Psychological Capital and Employees’ Engagement in Financial Sector of Islamabad. Preston University, Kohat, Islamabad Campus. Bellamkonda, S. (2020). Cybersecurity in critical infrastructure: Protecting the foundations of modern society. International Journal of Communication Networks and Information Security, 12, 273-280. Bibi, P. (2020). AI-powered cybersecurity: Advanced database technologies for robust data protection. Chintala, S. (2020). Data privacy and security challenges in AI-driven healthcare systems in India. Journal of Data Acquisition and Processing, 37(5), 2769-2778. Chirra, D. R. (2021). Mitigating ransomware in healthcare: A cybersecurity framework for critical data protection. Revista de Inteligencia Artificial en Medicina, 12(1), 495-513. Chirra, D. R. (2021). Secure edge computing for IoT systems: AI-powered strategies for data integrity and privacy. Revista de Inteligencia Artificial en Medicina, 13(1), 485-507. Cooper, M. (2020). AI-driven early threat detection: Strengthening cybersecurity ecosystems with proactive cyber defense strategies. Elijah Roy, R. (2021). Harnessing AI and machine learning for enhanced security in cloud infrastructures. International Journal of Advanced Engineering Technologies and Innovations, 1(3), 14-28. Fatima, S. (2020). Fortifying the future: Advanced cybersecurity tactics for cloud platforms and device security. Hussain, A. H., Hasan, M. N., Prince, N. U., Islam, M. M., Islam, S., &amp; Hasan, S. K. (2021). Enhancing cyber security using quantum computing and artificial intelligence: A. Hussain, Z., &amp; Khan, S. (2021). AI and cloud security synergies: Building resilient information and network security circulation ecosystems. IBRAHIM, A. (2019). AI armory: Empowering cybersecurity through machine learning. Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. Valley International Journal Digital Library, 564-574. Kasula, B. Y. (2017). Machine learning unleashed: Innovations, applications, and impact across industries. International Transactions in Artificial Intelligence, 1(1), 1-7. Maddireddy, B. R., &amp; Maddireddy, B. R. (2021). Enhancing endpoint security through machine learning and artificial intelligence applications. Revista Espanola de Documentacion Cientifica, 15(4), 154-164. Nimmagadda, V. S. P. (2021). Artificial intelligence and block chain integration for enhanced security in insurance: Techniques, models, and real-world applications. African Journal of Artificial Intelligence and Sustainable Development, 1(2), 187-224. Raza, H. (2021). Proactive cyber defense with AI: Enhancing risk assessment and threat detection in cybersecurity ecosystems. Reddy, A. R. P. (2021). The role of artificial intelligence in proactive cyber threat detection in cloud environments. Neuro Quantology, 19(12), 764-773. Shah, V. (2021). Machine learning algorithms for cybersecurity: Detecting and preventing threats. Revista Espanola de Documentacion Cientifica, 15(4), 42-66. Shukla, A. (2021). Leveraging AI and ML for advance cyber security. Journal of Artificial Intelligence &amp; Cloud Computing. SRC/JAICC-154. DOI: doi.org/10.47363/JAICC/2021 (1), 142, 2-3. Waqas, M., Tu, S., Halim, Z., Rehman, S. U., Abbas, G., &amp; Abbas, Z. H. (2020). The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges. Artificial Intelligence Review, 55(7), 5215-5261. Zygun, D. (2020). Cyber-attack resilience: Fortifying devices and cloud systems with computer science innovations.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahangar, Adele, AlHawaeji Fahima Bab, Beheshti Moluksadat Hosseini, Najala Hariri, and Maryam Khademi. "Mapping and Analyzing the Conceptual Network Structure in the Field of Information Security." Journal of Information Processing and Management 37, no. 2 (2021): 473–96. https://doi.org/10.5281/zenodo.14039504.

Full text
Abstract:
Today, with the expansion of semantic web services, the need for search engines to utilize conceptual networks and domain ontologies for logical inference and reasoning from user queries, as well as for optimal (accurate and relevant) retrieval, is increasing. This applied research aims to analyze the structure of the conceptual network in the field of information security, and its domain structure was discovered through combined methods of co-occurrence analysis of keywords and social network analysis. The statistical population of this study consists of 10,227 scientific documents in the field of information security, including books, journal articles, and conference papers at the international level, sourced from the Scopus and Web of Science databases during the years 2013-2017. For preprocessing keywords and tags, the Zotero software was used, while Excel was employed to match them with information security and computer science vocabularies. For visualization and analysis of thematic networks, VosViewer and Gephi were utilized.&nbsp; By examining 19,648 keywords and tags, 207 keywords were extracted based on the latest version of the information security vocabulary. The findings of the study revealed that this network consists of 14 clusters: 5 mature clusters, 7 semi-mature clusters, and 2 immature clusters, indicating that the conceptual network in the field of information security has good coherence and density. The concepts of "security," "information security," "information systems," "privacy," "information," "telecommunications," "cryptography," "encryption," "authentication," "cybersecurity," "network," "cloud computing," "security attacks," "access control," "intrusion detection systems," "security protocols," "risk," "risk management and its frameworks," and "access level agreements" are among the most important concepts in this network, possessing the highest betweenness centrality. The nature of their interconnections and internal links is direct.
APA, Harvard, Vancouver, ISO, and other styles
7

VivekThoutam. "Architectures of Intelligent Systems in Engineering." Biolife 8, no. 4 (2022): 8–14. https://doi.org/10.5281/zenodo.7407829.

Full text
Abstract:
<strong>ABSTRACT</strong> Artificial Intelligence (AI) has come a long way coming from its early roots, steered through dedicated scientists. AI truly started to intrigue analysts with the development of the personal computer in 1943. Modern technology eventually appeared, to simulate intelligent actions. Over the next 4 years, even with numerous stumbling blocks, AI has grown from a lots scientists to 1000s of engineers as well as professionals; and coming from courses with the ability to play checkers, to bodies created to diagnose disease, skilled safety and security devices as well as the similarity it. <strong>Key words:</strong>Artificial Intelligence, Intelligent systems, architectures. <strong>REFERENCES</strong> C. Sampada,, et al, &quot;Adaptive Neuro-Fuzzy Intrusion Detection Systems&quot;, Proceedings: International Conference on Information Technology: Coding and Computing (ITCC"04),2004. Daniel B. Neill, &ldquo;Using Artificial Intelligence to Improve Hospital Inpatient Care&rdquo;. Daniel&nbsp;&nbsp; E.O."Leary&nbsp;&nbsp; Artificial&nbsp;&nbsp; Intelligence&nbsp;&nbsp; and&nbsp;&nbsp; Expert System in Accounting Databases: Survey and Extensions&rdquo;, Expert Systems with Applications, vol-3, 1991. FataiAdesinaAnifowose, SafiriyuIbiyemiEludiora, &ldquo;Application of Artificial Intelligence in Network Intrusion Detection&rdquo;, World Applied Programming, Vol (2), No (3), March 2012. F.D. Laramee, Genetic Algorithms: Evolving the Perfect Troll, AI Game Programming Wisdom, Charles River Media, Inc., Hingham, MA, 2002 VivekThoutam, &ldquo;An Overview On The Reference Model And Stages Of lot Architecture&rdquo;, &ldquo;Journal of Artificial Intelligence, Machine Learning and Neural Network&rdquo;, Vol 01, No 01, Aug-Sept 2021 VivekThoutam, &ldquo;A Study On Python Web Application Framework&rdquo;, &ldquo;Journal of E1ectronics, Computer Networking and Applied mathematics&rdquo;, Vol 01 , No 01, Aug-Sept 2021 VivekThoutam, &ldquo;Physical Design, Origins And Applications Of lot&rdquo;, Journal of Multidisciplinary Cases, Vol 01 , No 01 , Aug-Sept 2021 Swapna Gurrapu and Estari Mamidala. In vitro HIV-Reverse Transcriptase Inhibition of Andrographolide Isolatedfrom Andrographis Paniculata. European Journal of Biomedical and Pharmaceutical Sciences. 2017. Volume 4, Issue 12. 516-522. AnumandlaMounika, &ldquo;Process Of Migrating Into a Cloud And Issues In Cloud Computing&rdquo;, Journal of Interdisciplinary Cycle Research, Volume 2, Issue 1, January-June-2010 AnumandlaMounika, &ldquo;Security And Privacy Issue Towards Data Security In Cloud Computing&rdquo;, JASC: Journal of Applied Science and Computations, Volume 1, Issue 1, January-June2014 AnumandlaMounika, &ldquo;Technical Benefits And Architecting Cloud Applications In The Aws Cloud&rdquo;, Parishodh Journal, Volume VIII, Issue III, March-2019 AnumandlaMounika, &ldquo;a Study On Cloud Computing Strategy Planning And Sla Management In Cloud&rdquo;, International Journal of Research, Volume 7, Issue VII, JULY2018 VivekThoutam, &ldquo;ModelsAnd Algorithms Of Artificial Intelligence&rdquo;, International Journal of Management, Technology And Engineering, Volume X, Issue XI, NOVEMBER 2020 VivekThoutam, &ldquo;Machine Learning Vs Artificial Intelligence&rdquo;, International Journal of Scientific Research in Science and Technology, Volume 6, Issue 4, July-August-2019 VivekThoutam, &ldquo;Unique Security Challenges of IoT Devices and Spectrum of Security Considerations&rdquo;, Journal of Artificial Intelligence, Machine Learning and Neural Network, Vol 01, No. 2, Oct-Nov 2021 VivekThoutam, &ldquo;Artificial Intelligence And Machine Learning In Regulatory Compliance And Supervision&rdquo;, JASC: Journal of Applied Science and Computations, Volume VII, Issue V, May2020 VivekThoutam, &ldquo;IoT Clod Convergence, Emerging Economy and Development Issues&rdquo;, Journal of Environmental Impact and Management Policy, Vol 01, No 02, 2021 VivekThoutam, &ldquo;A comprehensive review on communication enablers and communication models of IoT&rdquo;, Journal of Community phramacy practice, Vol 1, No 2, 2021 VivekThoutam, &ldquo;Pros and Cons of Artificial Intelligence&rdquo;, Journal of Emerging Technologies and Innovative Research, volume 2, Issue 12, December 2015. VivekThoutam, &ldquo;Difficulties with Missing Data in Different Applications&rdquo;, Journal of Emerging Technologies and Innovative Research, volume 5, Issue 6, June 2018
APA, Harvard, Vancouver, ISO, and other styles
8

MD, Shahnawaz Sakib, Danyaal Muhammad, and Bo Lili. "Hardware System Security: A Comprehensive Approach." International Journal of Computer Science and Information Technology Research 13, no. 1 (2025): 1–3. https://doi.org/10.5281/zenodo.14631605.

Full text
Abstract:
<strong>Abstract:</strong> In today&rsquo;s digital landscape, safeguarding sensitive data and critical systems from hardware-based threats is crucial. This research proposes a multi-layered security framework to defend against physical attacks, supply chain vulnerabilities, and side-channel attacks. The framework integrates hardware-based security mechanisms, software countermeasures, and rigorous security management practices to provide comprehensive protection. <strong>Keywords:</strong> Hardware System Security, digital landscape, critical systems, multi-layered security. Framework. <strong>Title:</strong> Hardware System Security: A Comprehensive Approach <strong>Author:</strong> MD Shahnawaz Sakib, Muhammad Danyaal, Lili Bo <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 13, Issue 1, January 2025 - March 2025</strong> <strong>Page No: 1-3</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 11-January-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.14631605</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/hardware-system-security-a-comprehensive-approach</strong>
APA, Harvard, Vancouver, ISO, and other styles
9

Dr., E. J. Thomson Fedrik, Vinitha A., and Vanitha B. "Review on Vulnerabilities of IoT Security." International Journal of Trend in Scientific Research and Development 3, no. 4 (2019): 1117–19. https://doi.org/10.31142/ijtsrd24020.

Full text
Abstract:
IoT is referred as Internet of objects and wireless sensor networks and RFID are enabled in the fields of education, health, agriculture and entertainment. The IoT is the development production of the computer science and communication technology. The vulnerable nature of IoT is related to the security and privacy issues. The user may face as the consequence of the spread of IoT technology. The survey is focused on security loopholes arising out of the information exchange technologies used in IoT. Data analytics utilizes IoT and Big Data and it faces security challenges to protect their important data. In 2020, the wide amount of data could be generated by using the technologies of IoT and Big Data. The purpose of this survey is to analyze the vulnerable security issues and risk involved in each layer of the IoT as per to our knowledge the first survey with some goals. Dr. E. J. Thomson Fedrik | A. Vinitha | B. Vanitha &quot;Review on Vulnerabilities of IoT Security&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24020.pdf
APA, Harvard, Vancouver, ISO, and other styles
10

Johara, Al Jarri, Alharthi Danyah, and Alquraishi Mashael. "Security Implications of Serverless Computing in the Cloud." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 1–4. https://doi.org/10.5281/zenodo.12634327.

Full text
Abstract:
<strong>Abstract:</strong> The promise of easier development, scalability, and cost-effectiveness has made serverless computing quite popular in recent years. But this fundamental change in the architecture of cloud computing brings new security concerns. The security implications of serverless computing are examined in this paper, along with potential threats, weaknesses, and best practices to improve the overall security posture in a serverless computing. <strong>Keywords:</strong> Serverless, Function As A service, FaaS, Vulnerabilities, Security. <strong>Title:</strong> Security Implications of Serverless Computing in the Cloud <strong>Author:</strong> Johara Al Jarri, Danyah Alharthi, Mashael Alquraishi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 3, July 2024 - September 2024</strong> <strong>Page No: 1-4</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 03-July-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.12634327</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/security-implications-of-serverless-computing-in-the-cloud</strong>
APA, Harvard, Vancouver, ISO, and other styles
11

Bayan, Almulhim, and Alghamdi Rami. "Strategy for Effective Awareness." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 53–54. https://doi.org/10.5281/zenodo.10166242.

Full text
Abstract:
<strong>Abstract:</strong> With the modern technologies business is evolving and the use of technology become a necessity. But with each technology there is a security and one of the main concerns for companies is awareness. Even if you have the top security controls, user's awareness most be effective to strengthen the security controls.&nbsp; Users understanding for the awareness is always different and interesting challenge for any information security analyst. How to know its effectiveness? and how to measure? or even how to provide the right awareness? we will introduce the four WWWW that will lead towards effective, sustainable and sloid awareness. Who are the audience? What is there level of cyber security? What is their role in company business? What is the historical information about cyber security program? These questions are critical and in this technical paper we will discuss its value.<strong>Keywords:</strong> Information security, Human factor, Cybersecurity, Analysis.&nbsp;<strong>Title:</strong> Strategy for Effective Awareness<strong>Author:</strong> Bayan Almulhim, Rami Alghamdi<strong>International Journal of Computer Science and Information Technology Research</strong><strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong><strong>Vol. 11, Issue 4, October 2023 - December 2023</strong><strong>Page No: 53-54</strong><strong>Research Publish Journals</strong><strong>Website: www.researchpublish.com</strong><strong>Published Date: 21-November-2023</strong><strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.10166242</strong><strong>Paper Download Link (Source)</strong><strong>https://www.researchpublish.com/papers/strategy-for-effective-awareness</strong>
APA, Harvard, Vancouver, ISO, and other styles
12

Sherryl, W. Johnson. "Regulations for Securing Patient Data." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 3 (2023): 58–66. https://doi.org/10.5281/zenodo.10401160.

Full text
Abstract:
<strong>Abstract:</strong> With the rapid evolution of health information technology, there is a heightened need for the incorporation of regulations for securing patient data. This is true since the evolution from paper health records to electronic health records and other electronic health information. Accordingly, this scholarly literature view will provide an overview of governmental regulations that have been enacted to protect and secure patient data in the United States of America.&nbsp; International and organizational patient data and security measures and strategies will also be included &ndash; along with other strategies to secure patient data from professional organizations, educators and established companies / corporations.&nbsp; <strong>Keywords:</strong> electronic records, government regulations, health information, information security, patient data. <strong>Title:</strong> Regulations for Securing Patient Data <strong>Author:</strong> Sherryl W. Johnson <strong>International Journal of Novel Research in Computer Science and Software Engineering</strong> <strong>ISSN 2394-7314</strong> <strong>Vol. 10, Issue 3, September 2023 - December 2023</strong> <strong>Page No: 58-66</strong> <strong>Novelty Journals</strong> <strong>Website: www.noveltyjournals.com</strong> <strong>Published Date: 18-December-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.10401160</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.noveltyjournals.com/upload/paper/Regulations%20for%20Securing%20Patient%20Data-18122023-6.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
13

Otieno, Godfrey Oduor. "Review of Home Automation Systems and Network Security using IoT." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 805–8. https://doi.org/10.5281/zenodo.3892664.

Full text
Abstract:
In the current tech world, there are multiple advancements being made in the field of Network Security, this is because devices are grouped into various networks and can be accessed remotely through the use of the internet. As a result, it is integral to ensure that only the authorized personnel are able to access and control the respective devices which are connected in the various networks. Mobile devices such as smart phones, laptops, tablets etc. have enabled users to access their information on the go at any time provided they have internet connectivity and are connected to the devices network. Otieno Godfrey Oduor &quot;Review of Home Automation Systems and Network Security using IoT&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30687.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/30687/review-of-home-automation-systems-and-network-security-using-iot/otieno-godfrey-oduor
APA, Harvard, Vancouver, ISO, and other styles
14

Tamim, Alabdali, and Alghamdi Abdulelah. "Password Security Threats and How to Protect Yourself." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 65–67. https://doi.org/10.5281/zenodo.6556648.

Full text
Abstract:
<strong>Abstract:</strong> Did you know that compromised credentials is the most common initial attack vector responsible for 20% of data breaches? This should not be a surprise knowing that many people follow insecure ways of handling passwords including reusing the same password for different accounts. There is no doubt that the majority of people need to rethink their password security. Hackers have been diligent in developing new techniques to steal your information, putting your data, privacy, and cybersecurity at risk. This paper shed some light on the various security threats to your password and the different ways to protect yourself against such threats. <strong>Keywords:</strong> password security, cybersecurity, putting your data, privacy. <strong>Title:</strong> Password Security Threats and How to Protect Yourself <strong>Author:</strong> Tamim Alabdali, Abdulelah Alghamdi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 2, April 2022 - June 2022</strong> <strong>Page No: 65-67</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 17-May-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.6556648</strong> <strong>Paper Download Link (Source):</strong> <strong>https://www.researchpublish.com/papers/password-security-threats-and-how-to-protect-yourself</strong>
APA, Harvard, Vancouver, ISO, and other styles
15

Mohammed, Mujtaba, A. Omair Aseel, A. Zowaid Rawan, and S. Ahmed Zaki. "Enhance Cyber Security with EDR and XDR Solutions." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 128–32. https://doi.org/10.5281/zenodo.8285623.

Full text
Abstract:
<strong>Abstract:</strong> Endpoint security is a critical aspect of modern cybersecurity, as endpoints are often the primary targets for malicious attacks, and organizations are continuously seeking innovative approaches to strengthen their security defenses. Endpoint Detection and Response (EDR) and Extended Detection and Response (XDR) solutions have shown significant improvements in enhancing endpoint security. This review paper provides few important guidelines while selecting these tools, planning the implementation, few limitation and recommendations based on general industry observations. <strong>Keywords:</strong> Endpoint Security, XDR, EDR, Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Enhancing cyber security, log collection and correlations, Threat Detection, Responding to endpoint threats. <strong>Title:</strong> Enhance Cyber Security with EDR and XDR Solutions <strong>Author:</strong> Mohammed Mujtaba, Aseel A Omair, Rawan A Zowaid, Zaki S Ahmed <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 128-132</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 26-August-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8285623</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/enhance-cyber-security-with-edr-and-xdr-solutions</strong>
APA, Harvard, Vancouver, ISO, and other styles
16

Emad, Al-Mousa. "The Challenges of Securing Cloud Multitenant Design." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 120–24. https://doi.org/10.5281/zenodo.8283155.

Full text
Abstract:
<strong>Abstract:</strong> Multitenant architecture is the foundational model for cloud computing model in public cloud providers, in addition to on-premise enterprise level software stack. However, this model can poses security risks to organizations, which requires good security architecture design , and understanding. &nbsp;In addition, it will require cybersecurity expertise in cloud native architecture, and the on-going challenge to ensure &quot;ISOLATION&quot; among co-hosted resources to maintain cybersecurity posture and data protection. <strong>Keywords:</strong> Cloud, Cloud Security, Database, Database Security, Cybersecurity, Multitenant Architecture, Cloud Native Architecture. <strong>Title:</strong> The Challenges of Securing Cloud Multitenant Design <strong>Author:</strong> Emad Al-Mousa <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 120-124</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 25-August-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8283155</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/the-challenges-of-securing-cloud-multitenant-design</strong>
APA, Harvard, Vancouver, ISO, and other styles
17

Junaid, Ahmed. Jan. "Credential Guard: Say Good Bye to Pass the Hash/Ticket Attacks." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 39–49. https://doi.org/10.5281/zenodo.7886224.

Full text
Abstract:
<strong>Abstract:</strong> This paper provides important aspects of &quot;Credential Guard&quot;&nbsp;- An awesome mitigation to&nbsp;PtH/T Attacks&nbsp;with just few clicks of Group policy configuration.&nbsp; <strong>Keywords:</strong> Credential Guard, LSAISO, LSASS, PtH Attack,&nbsp;Secure Kernel,&nbsp;VBS Config,&nbsp;Virtualization Based Security,&nbsp;Windows 10-11,&nbsp;Windows Modern Security. <strong>Title:</strong> Credential Guard: Say Good Bye to Pass the Hash/Ticket Attacks <strong>Author:</strong> Junaid Ahmed. Jan <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 2, April 2023 - June 2023</strong> <strong>Page No: 39-49</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 02-May-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7886224</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/credential-guard-say-good-bye-to-pass-the-hashticket-attacks</strong>
APA, Harvard, Vancouver, ISO, and other styles
18

Lamia, T. AlSulaiman, F. Alturairi Jumana, and A. Al-Khathlan Khalid. "An Approach to Control Information Technology Changes." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 81–85. https://doi.org/10.5281/zenodo.7092060.

Full text
Abstract:
<strong>Abstract:</strong> Information Technology (IT) services plays a significant role to preform day-to-day operations in all organizations. Any unexpected outages in IT services may cause major financial loss due to business disruption.&nbsp; However, there are mandatory alterations executed frequently in IT infrastructure due to introducing, enhancing, modifying, replacing, or removing assets/services. Controlling the lifecycle of all alterations in the IT infrastructure is the responsibility of IT Change Management (ITCM). This is essential to ensure the security, availability, and reliability of the IT Infrastructure by eliminating the disruption of business and maximize IT services readiness towards customer satisfaction. This paper describes the process of storing, tracking, preventing and detecting configuration changes implemented in the IT infrastructure as part of IT change management process and in alignment with security standards and policies. <strong>Keywords:</strong>&nbsp; Information Technology, IT Change Management, Infrastructure, Controls, Configuration, Tracking. <strong>Title:</strong> An Approach to Control Information Technology Changes <strong>Author:</strong> Lamia T. AlSulaiman, Jumana F. Alturairi, Khalid A. Al-Khathlan <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 3, July 2022 - September 2022</strong> <strong>Page No: 81-85</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 19-September-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7092060</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/an-approach-to-control-information-technology-changes</strong>
APA, Harvard, Vancouver, ISO, and other styles
19

Badi, Salah, Qahtani Badar, Jugaiman Mohammed, and Falah Saleh. "MITIGATING THREATS THROUGH APPLICATION PROGRAMMING INTERFACE INSPECTION AND MANIPULATION IN VMWARE VCENTER." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 137–40. https://doi.org/10.5281/zenodo.8315071.

Full text
Abstract:
<strong>Abstract:</strong> To ensure the safety and security of VMWare vCenter instances, this research paper aims to enhance the security by building upon the work known as the &quot;Secure by Design Private Cloud Infrastructure.&quot; To enhance the security presented by the paper, this study dives deeper into securing vCenter a critical component within the VMWare private cloud ecosystem by leveraging API gateway technology. The aim is to intercept, analyse, and manipulate Application Program Interface commands (API) to filter malicious attacks on vCenter. This will provide a seamless way to secure vCenter, the main orchestrator of the private VMWare cloud, to mitigate the risk of an attacker ultimately break and disrupt critical applications hosted within the private cloud. <strong>Keywords:</strong> private cloud, information technology, cyber security, vcenter, API. <strong>Title:</strong> MITIGATING THREATS THROUGH APPLICATION PROGRAMMING INTERFACE INSPECTION AND MANIPULATION IN VMWARE VCENTER <strong>Author:</strong> Badi Salah, Badar Qahtani, Mohammed Jugaiman, Saleh Falah <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 137-140</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 04-September-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8315071</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/upload/book/MITIGATING%20THREATS%20THROUGH%20APPLICATION-04092023-4.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
20

Mohan, Prakash, and S. Nachappa. "Cloud Compliance with Encrypted Data – Health Records." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 1080–83. https://doi.org/10.5281/zenodo.3892865.

Full text
Abstract:
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S &quot;Cloud Compliance with Encrypted Data &ndash; Health Records&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
APA, Harvard, Vancouver, ISO, and other styles
21

Fahad, Jasim Alanezi. "Social Engineering Attacks." International Journal of Computer Science and Information Technology Research 11, no. 1 (2023): 68–70. https://doi.org/10.5281/zenodo.7656021.

Full text
Abstract:
<strong>Abstract:</strong> Growth of technologies, interconnected systems and digitalization, securing data becomes a vital concern to governments and organizations. The value of data enforces these governments and organization to implement huge number of security controls to safeguard their data. In fact, no matter of security controls implemented, there is another important factor might cause attacks, data leakage or service interruption which is &ldquo;Human&rdquo;. Human is the main part of Social Engineering which is the art of manipulating people to obtain sensitive information. This type of attack is increasing across the world and impacting many organizations. This research paper is going to define certain aspects of social engineering, types of specific social engineering techniques and required security controls to prevent such social engineering attacks. <strong>Keywords:</strong> Social Engineering, Attacks, Criminals, Phishing, Baiting, Tailgating, Should Surfing, Dumpster Diving. <strong>Title:</strong> Social Engineering Attacks <strong>Author:</strong> Fahad Jasim Alanezi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 1, January 2023 - March 2023</strong> <strong>Page No: 68-70</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 20-February-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7656021</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/social-engineering-attacks</strong>
APA, Harvard, Vancouver, ISO, and other styles
22

Hassan, Jamal, A. Algeelani Nasir, and Al-Sammarraie Najeeb. "Advance Data-Privacy by Using Artificial Intelligence." International Journal of Computer Science and Information Technology Research 10, no. 4 (2022): 38–45. https://doi.org/10.5281/zenodo.7398762.

Full text
Abstract:
<strong>Abstract:</strong> With the progression utilize of computers broadly, utilization of the information has moreover developed to a huge level. Nowadays information is collected without any reason, and each action of a machine or a human being is recorded, On the off chance that required in the future, at that point, the information will be dissected but here the address of believe emerges as the information will go through numerous stages for the investigation by distinctive parties. The information may contain a few touchy or private data which can be mutualized by the organizations included in the investigation stages. So, it is required for the hour to consider the information security issues exceptionally truly. Diverse sorts of strategies have been presented in this paper to guarantee information security conjointly diverse machine learning calculations have been talked about which have been utilized to plan the proposed strategies to guarantee information protection. <strong>Keywords:</strong> Data Privacy, Privacy, Artificial Intelligence, Advanced Data Privacy. <strong>Title:</strong> Advance Data-Privacy by Using Artificial Intelligence <strong>Author:</strong> Hassan Jamal, Nasir A. Algeelani, Najeeb Al-Sammarraie <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 4, October 2022 - December 2022</strong> <strong>Page No: 38-45</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 16-November-2022</strong> <strong>Amendment Date: 05-December-2022</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.7398762</strong>
APA, Harvard, Vancouver, ISO, and other styles
23

Omar, Salim Abdullah, and ABDUL RAZZAQ EYADA ORAS. "Optoelectronic control systems: Technological principles to achieve software quality." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 87–90. https://doi.org/10.5281/zenodo.6619281.

Full text
Abstract:
<strong>Abstract:</strong> The development and application of automated optoelectronic control systems (OESC) [1], which make it possible to increase the efficiency of process control, are extremely in demand in such areas of human activity as industrial production, transportation, security surveillance, etc. <strong>Keywords:</strong> OESC, subsystem, computers, telecommunication connections. <strong>Title:</strong> Optoelectronic control systems: Technological principles to achieve software quality <strong>Author:</strong> Omar Salim Abdullah, ORAS ABDUL RAZZAQ EYADA <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 2, April 2022 - June 2022</strong> <strong>Page No: 87-90</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 07-June-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.6619281</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/optoelectronic-control-systems-technological-principles-to-achieve-software-quality</strong>
APA, Harvard, Vancouver, ISO, and other styles
24

Norah, Alyousif, and Alhabis Sultan. "The Necessity of Multi Factor Authentication." International Journal of Computer Science and Information Technology Research 10, no. 2 (2022): 46–49. https://doi.org/10.5281/zenodo.6472757.

Full text
Abstract:
<strong>Abstract:</strong> Multifactor authentication (MFA) is one of the most secure authentication methods. It covers a wide range of topics in a cyber-connected environment, such as online payments, communications, and access right management, among others. Multifactor authentication is usually a little complicated because it necessitates an extra step on the part of the user. With two-factor authentication, in addition to the user ID and password, the user must additionally input a special code that they usually receive through SMS or a special code that they have received in advance. This paper will explore the concept of MFA, key differences between MFA and two facto authentication (2FA), MFA benefits, and the necessity of utilizing it. <strong>Keywords:</strong> Security, Multi Factor, Authentication, Tokens, Security Protocols. <strong>Title:</strong> The Necessity of Multi Factor Authentication <strong>Author:</strong> Norah Alyousif, Sultan Alhabis <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 2, April 2022 - June 2022</strong> <strong>Page No: 46-49</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published date: 20-April-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.6472757</strong>
APA, Harvard, Vancouver, ISO, and other styles
25

Mohammed, Jassem Al-Sarraf. "Cyber Security and its role in achieving the future visions of the State of Kuwait." International Journal of Computer Science and Information Technology Research 11, no. 2 (2023): 60–70. https://doi.org/10.5281/zenodo.7923877.

Full text
Abstract:
<strong>Abstract:</strong> This field research deals with the role of cyber security in achieving the future visions of the State of Kuwait. Specifically, this research attempts to answer the main question of the research, which: What is the role of cyber security in achieving the future visions of the State of Kuwait? In this field study, both approaches are used: The qualitative approach and the quantitative approach, and the questionnaire tool was used, and one of the most important results was the existence of a correlation between the state&rsquo;s visions and the basic components of cyber security. Also, several elements of the cyber security requirements necessary to achieve the visions of the State of Kuwait are already available, as well as there are Some obstacles that limit the application of cyber security in an integrated manner. The study also ended with some recommendations: The necessity of activating the basic components of cyber security. As well as reviewing and evaluating its mechanisms and functions and applying them in all government institutions, reviewing and monitoring the sub-components of cyber security, in addition to setting strategic plans and objectives for cyber security, applying security updates and reforms permanently and periodically to limit the spread of Distributed attacks across cyberspace. <strong>Keywords:</strong> Security, Cyber Security. <strong>Title:</strong> Cyber Security and its role in achieving the future visions of the State of Kuwait <strong>Author:</strong> Mohammed Jassem Al-Sarraf <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 2, April 2023 - June 2023</strong> <strong>Page No: 60-70</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 11-May-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7923877</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/cyber-security-and-its-role-in-achieving-the-future-visions-of-the-state-of-kuwait</strong>
APA, Harvard, Vancouver, ISO, and other styles
26

Praveen, Borra. "Microsoft Fabric Review: Exploring Microsoft's New Data Analytics Platform." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 34–39. https://doi.org/10.5281/zenodo.11502585.

Full text
Abstract:
<strong>Abstract:</strong> Microsoft Fabric represents a significant leap forward in analytics services, combining data management, analytics, and machine learning into a unified platform. This paper offers a detailed examination of Microsoft Fabric, covering its architecture, prominent features, advantages, and potential applications. Engineered to streamline data processes and foster collaboration among data experts, Microsoft Fabric supports real-time analytics, scalable data storage, advanced machine learning capabilities, and robust security protocols. Future developments for the platform include deeper AI integration, expanded data connectivity, enhanced user experience, fortified security measures, sustainability initiatives, and collaborative tools. By harnessing Microsoft Fabric, organizations can gain comprehensive data insights and drive innovation effectively. <strong>Keywords:</strong> Cloud Computing, Microsoft Azure, Data Analytics, Microsoft Fabric, Data Engineering, Data Science. <strong>Title:</strong> Microsoft Fabric Review: Exploring Microsoft's New Data Analytics Platform <strong>Author:</strong> Praveen Borra <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 34-39</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 06-June-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.11502585</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/microsoft-fabric-review-exploring-microsofts-new-data-analytics-platform</strong>
APA, Harvard, Vancouver, ISO, and other styles
27

David, Njuguna, and Kanyi Wambui. "An evaluation of BYOD integration cybersecurity concerns: A case study." An evaluation of BYOD integration cybersecurity concerns: A case study 9, no. 2 (2023): 80–91. https://doi.org/10.5281/zenodo.7704371.

Full text
Abstract:
<strong>Abstract:</strong> Personal smartphones, tablets, and laptops have become increasingly popular in the workplace, posing new security challenges in firms where they have been connected with company devices. Bring Your Own Device (BYOD) is a prevalent practice whereby workers are permitted to work on their own devices rather than utilizing company-provided equipment. Because BYOD offers both advantages and disadvantages, its adoption in the workplace is a source of concern. Workers utilizing personal devices to conduct business face significant security hazards, whether they&#39;re merely transmitting job-related electronic mails or retrieving protected organization programs from their cellphones or tablets. This study investigated the cybersecurity concerns associated with BYOD integration in work places in Kenya focusing on a Non-governmental organization. The specific objectives of the study were; to investigate the level of awareness of BYOD security challenges, and to investigate the measures put in place to address cyber-security issues associated with BYOD. The results indicate that organizations need to create more awareness in regards to BYOD security since the level of awareness is low. The results also show that security measures related to BYOD has been neglected. It is also imperative that organizations put in place security measures that will ensure data integrity, confidentiality as well as availability. <strong>Keywords:</strong> BYOD, Benefits, policies, malware, security, mobile devices. <strong>Title:</strong> An evaluation of BYOD integration cybersecurity concerns: A case study <strong>Author:</strong> David Njuguna, Wambui Kanyi <strong>International Journal of Recent Research in Mathematics Computer Science and Information Technology</strong> <strong>ISSN 2350-1022</strong> <strong>Vol. 9, Issue 2, October 2022 - March 2023</strong> <strong>Page No: 80-91</strong> <strong>Paper Publications</strong> <strong>Website: www.paperpublications.org</strong> <strong>Published Date: 07-March-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7704371</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.paperpublications.org/upload/book/An%20evaluation%20of%20BYOD%20integration-07032023-2.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
28

N.G.U.A, Nanumura. "Wi-Fi Data Analysis Based on Machine Learning." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 112–19. https://doi.org/10.5281/zenodo.8279998.

Full text
Abstract:
<strong>Abstract:</strong> This study proposes using machine learning to improve Wi-Fi network security. As Wi-Fi networks spread from industrial to residential areas, the necessity for strong security has risen. The rise of smart networking, especially in the IoT, has created data security and vulnerability issues. A unique method that uses machine learning to detect abnormalities and probable security breaches in Wi-Fi networks addresses these difficulties. We gather, preprocess, and analyze network data to create a complete dataset. This dataset trains machine learning algorithms to identify and classify network anomalies. Using agile methods, data mining, and machine learning algorithms, we created a Wi-Fi network intrusion detection system (WNIDS) that can detect diverse network threats. The proposed WNIDS contains two linked stages with specific machine learning models. These algorithms accurately classify network data as normal or attack specific. Our technology protects against malicious attacks and provides a robust Wi-Fi network for users across domains by incorporating machine learning. Modern network security dangers were fully understood by surveys and data analysis. The WNIDS was implemented and deployed through a structured system development life cycle. This tool eliminates network weaknesses and advances distant enterprises, offering safe and smooth access for consumers globally. <strong>Keywords:</strong> Machine learning, Wi-Fi network security, data security, vulnerability, dataset. <strong>Title:</strong> Wi-Fi Data Analysis Based on Machine Learning <strong>Author:</strong> N.G.U.A Nanumura <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 112-119</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 24-August-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8279998</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/wi-fi-data-analysis-based-on-machine-learning</strong>
APA, Harvard, Vancouver, ISO, and other styles
29

Professor, KABEYA TSHISEBA Cedric. "Principles underlying the authenticity of Blockchain transactions." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 2 (2023): 6–13. https://doi.org/10.5281/zenodo.7886085.

Full text
Abstract:
<strong>Abstract:</strong> Blockchain, chain of blocks in French, is a technology that makes it possible to keep track of a set of transactions, in a decentralized, secure and transparent way, in the form of a chain of blocks. Developed from 2008, it is, first and foremost, a technology for storing and transmitting information. This technology offers high standards of transparency and security because it works without a central control body. More concretely, the blockchain allows its networked users to share data without an intermediary. Everyone praises the efficiency of the blockchain which is indeed an exceptional transactional system, and more and more used as a cryptographic concept for the security of several types of transactions today, except that these same people extolling the said efficiency, do not do not know exactly the principles underlying this effectiveness, something that we have proposed to clarify in this article, in order to remove ignorance in this matter, thus affirming its relevance. <strong>Keywords:</strong> Authentication, Bitcoin, Blockchain, One Way Functions. <strong>Title:</strong> Principles underlying the authenticity of Blockchain transactions <strong>Author:</strong> Professor KABEYA TSHISEBA Cedric <strong>International Journal of Novel Research in Computer Science and Software Engineering</strong> <strong>ISSN 2394-7314</strong> <strong>Vol. 10, Issue 2, May 2023 - August 2023</strong> <strong>Page No: 6-13</strong> <strong>Novelty Journals</strong> <strong>Website: www.noveltyjournals.com</strong> <strong>Published Date: 02-May-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7886085</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.noveltyjournals.com/upload/paper/Principles%20underlying-02052023-4.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
30

Yazeed, Al Moaiad, Mohamed Abdelrahman Tarshany Yasser, Ahmed Algeelani Nasir, and Al-Haithami Wafa. "Cyber Attack detection Using Big data analysis." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 26–33. https://doi.org/10.5281/zenodo.6924399.

Full text
Abstract:
<strong>Abstract:</strong> Network-based Intrusion Detection System is a threat caused by the explosion of computer networks and the myriad of recent content-based threats, which occur daily. As well as an overview of machine learning approaches for signature and anomaly detection methods, this article discusses several machine learning strategies applied to intrusion detection and preprocessing. The NIDS taxonomy and attribute classifier have created classifications and outlines. Machine learning methods are widely utilized in anomaly detection using many data sets. Additional preprocessing methods have been added, for example, sorting and discretization have been applied to the data collection of measured values. Custom methods focused on search algorithms using machine learning that uses novel search algorithms are vulnerable to being revealed. This analysis is highly relevant to the use of machine learning methods used in computer security, which furthers their cause. <strong>Keywords:</strong> Intrusion Detection, K-means Algorithm, Machine learning, Swarm Intelligence. <strong>Title:</strong> Cyber Attack detection Using Big data analysis <strong>Author:</strong> Yazeed Al Moaiad, Yasser Mohamed Abdelrahman Tarshany, Nasir Ahmed Algeelani, Wafa Al-Haithami <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 3, July 2022 - September 2022</strong> <strong>Page No: 26-33</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 28-July-2022</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.6924399</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/cyber-attack-detection-using-big-data-analysis</strong>
APA, Harvard, Vancouver, ISO, and other styles
31

Taylor, Rodriguez Vance. "Geopolitical Implications of Artificial Intelligence in Cybersecurity: A Comprehensive Analysis." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 91–105. https://doi.org/10.5281/zenodo.8214594.

Full text
Abstract:
<strong>Abstract:</strong> As artificial intelligence (AI) rapidly infiltrates the realm of cybersecurity, its geopolitical implications have become a critical concern for nations and global security. This research presents a comprehensive analysis of the geopolitical implications of artificial intelligence in cybersecurity by drawing on an extensive review of scholarly literature, policy documents, and expert insights, the study explores the multifaceted intersections between AI and cybersecurity, addressing both potential advantages and challenges. The analysis delves into the growing role of AI in enhancing cyber defense capabilities, ranging from threat detection and incident response to vulnerability assessment and data protection. Additionally, the research investigates how AI-powered offensive cyber capabilities could amplify geopolitical tensions, engendering new forms of state-sponsored cyber espionage and warfare. Furthermore, the research assesses the geopolitical landscape of AI development and adoption, examining the distribution of AI-related research, resources, and expertise across nations. This analysis highlights the potential for technology asymmetry and its potential implications for international relations and cyber power dynamics. The study also probes the ethical and legal dimensions of AI in cybersecurity, addressing concerns related to privacy, data sovereignty, and human rights. Furthermore, it investigates the challenges surrounding international cooperation and standardization of AI-powered cybersecurity measures to ensure global cyber resilience. In conclusion, this comprehensive analysis highlights the transformative influence of AI on cybersecurity and its profound geopolitical implications. By understanding and addressing these challenges proactively, the international community can harness the potential of AI while mitigating risks, ultimately paving the way for a more secure and cooperative cyberspace in an increasingly interconnected world. <strong>Keywords:</strong> Artificial Intelligence; Cybersecurity; international policy, national defense, national security. <strong>Title:</strong> Geopolitical Implications of Artificial Intelligence in Cybersecurity: <em>A Comprehensive Analysis</em> <strong>Author:</strong> Taylor Rodriguez Vance <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 91-105</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 04-August-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8214594</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/geopolitical-implications-of-artificial-intelligence-in-cybersecurity-a-comprehensive-analysis</strong>
APA, Harvard, Vancouver, ISO, and other styles
32

Professor, KABEYA TSHISEBA Cedric. "The blockchain as a cryptographic system." International Journal of Novel Research in Computer Science and Software Engineering 10, no. 2 (2023): 1–5. https://doi.org/10.5281/zenodo.7886035.

Full text
Abstract:
<strong>Abstract:</strong> This article on the presentation of the Blockchain as a cryptographic concept, started from the observation that the majority of articles, discussions, forums that talk about it, always tend to present it simply as an algorithmic concept at the base of the operation of most current cryptocurrencies, that is not wrong. Except that, after having been in contact with this matter, we found that the Blockchain deserves a much better presentation beyond a simple algorithm, either as a cryptosystem in its own right, at the base of the security of several systems of &#39;information. We have in this research developed what is said above, talking about the different details that make this system a crypto system worthy of the name. <strong>Keywords:</strong> Authentication, Bitcoin, Blockchain, One Way Functions. <strong>Title:</strong> The blockchain as a cryptographic system <strong>Author:</strong> Professor KABEYA TSHISEBA Cedric <strong>International Journal of Novel Research in Computer Science and Software Engineering</strong> <strong>ISSN 2394-7314</strong> <strong>Vol. 10, Issue 2, May 2023 - August 2023</strong> <strong>Page No: 1-5</strong> <strong>Novelty Journals</strong> <strong>Website: www.noveltyjournals.com</strong> <strong>Published Date: 02-May-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7886035</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.noveltyjournals.com/upload/paper/The%20blockchain%20as%20a%20cryptographic%20system-02052023-3.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
33

Jagjot, Bhardwaj, and Gadiparthi Sivanagaraju. "Review of Real-Time Data Analytics: Transforming Emergency Telemedicine." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 62–68. https://doi.org/10.5281/zenodo.12591332.

Full text
Abstract:
<strong>Abstract:</strong> Real-time data analytics, crucial for immediate data processing and decision-making, is transforming emergency telemedicine by enhancing patient care and operational efficiencies. This review examines the application and impact of real-time analytics in this field, employing a systematic literature review of recent studies from databases like PubMed and IEEE Xplore. Our findings reveal significant improvements, such as a 30% reduction in patient wait times and enhanced treatment accuracy by 25%. Key technologies include IoT devices, cloud computing, and machine learning algorithms. Despite advancements, challenges like data security and system integration persist. Future research should focus on refining these technologies and expanding their applications to overcome current limitations. <strong>Keywords:</strong> real-time data analytics, emergency telemedicine, patient care, operational efficiency, healthcare technology. <strong>Title:</strong> Review of Real-Time Data Analytics: Transforming Emergency Telemedicine <strong>Author:</strong> Jagjot Bhardwaj, Sivanagaraju Gadiparthi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 62-68</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 29-June-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.12591332</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/review-of-real-time-data-analytics-transforming-emergency-telemedicine</strong>
APA, Harvard, Vancouver, ISO, and other styles
34

Muhammad, Fahad Athar. "The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses." International Journal of Computer Science and Information Technology Research 12, no. 3 (2024): 13–16. https://doi.org/10.5281/zenodo.13777211.

Full text
Abstract:
<strong>Abstract:</strong> Binary exploits and modern malware represent critical threats in today&rsquo;s cybersecurity landscape. This article explores the intricate relationship between these two domains, focusing on how binary exploitation techniques like buffer overflows, return-oriented programming (ROP), and heap exploitation serve as entry points for sophisticated malware attacks. The evolution of malware, from ransomware to fileless malware, highlights how exploit techniques have been weaponized to bypass defences, escalate privileges, and persist undetected. The article also covers defensive strategies, including patch management, the use of security mechanisms like DEP and ASLR, and advanced monitoring techniques. Understanding this convergence is essential for building resilient systems and mitigating the risks posed by these evolving threats. <strong>Keywords:</strong> Malware, stack overflow, threats, cybersecurity. <strong>Title:</strong> The Convergence of Binary Exploits and Modern Malware: Techniques, Threats, and Defenses <strong>Author:</strong> Muhammad Fahad Athar <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 3, July 2024 - September 2024</strong> <strong>Page No: 13-16</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 18-September-2024</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.13777211</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/the-convergence-of-binary-exploits-and-modern-malware-techniques-threats-and-defenses</strong>
APA, Harvard, Vancouver, ISO, and other styles
35

Shagufta, Farheen, and S. Vignesh. "A Review on the Repeated Use of Electronic Communications to Harass Someone Cyberstalking." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 979–83. https://doi.org/10.5281/zenodo.3892822.

Full text
Abstract:
Digital following is an offense during which the aggressor pesters casualty utilizing texting IM , or messages presented on a web website or a conversation gathering. A digital stalker depends upon the secrecy managed by the web to allow them to follow their casualty without being distinguished. Cyberstalking messages contrast from common spam in that a digital stalker focuses on a chose casualty with frequently compromising messages, while the spammer focuses on a wreck of beneficiaries with essentially irritating messages. ABSTRACTION Cyberstalking incorporates the utilization of the Internet, email, or other electronic specialized gadgets to talk someone else through irritating or compromising conduct. Most following laws necessitate that the culprit make a sound risk of savagery against the person in question others incorporate dangers against the casualtys family still others require just that the supposed stalkers direct establish an inferred risk. Cyberstalking shares significant qualities with disconnected following its absence of physical contact may make the misperception that it is more amiable than physical following. Narrative and casual information demonstrate that cyberstalking is a genuine and developing issue. Some law authorization offices have prepared their staff on this issue not many have concentrated consideration or assets explicitly on the cyberstalking issue. Jurisdictional and legal confinements may baffle a few offices the obscurity of Internet correspondences is another test. Particular police units have guarantee in tending to cyberstalking. Most significant Internet specialist co ops ISPs have given a location to which clients can send protests of damaging or bothering electronic mail ISPs have concentrated more on helping their clients in abstaining from irritating on the web conduct, for example, spamming Additional activities are suggested for governing bodies, police and other criminal equity organizations, private industry, casualty help suppliers and backers. Added asset records and proposals for self insurance on the web. Shagufta Farheen | Vignesh S &quot;A Review on the Repeated Use of Electronic Communications to Harass Someone [Cyberstalking]&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30748.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30748/a-review-on-the-repeated-use-of-electronic-communications-to-harass-someone-cyberstalking/shagufta-farheen
APA, Harvard, Vancouver, ISO, and other styles
36

Hemant, Sonawane. "Home Automation Life is One Click away from being better." International Journal of Trend in Scientific Research and Development 4, no. 3 (2020): 349–52. https://doi.org/10.5281/zenodo.3892666.

Full text
Abstract:
Internet of Things IoT is augmentation of modern day internet to give communication, connection, and interconnectivity between different gadgets or physical articles otherwise called Things . The term IoT gives us a simple idea about the ability of system of gadgets to detect and gather information from our general surroundings, and sends that information over the Web where it can be processed and used for different purposes. In the simplest of terms automation means &acirc;&euro;&tilde;to auto&acirc;&euro;&trade; thus avoiding manual interface with the machine or. In simpler words automation means &acirc;&euro;&tilde;control without direct interference&acirc;&euro;&trade;. Home the place where human beings dwell is the second important part of this paper. Home automation is playing a vital role in today&acirc;&euro;&trade;s lifestyle. Day by day the use of home automation is increasing. GSM, Bluetooth, WIFI, IOT etc. are the various technologies used for home automation such as. From anywhere and anytime it is possible to control home appliances like fan, lights, TV, A C etc. and due to this it is widely used throughout the world. For outdoor control we have used GSM technology and Bluetooth module for indoor control. This system is useful for old aged people and handicapped. For security purpose Fingerprint sensor is used. Hemant Sonawane &quot;Home Automation: Life is One Click away from being better&quot; Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30431.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/30431/home-automation-life-is-one-click-away-from-being-better/hemant-sonawane
APA, Harvard, Vancouver, ISO, and other styles
37

KABEYA, TSHISEBA Cedric. "Countermeasures to DDOS attacks based on amplification." International Journal of Novel Research in Computer Science and Software Engineering 9, no. 3 (2022): 29–32. https://doi.org/10.5281/zenodo.7491775.

Full text
Abstract:
<strong>Abstract:</strong> A Distributed Denial of Service (DDoS) attack is a cybersecurity weapon aimed at disrupting the operation of services or extorting money from targeted organizations. These attacks can be motivated by politics, religion, competition or profit. Technically, a DDoS attack is a distributed version of a Denial of Service (DoS) attack whose goal is to disrupt the target&#39;s business operations. This type of attack sends a high volume of traffic to overload the normal operation of a service, server, or network interconnection, rendering them unavailable. DoS attacks disrupt service, while Distributed Attacks (DDoS) are carried out on a much larger scale, bringing down entire infrastructures and scalable (cloud) services. In this work, we have addressed a rather particular DDoS, that relating to amplification. It was therefore a question here not only of talking about it, but also of presenting different forms of attacks, in addition to the related countermeasures for better security of our information systems. <strong>Keywords:</strong> Cryptosystem, DDOS, DDoS bas&eacute; sur l&rsquo;amplification, information system. <strong>Title:</strong> Countermeasures to DDOS attacks based on amplification <strong>Author:</strong> KABEYA TSHISEBA Cedric <strong>International Journal of Novel Research in Computer Science and Software Engineering</strong> <strong>ISSN 2394-7314</strong> <strong>Vol. 9, Issue 3, September 2022 - December 2022</strong> <strong>Page No: 29-32</strong> <strong>Novelty Journals</strong> <strong>Website: www.noveltyjournals.com</strong> <strong>Published Date: 29-December-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7491775</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.noveltyjournals.com/upload/paper/Countermeasures%20to%20DDOS%20attacks-29122022-6.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
38

Xuan, Hau Nguyen, and Son Tran Thai. "Video Forgery Detection: State-of-The-Art Review." International Journal of Recent Research in Mathematics Computer Science and Information Technology 9, no. 1 (2022): 1–9. https://doi.org/10.5281/zenodo.6536002.

Full text
Abstract:
<strong>Abstract:</strong> Nowadays, smartphones, camcorders, and security cameras are extensively used in many areas of daily life, such as offices, traffic lights, houses, dormitories, and more. Besides that, video content editing software like Window Movie Maker, Video Editor, Adobe Photoshop, Adobe After Effect, etc., are also widely available. They have many methods for editing video content easily. So, anyone can edit video content at their willing; even edited content contrast with original content. Recently, the rapid development of deep learning-based techniques have created deepfake videos with characters&#39; faces replaced by other faces automatically, such as FakeApp, Faceswap, etc. That leads to &quot;seeing is no longer believing.&quot;. Also, an authentic video provides stronger evidence in court. Therefore, video forgery detection proves that video authenticity has become an urgent requirement today. <strong>Keywords:</strong> Video forgery detection; Video forensic; Deepfake video detection; Deep learning; convolutional neural network. <strong>Title:</strong> Video Forgery Detection: State-of-The-Art Review <strong>Author:</strong> Xuan Hau Nguyen, Thai Son Tran <strong>International Journal of Recent Research in Mathematics Computer Science and Information Technology</strong> <strong>ISSN 2350-1022</strong> <strong>Vol. 9, Issue 1, April 2022 - September 2022</strong> <strong>Page No: 1-9</strong> <strong>Paper Publications</strong> <strong>Website: www.paperpublications.org</strong> <strong>Published Date: 10-May-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.6536002</strong> <strong>Paper Download Link (Source): </strong> <strong>https://www.paperpublications.org/upload/book/Video%20Forgery%20Detection-10052022-3.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
39

Jundan, Wang. "Exploring the Impact of AI-Based Cloud Technology on Classroom Teaching: Opportunities and Challenges." International Journal of Computer Science and Information Technology Research 12, no. 1 (2024): 1–6. https://doi.org/10.5281/zenodo.10577654.

Full text
Abstract:
<strong>Abstract:</strong><em> </em>With the rapid development of technology, the application of artificial intelligence (AI) and cloud technology in the teaching field is gradually becoming popular. This article aims to explore the impact of AI-based cloud technology on classroom teaching effectiveness, including the opportunities and challenges it brings. Through literature review and empirical research, we found that AI and cloud technology can effectively improve teaching quality, promote personalized learning, and alleviate teachers' burden. However, there are also some challenges, such as data security issues, technical application difficulties, and the impact on traditional teaching models. Therefore, educators should fully recognize and respond to these challenges in order to achieve the best integration of technology and teaching. <strong>Keywords</strong><strong>:</strong> artificial intelligence(AI); Cloud technology; Classroom teaching; Teaching effectiveness; Personalized learning. <strong>Title:</strong> Exploring the Impact of AI-Based Cloud Technology on Classroom Teaching: Opportunities and Challenges <strong>Author:</strong> Jundan Wang <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 1, January 2024 - March 2024</strong> <strong>Page No: 1-6</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 28-January-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.10577654</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/exploring-the-impact-of-ai-based-cloud-technology-on-classroom-teaching-opportunities-and-challenges</strong>
APA, Harvard, Vancouver, ISO, and other styles
40

Onuh, Ojoh. "A Comparative Analysis of the Influence of Artificial Intelligence Tools in Cybersecurity." International Journal of Recent Research in Mathematics Computer Science and Information Technology 11, no. 2 (2025): 32–52. https://doi.org/10.5281/zenodo.14620636.

Full text
Abstract:
<strong>Abstract:</strong> This study explores the critical role of artificial intelligence (AI) tools in enhancing cybersecurity operations compared to conventional methods. With the rising sophistication of cyber-attacks and attackers, traditional security tools are becoming less effective. The research evaluates AI-powered tools' effectiveness in detecting and mitigating breaches across various cybersecurity domains, assessing their impact on both attack and defense strategies. The findings show that AI-powered tools significantly improve threat detection and response times, with key metrics such as detection rate, effectiveness, and usability. However, challenges like bias, false positives, high costs, and lack of support were noted. While AI tools show promise in enhancing cybersecurity operations, further advancements are needed to overcome these limitations. These results provide valuable insights for organizations seeking to integrate AI into their cybersecurity strategies. <strong>Keywords:</strong> Artificial Intelligence Tools, Cybersecurity, cyber-attacks, cybersecurity strategies. <strong>Title:</strong> A Comparative Analysis of the Influence of Artificial Intelligence Tools in Cybersecurity <strong>Author:</strong> Onuh Ojoh <strong>International Journal of Recent Research in Mathematics Computer Science and Information Technology</strong> <strong>ISSN 2350-1022</strong> <strong>Vol. 11, Issue 2, October 2024 - March 2025</strong> <strong>Page No: 32-52</strong> <strong>Paper Publications</strong> <strong>Website: www.paperpublications.org</strong> <strong>Published Date: 09-January-2025</strong> <strong>DOI: https://doi.org/10.5281/zenodo.14620636</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.paperpublications.org/upload/book/A%20Comparative%20Analysis%20of%20the%20Influence-09012025-4.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
41

Dlaim, Alqahtani. "Load Balancing with Priority Algorithm for Job Replications in Secure Computing Environments." International Journal of Computer Science and Information Technology Research 10, no. 3 (2022): 50–61. https://doi.org/10.5281/zenodo.7056968.

Full text
Abstract:
<strong>Abstract:</strong> Distributed systems in a grid are heterogeneous resources that can be assigned to do major computing tasks using job-scheduling algorithms. Researchers have proposed job-scheduling algorithms in order to improve grid computing from different aspects such as performance, reliability, scalability, fault-tolerance, security and others. In this project, we focus on the limitations of fuzzy-logic based self-adaptive job replication scheduling (FSARS). It is appropriate for fault-tolerant and secure grid job scheduling. Moreover, it addressed the issue of fixed-number job replication scheduling and enhanced it under dynamic security conditions. FSARS can be improved in terms of performance and grid utilization by minimizing average waiting time of jobs and their average response time. Therefore, we propose a new algorithm called load balancing with priority (LBP). This algorithm is implemented for job scheduling in secure grid environment such that it gets the optimal performance compared to FSARS. LBP algorithm has two main characteristics. First, it uses load balancing between hosts that compute jobs and satisfy security conditions. Consequently, this increases grid utilization of its resources and decreases waiting time for jobs. Second, it sorts hosts based on their processing speed and their expected time to compute jobs. As a result, jobs are assigned to hosts with minimum computation time such that host does not exceed average utilization. This algorithm is implemented using MATLAB such that experimental results show improvements in terms of computing performance for job replication scheduling in secure grid environment. <strong>Keywords:</strong> grid secuirty; job scheduling; grid computing; grid performance; load balancing; grid utilization. <strong>Title:</strong> Load Balancing with Priority Algorithm for Job Replications in Secure Computing Environments <strong>Author:</strong> Dlaim Alqahtani <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 10, Issue 3, July 2022 - September 2022</strong> <strong>Page No: 50-61</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 07-September-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7056968</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/load-balancing-with-priority-algorithm-for-job-replications-in-secure-computing-environments</strong>
APA, Harvard, Vancouver, ISO, and other styles
42

Jezreel, Bernabe, Colos Racel, James De Leon Nikko, Keith Garcia Chester, and Veronica Romero Cayla. "LPU EIS: Equipment Information System for Lyceum of the Philippines University - Cavite." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 7–30. https://doi.org/10.5281/zenodo.8139237.

Full text
Abstract:
<strong>Abstract:</strong> In today&rsquo;s modern society, computers, laptops, and other electronic devices are now a necessary tool for learning. Computers have provided countless learning resources and increased the accessibility and flexibility of education. Using the LPU-EIS, students who want to bring equipment will not have to worry about its registration anymore. It will be developed as a web-based equipment registration system that can be accessed on personal computers and mobile devices through a web browser in which students, college departments, campus offices, security staff, and LPU Property office will greatly benefit. Aside from personal equipment of students, the project will also be available to monitor the equipment or materials from the university. Employing features like RFID tagging, registration module for student&rsquo;s equipment and LPU-owned equipment, and user account management for each user. The application was developed using the Notepad++ with HTML, CSS, and JavaScript as the main programming language with PHP and MySQL, on the Database. All graphical assets of the system were created using Adobe Photoshop. The researchers used Agile model as the software development life cycle. The ISO 25010 was used to evaluate the web-based system by thirty (30) End Users and ten (10) IT Experts with a total average mean of &ldquo;3.52&rdquo; and a Standard Deviation of &ldquo;0.31&rdquo;, interpreted as &ldquo;Highly Acceptable.&rdquo; The evaluation results proved that the application was valuable and effective for students and the university as a tool for securing their equipment and eliminating the hassle of manual equipment registration. <strong>Keywords:</strong> Equipment Registration, LPU-EIS, LPU Property, RFID tagging, LPU-owned equipment, User Account Management. <strong>Title:</strong> LPU EIS: Equipment Information System for Lyceum of the Philippines University - Cavite <strong>Author:</strong> Jezreel Bernabe, Racel Colos, Nikko James De Leon, Chester Keith Garcia, Cayla Veronica Romero <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 7-30</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 12-July-2023</strong> <strong>DOI: </strong><strong>https://doi.org/10.5281/zenodo.8139237</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/lpu-eis-equipment-information-system-for-lyceum-of-the-philippines-university---cavite</strong>
APA, Harvard, Vancouver, ISO, and other styles
43

Ariwa, Rosemary Ngozi. "AWARENESS AND ACCEPTABILITY OF SINGLE SMART CARD TECHNOLOGY AMONG STUDENTS IN FEDERAL POLYTECHNIC BALI, TARABA STATE." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 1–6. https://doi.org/10.5281/zenodo.8113163.

Full text
Abstract:
<strong>Abstract:</strong> In today&rsquo;s world, carrying multiple cards by an individual to establish one&rsquo;s identity and make different transactions has become an essential part of our lives&rsquo; routine. Several options have been adopted by various countries and every option has its pros and cons. However, it has been observed that in most cases, a single smart card solution has been preferred by users and organizations in some countries and Nigeria is yet to adopt it. This paper is mainly to study the Single smart card awareness, acceptability among Polytechnics students in Taraba State. The study adopted survey research design. Thus, two hundred (200) students were randomly sampled (from a population of one thousand six hundred) for the study. Two research questions guided the study. Data for the study was collected through a self-designed questionnaire. The data collected were analyzed using Arithmetic Mean and Standard Deviation. The findings of the study showed that many students go about with multiple cards without the awareness of single smart card technology, while others due to security challenges constrained the acceptability of a single smart card. The paper concluded that there is a need for awareness and training to familiarize users with the single smart card technology looking at its benefits and application outweighing it challenges. Also, the paper recommended among others that further research on the security of a single smart card should be carried out to enable users to accept and adapt to its functionality. <strong>Keywords:</strong> Smart Card, Awareness, Acceptability, &amp; Technology. <strong>Title:</strong> AWARENESS AND ACCEPTABILITY OF SINGLE SMART CARD TECHNOLOGY AMONG STUDENTS IN FEDERAL POLYTECHNIC BALI, TARABA STATE <strong>Author:</strong> Ariwa Rosemary Ngozi <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 1-6</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 04-July-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8113163</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/awareness-and-acceptability-of-single-smart-card-technology-among-students-in-federal-polytechnic-bali-taraba-state</strong>
APA, Harvard, Vancouver, ISO, and other styles
44

V, Srinadh, Sai Pyla Chetan, Sri Rama Ganesh Desaraju, Kiran Kumar Borra, and Divya Sai Bheemerasetty. "Online Voting System using Ethereum in Blockchain Technology." International Journal of Recent Research in Mathematics Computer Science and Information Technology 9, no. 2 (2022): 1–10. https://doi.org/10.5281/zenodo.7233830.

Full text
Abstract:
<strong>Abstract:</strong> Modern digital technology has enhanced the lives of several people. Unlike to the election system, it makes heavy use of printed paper. Elections using the traditional method risk the security aspects and openness. The institution that oversees general elections continues to adopt a centralized approach. With an organization having complete control over the database and system, it is feasible to tamper with the database of significant opportunities. This is one of the issues that might arise in traditional election systems. Because it adopts a decentralized structure and the full database is held by multiple people, blockchain technology has been one of the solutions. The methodology outlined in this work examines the usefulness of hashing algorithms, the construction and sealing of blocks, the accumulation of data, and the declaration of results using an adaptable blockchain approach. Electronic voting or e-voting has fundamental benefits over paper-based systems such as increased efficiency and reduced errors. The electronic voting system tends to maximize user participation, by allowing them to vote from anywhere and from any device that has an internet connection. The blockchain is an emerging, decentralized, and distributed technology with strong cryptographic foundations that promises to improve different aspects of many industries. Expanding e-voting into blockchain technology could be the solution to alleviate the present concerns in e-voting. Here we propose a blockchain-based voting system that will limit the voting fraud and make the voting process simple, secure and efficient. <strong>Keywords:</strong> Blockchain, Online voting, Decentralization, Privacy, Security, Ethereum. <strong>Title:</strong> Online Voting System using Ethereum in Blockchain Technology <strong>Author:</strong> V Srinadh, Chetan Sai Pyla, Desaraju Sri Rama Ganesh, Borra Kiran Kumar, Bheemerasetty Divya Sai <strong>International Journal of Recent Research in Mathematics Computer Science and Information Technology</strong> <strong>ISSN 2350-1022</strong> <strong>Vol. 9, Issue 2, October 2022 - March 2023</strong> <strong>Page No: 1-10</strong> <strong>Paper Publications</strong> <strong>Website: www.paperpublications.org</strong> <strong>Published Date: 21-October-2022</strong> <strong>DOI: https://doi.org/10.5281/zenodo.7233830</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.paperpublications.org/upload/book/Online%20Voting%20System%20using%20Ethereum-21102022-2.pdf</strong>
APA, Harvard, Vancouver, ISO, and other styles
45

Taylor, Rodriguez Vance. "Examination of Applications of Artificial Intelligence in Cybersecurity: Strengthening National Defense with AI." International Journal of Computer Science and Information Technology Research 11, no. 3 (2023): 77–90. https://doi.org/10.5281/zenodo.8210374.

Full text
Abstract:
<strong>Abstract:</strong> The rapid advancement of technology has led to an increasing dependence on digital infrastructure for critical national defense systems. However, this dependence also exposes these systems to sophisticated cyber threats, necessitating robust cybersecurity measures. Artificial Intelligence (AI) has emerged as a promising solution for enhancing cybersecurity in the realm of national defense. This research paper explores the application of AI in cybersecurity for national defense, aiming to provide an overview of the current landscape, challenges, and potential opportunities. It discusses the potential of machine learning algorithms to detect and prevent emerging cyber threats in real-time, as well as the use of natural language processing techniques to analyze vast amounts of security logs and identify patterns indicative of malicious activities. Moreover, the research paper examines the limitations and ethical considerations associated with the integration of AI in national defense cybersecurity. It addresses concerns regarding data privacy, bias in AI algorithms, and the potential for adversarial attacks targeting AI-powered systems. To provide a comprehensive analysis, case studies and real-world examples where AI have been successfully applied to strengthen cybersecurity in national defense contexts are explored. These examples illustrate how AI can improve threat detection, response time, and overall system resilience. Lastly, the paper concludes with an outlook on the future of AI in cybersecurity for national defense, discussing potential research directions and the importance of interdisciplinary collaboration between AI experts, cybersecurity specialists, and defense policymakers. In summary, this research paper sheds light on the significant role of AI in addressing cybersecurity challenges faced by national defense systems. It emphasizes the potential benefits, explores associated challenges, and highlights the need for responsible and ethical implementation. By leveraging AI technologies effectively, nations can strengthen their cybersecurity posture and safeguard critical national defense infrastructure in an increasingly interconnected and digitally-driven world. <strong>Keywords:</strong> Artificial Intelligence; Cybersecurity; International Policy, National Defense, National Security. <strong>Title:</strong> Examination of Applications of Artificial Intelligence in Cybersecurity: Strengthening National Defense with AI <strong>Author:</strong> Taylor Rodriguez Vance <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 11, Issue 3, July 2023 - September 2023</strong> <strong>Page No: 77-90</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 03-August-2023</strong> <strong>DOI: https://doi.org/10.5281/zenodo.8210374</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/examination-of-applications-of-artificial-intelligence-in-cybersecurity-strengthening-national-defense-with-ai</strong>
APA, Harvard, Vancouver, ISO, and other styles
46

Ojiruwe, Benjamin Uzazo, and Al Moaiad Yazeed. "DETECTION AND PROTECTION ANALYSIS OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS USING CLUSTERING DATA MINING." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 25–28. https://doi.org/10.5281/zenodo.11382099.

Full text
Abstract:
<strong>Abstract:</strong> Distributed Denial of Service (DDoS) attacks continue to pose a significant threat to network infrastructures, causing disruptions and financial losses for organizations worldwide. Traditional defense mechanisms often fall short in effectively detecting and mitigating these sophisticated attacks. In this study, a novel approach for the detection and protection analysis of DDoS attacks utilizing clustering data mining techniques. By leveraging the inherent patterns and anomalies present in network traffic data, the method aims to enhance the accuracy and efficiency of Distributed Denial of Service (DDoS) attack detection while minimizing false positives. Employ clustering algorithms to group network traffic data into distinct clusters, allowing for the identification of abnormal traffic patterns indicative of DDoS attacks. Furthermore, we analyze the effectiveness of various clustering algorithms, including k-means, DBSCAN, and hierarchical clustering, in accurately detecting and mitigating DDoS attacks. Through extensive experimentation on real-world network datasets, we demonstrate the efficacy of our approach in accurately detecting and mitigating DDoS attacks while minimizing the impact on legitimate network traffic. Our findings underscore the importance of leveraging clustering data mining techniques for enhancing the resilience of network infrastructures against DDoS attacks. [1] <strong>Keywords:</strong> DDoS Attacks, Clustering Data Mining, Network Security, Intrusion Detection. <strong>Title:</strong> DETECTION AND PROTECTION ANALYSIS OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS USING CLUSTERING DATA MINING <strong>Author:</strong> Ojiruwe Benjamin Uzazo, Yazeed Al Moaiad <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 25-28</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 29-May-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.11382099</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/detection-and-protection-analysis-of-distributed-denial-of-service-ddos-attacks-using-clustering-data-mining</strong>
APA, Harvard, Vancouver, ISO, and other styles
47

Chandrasekhar, Gopisetti. "Credit Card Payments Processing using SAP Digital Payment Add-on for FIAR Process – Case Study." International Journal of Computer Science and Information Technology Research 12, no. 2 (2024): 29–33. https://doi.org/10.5281/zenodo.11402346.

Full text
Abstract:
<strong>Abstract:</strong> Integral to contemporary economies, digital payments have reshaped how individuals and businesses manage financial transactions. As technology continues its relentless progress, the realm of digital payments will undergo further transformations, providing people worldwide with increasingly secure and convenient choices. Today, customers have the choice of closed wallets, semi-closed wallets, and open wallets, but venturing into this business requires both technical expertise and substantial investment. Success in the realm of digital payments is achievable through a sound business strategy aligned with Payment Card Industry Data Security Standards (PCI DSS). In the modern business landscape, connecting with multiple Payment Service Providers (PSPs) for seamless payment processes has been challenging. Until now, a comprehensive solution for integrating consumer applications, both SAP and non-SAP, with multiple PSPs and managing real-time payments effectively was lacking. The SAP digital payments add-on addresses these challenges, offering flexibility by supporting multiple real-time digital payment methods and enabling automatic reconciliation through seamless PSP integrations. It enhances security by eliminating the need to store sensitive credit card data in SAP S/4HANA and non-SAP systems, simplifying PCI compliance. This solution empowers businesses to embrace diverse digital payment methods while ensuring security, flexibility, and efficiency. This paper is intended to assist enterprises in making an informed choice when selecting digital payment through the SAP Digital Payment add-on. This cloud-based Software-as-a-Service (SAAS) tool facilitates the development of digital payment processing, making it more secure, efficient, and adaptable to diverse customer needs. The company successfully navigated the challenges of modern payment processing and emerged with an enhanced payment system that positions it for continued growth and success in the global marketplace. <strong>Keywords:</strong> SAP Digital Payment add-on, SAP S/4 HANA, Payment service Providers. <strong>Title:</strong> Credit Card Payments Processing using SAP Digital Payment Add-on for FIAR Process &ndash; Case Study <strong>Author:</strong> Chandrasekhar Gopisetti <strong>International Journal of Computer Science and Information Technology Research</strong> <strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong> <strong>Vol. 12, Issue 2, April 2024 - June 2024</strong> <strong>Page No: 29-33</strong> <strong>Research Publish Journals</strong> <strong>Website: www.researchpublish.com</strong> <strong>Published Date: 31-May-2024</strong> <strong>DOI: https://doi.org/10.5281/zenodo.11402346</strong> <strong>Paper Download Link (Source)</strong> <strong>https://www.researchpublish.com/papers/credit-card-payments-processing-using-sap-digital-payment-add-on-for-fiar-process--case-study</strong>
APA, Harvard, Vancouver, ISO, and other styles
48

Dr., Khaled Khalifah Allanqawi, and HUSSEIN ALSAIDOMAR MOHAMMAD. "The Impact of Using ChatGPT on Cybersecurity & Social Engineering." International Journal of Computer Science and Information Technology Research 11, no. 4 (2023): 42–52. https://doi.org/10.5281/zenodo.10142464.

Full text
Abstract:
<strong>Abstract:</strong> ChatGPT has emerged as a noteworthy avenue within the realm of artificial intelligence (AI). In the contemporary digital landscape, the predominant focus of research endeavors revolves around the multifaceted implications of this technology. While numerous scholars, particularly those with expertise in programming and digital security, have acknowledged the existence of a correlation between ChatGPT and cybersecurity as well as social engineering, a comprehensive exploration of this relationship remains conspicuously absent from the academic discourse. The objective of this scholarly work is to elucidate the ramifications of ChatGPT on the domains of cybersecurity and social engineering.To accomplish this aim, a descriptive-analytical approach has been employed to meticulously dissect and assess the influence of ChatGPT. This analysis is conducted from the perspectives of information technology specialists, ChatGPT experts, and cybersecurity professionals operating within the geographical purview encompassing the United Arab Emirates, the Kingdom of Saudi Arabia, the State of Kuwait, and the Arab Republic of Egypt. The research cohort consists of a substantial sample size comprising 93 such professionals, and data collection is facilitated through the utilization of a structured questionnaire. Subsequently, the amassed dataset is subjected to rigorous statistical analysis employing the SPSS statistical software version 22. The findings of this investigation substantiate the presence of a statistically significant impact emanating from ChatGPT on the practices of cybersecurity and the occurrence of social engineering attacks.<strong>Keywords:</strong> Artificial intelligence – ChatGPT – Cybersecurity – Social engineering.<strong>Title:</strong> The Impact of Using ChatGPT on Cybersecurity &amp; Social Engineering<strong>Author:</strong>&nbsp;Dr. Khaled Khalifah Allanqawi, MOHAMMAD HUSSEIN ALSAIDOMAR<strong>International Journal of Computer Science and Information Technology Research</strong><strong>ISSN 2348-1196 (print), ISSN 2348-120X (online)</strong><strong>Vol. 11, Issue 4, October 2023 - December 2023</strong><strong>Page No: 42-52</strong><strong>Research Publish Journals</strong><strong>Website: www.researchpublish.com</strong><strong>Published Date: 16-November-2023</strong><strong>DOI:&nbsp;</strong><strong>https://doi.org/10.5281/zenodo.10142464</strong><strong>Paper Download Link (Source)</strong><strong>https://www.researchpublish.com/papers/the-impact-of-using-chatgpt-on-cybersecurity--social-engineering</strong>
APA, Harvard, Vancouver, ISO, and other styles
49

Attiogbé, Christian, Flavio Ferrarotti, and Sofian Maabout. "Advances and Challenges for Model and Data Engineering." JUCS - Journal of Universal Computer Science 27, no. 7 (2021): 646–49. http://dx.doi.org/10.3897/jucs.70972.

Full text
Abstract:
Following the stimulating discussions in the workshops held during the 9th International Conference on Model and Data Engineering (MEDI 2019), we proposed to edit a special issue compiling the fruitful research resulting from those discussions. This special issue on current research in model and data engineering of the Journal of Universal Computer Science is the outcome of that proposal. As such, it contains thoroughly revised and significantly extended versions of key papers discussed at MEDI 2019 workshops. The main objective of MEDI is to provide a forum for the dissemination of research accomplishments and to promote the interaction and collaboration between the models and data research communities. MEDI provides an international platform for the pre- sentation of research on models and data theory, development of advanced technologies related to models and data and their advanced applications. This international scientific event, initiated by researchers from Euro-Mediterranean countries in 2011, aims also at promoting the creation of north-south scientific networks, projects and faculty/student exchanges. The following seven accepted papers nicely reflect the wide range of topics covered by MEDI conferences. In their paper &amp;ldquo;Enhancing GDPR Compliance Through Data Sensitivity and Data Hiding Tools&amp;rdquo;, Xabier Larrucea, Micha Moffie and Dan Mor consider the problem of fulfilling the rules set by the General Data Protection Regulation (GDPR) of the EU within the framework of the reference architectural model industry 4.0 for the healthcare sector. This is challenging due to the highly sensitive data managed by this sector and the need to share this data between different national healthcare providers within the EU. The authors propose and implement a series of valuable tools to enhance security and privacy in this context as well as compliance with the GDPR. They also illustrate through a case study the use of the proposed tools for sharing health records and their integration within the reference framework. In their paper &amp;ldquo;BSO-MV: An Optimized Multiview Clustering Approach for Items Recommendation in Social Networks&amp;rdquo;, Lamia Berkani, Lylia Betit and Louiza Belarif present a new approach to improve accuracy and coverage of clustering based recommendations systems for social networks. The approach is based on improving the results of multiview clustering by combining it with a bees swarm optimization algorithm. Through extensive experimentation with two real-world datasets, they are able to demonstrate the effectiveness of the proposed approach to significantly improve accuracy, outperforming others clustering-based approaches. In their paper &amp;ldquo;A Formal Model for Configurable Business Process with Optimal Cloud Resource Allocation&amp;rdquo;, Abderrahim Ait Wakrime, Souha Boubaker, Slim Kallel, Emna Guermazi and Walid Gaaloul propose a formal approach to analyse and verify con- figurable business process models as well as to optimize the cost of their implementation in the Cloud. The mechanism consists on transforming the problem into an equivalent Boolean satisfiability problem (SAT) which is then feed to a solver. This transformation is done by means of translation rules from configurable business processes to SAT. This model formalizes the different configurable process behaviors including control-flow and cloud resource allocations, enabling the derivation of correct configuration variants. Weighted partial SAT formulae are integrated in the model in order to optimize the global cloud resource allocation cost. In their paper &amp;ldquo;Towards a Semantic Graph-based Recommender System: A Case Study of Cultural Heritage&amp;rdquo;, Sara Qassimi and El Hassan Abdelwahed present a semantic graph-based recommender system of cultural heritage places. Their approach consists on first constructing an emergent description that semantically augments the information about the places of interest and then model through graphs the semantic relationships between similar cultural heritage places and their associated tags. Note that the unsuper- vised nature of folksonomy&amp;rsquo;s tags semantically weakens the description of resources, which in turn hinders their indexing and decreases the quality of their classification and clustering. The semantic augmentation produced by the proposed method in the case study of cultural heritage places in Marrakesh city shows to be an effective tool to fight information overload and to produce better recommendations in this context. As such, the paper presents a valuable contribution that can be used to improve the quality of recommender systems in general. In their paper &amp;ldquo;Assembling the Web of Things and Microservices for the Management of Cyber-Physical Systems&amp;rdquo;, Manel Mena, Javier Criado, Luis Iribarne and Antonio Corral face the challenge of facilitating communication between the diverse devices and protocols used by Cyber-Physical Systems (CPS) and the Internet of Things (IoT). They propose an approach based on the concept of digital dice (an abstraction of various objects). The digital dice builds on the web of things standard. It is based on microservices and capable of handling the interaction and virtualization of IoT devices. This work introduces a technique to build, transform and compose digital dices from descriptions of &amp;ldquo;things&amp;rdquo;. A full transformation flow is presented and a case study is used to illustrate its implementation. The proposal is shown to be effective and flexible, improving the state of the art. In their paper &amp;ldquo;Model-Driven Engineering for End-Users in the Loop in Smart Ambient Systems&amp;rdquo;, Sylvie Trouilhet, Jean-Paul Arcangeli, Jean-Michel Bruel and Maroun Koussaifi present a Model-Driven Engineering (MDE) approach to involve the user in the process of constructing at run time component based applications, adapted to a situation and user needs, in the context of ambient systems. The proposed solution relies on several domain-specific languages and a transformation process, based on established MDE tools (Gemoc Studio, Eclipse Modeling Framework, EcoreTools, Sirius and Acceleo). In this context, the authors describe an innovative way of reinforcing the place of the user in the engineering loop. The authors propose an editor that allows the end user to be aware of the emerging applications resulting of this process, to understand their function&amp;nbsp;and use, and to modify them if desired. From these actions, feedback data are extracted to improve the process. In their paper &amp;ldquo;An Approach for Testing False Data Injection Attack on Data Depen- dent Industrial Devices&amp;rdquo;, Mathieu Briland and Fabrice Bouquet present a domain specific language (DSL) for generating test data for IoT devices/environments. The DSL is proposed for testing and simulating false data injection attacks (FDIA). First, the paper outlines a generic approach for FDIA and presents a list of possible sensor types and a categorization schema for data obtained from sensors. Then, the application of the DSL is illustrated using two examples; a simple one altering the data obtained from a temperature sensor and a more complex one concurrently altering the data obtained from three particle sensors. The authors show that their approach works well in the case study of the Flowbird parking meter system and discuss how it can be adapted to different application domains. We are grateful to all authors of journal articles in this issue, who contributed to a fine collection of research in model and data engineering. We would like to express our greatest thanks to all reviewers, who put in a lot of time reading the articles and making substantial suggestions for improvement, which at the end led to the high quality. We also would like to thank J.UCS evaluation committee for the opportunity to publish this collection of research articles as a special issue of the Journal of Universal Computer Science and in particular to the publishing managers Dana Kaiser and Johanna Zeisberg for their timeless assistance during the whole process. Last but not least, we would like to acknowledge to our host institutions, the University of Nantes and the Software Competence Center Hagenberg (SCCH) for their support and sponsoring of this special issue. In particular, Prof. Yamine Ait-Ameur and its host institute IRIT/INP-ENSEEIHT have significantly collaborated with this special issue in the framework of the COMET scientific partnership agreement with SCCH, and have also supported the MEDI confer- ence from which it originated. Christian Attiogb&amp;eacute;, Flavio Ferrarotti and Sofian Maabout (July, 2021)
APA, Harvard, Vancouver, ISO, and other styles
50

Darkwa, Ernest, Bridget Acquah, and Constance Osafo-Adjei. "Navigating the Mass Media’s Political Agenda Setting Role: A Case Study of Ghana." Inverge Journal of Social Sciences 2, no. 4 (2023): 1–12. https://doi.org/10.63544/ijss.v2i4.53.

Full text
Abstract:
The role of the mass media in establishing political agendas is examined in the paper along with its advantages and disadvantages. A small case study of Ghana is used to examine how radio affects election agenda-setting. It has been observed that the mass media has a substantial influence on agenda-setting, and that influence is crucial for bringing to the public's attention urgent developmental issues. The media can set the agenda for the public on pressing issues that deserve attention through agenda-setting. Aside from this, agenda-setting has grown over time to include important topics like the environment, education, health, and risk communication in addition to its basic focus on political communication. Thus, agenda-setting plays a part in a wide range of societal developments. The agenda-setting theory's initial claim about traditional media, however, is being contested. The challenge is caused by the introduction of new media forms. Because of this, the general population is now exposed to a variety of information sources, not just a few media providers. Due to the widespread availability of a variety of media, the conventional media's initial function has been significantly diminished. Therefore, it is important to consider how the general public shapes the media's agenda through interactions on various digital channels, like social media. References Abdulai, M., Ibrahim, H., &amp; Mashoud, M.A. (2017). Communicating across cultures in multinational Ibis West Africa. International Journal of Intercultural Relations, 58, 42-53. Abdulai, M., Ibrahim, H., &amp; Mashoud, M.A. (2020). The role of radio in setting the agenda for the electorate and creating an atmosphere of aggression during elections in the Northern region of Ghana. Athens Journal of Mass Media and Communication, 6(4), 255-270. Adebayo, J. O. (2016). Fostering non-violent elections in Africa through conflict-sensitive reportage of elections. African Security Review, 25(3), 303-315. Arno, A. (2009, February). How the press uses and values public relations and other media resources. http://us.cision.com/journalist_survey/GW_Cision_Media_Report.pdf. (Accessed on November 11, 2022). Asghar, R. J., Jimshaid, A., &amp; Choudhary, A. I. (2015). Impact of business education on corporate social responsibility (CSR). IBT Journal of Business Studies (JBS), 2(2). Asif, M., Pasha, M. A., Mumtaz, A., &amp; Sabir, B. (2023). Causes of Youth Unemployment in Pakistan. Inverge Journal of Social Sciences, 2(1), 41-50. Bassili, J. N. (1995). Response latency and the accessibility of voting intentions: What contributes to accessibility and how it affects vote choice. Personal and Social Psychology Bulletin, 21, 686–695. Brubaker, J. (2008). The freedom to choose a personal agenda: Removing our reliance on the media agenda. American Communication Journal, 10, 3. Chaffee, S. H., &amp; Metzger, M. J. (2001). The end of mass communication? Mass Communication &amp; Society, 4(4), 365–79. Coleman, R., &amp; McCombs, M. (2007). The young and agenda-less? Exploring age-related differences in agenda setting on the youngest generation, baby boomers, and the civic generation. Journalism &amp; Mass Communication Quarterly, 84(3), 495–508. Collins, A. M., &amp; Loftus, E. F. (1975). A spreading-activation theory of semantic processing. Psychological Review, 82, 407–428. Conway, B. A., Kenski, K., &amp; Wang, D. (2015). The rise of twitter in the political campaign: Searching for intermedia agenda-setting effects in the presidential primary. Journal of Computer-Mediated Communication, 20(4), 363–380. Funk, M. J., &amp; McCombs, M. (2017). Strangers on a theoretical train: Inter-media agenda setting, community structure, and local news coverage. Journalism Studies, 18(7), 845-865. Guo, L., &amp; McCombs, M. (2011). Network agenda setting: A third level of media effects. Paper presented at the annual conference of the International Communication Association, Boston, MA. Hastie, R., &amp; Park, B. (1986). The relationship between memory and judgment depends on whether the task is memory-based or on-line. Psychological Review, 93, 258–268. Hopmann, D. N., Elmelund-Præstekær, C., Albæk, E., Vliegenthart, R., &amp; Vreese, C. H. de. (2012). Party media agenda-setting: How parties influence election news coverage. Party Politics, 18(2), 173–191. Huckfeldt, R., &amp; Sprague, J. (1997). Accessibility and the political utility of partisan and ideological orientations (Working paper). Bloomington: Indiana University. Ireri K., Ongus, E., Laboso, E., Kangai M., Jared O. (2017). First level agenda-setting: A study of press vs. public opinion in Kenya. African Journalism Studies, 38(3-4), 26-49. Iyengar, S. (1987). ‘Television news’ and citizens explanations of national affairs. American Political Science Review, 81, 815–831. Iyengar, S. (1990). The accessibility bias in politics: Television news and public opinion. International Journal of Public Opinion Research, 2, 1–15. Kim, Y., Kim, Y., &amp; Zhou, S. (2015). Theoretical and methodological trends of agenda setting theory: A thematic meta-analysis of the last four decades. Paper presented at the annual conference of the Association for Education in Journalism Mass Communication, San Francisco, CA. Kiousis, S., McDevitt, M., &amp; Wu, X. (2005). The genesis of civic awareness: Agenda setting in political socialization. Journal of Communication, 55(4), 756–774. Koch-Baumgarten, S., &amp; Voltmer, K. (2015). Public policy and the mass media. London: Taylor &amp; Francis. Kosicki, G. M. (1993). Problems and opportunities in agenda-setting research. Journal of Communication, 3:2, 100–127. Krcmar, M., Ewoldsen, D. R., &amp; Koerner, A. (2016). Communication science theory and research: An advanced introduction. New York: Routledge. Latimer, M. K. (1987). The floating voter and the media. Journalism &amp; Mass Communication Quarterly, 64(4), 805–819. Lazarsfeld, P. F., Berelson, B., &amp; Gaudet, H. (1944). The people’s choice: How the voter makes up his mind in a presidential election. New York, NY: Duell, Sloan and Pearce. Lazarsfeld, P. F. (1957). Interpretation of statistical relations as a research operation. In P. F. Lazarsfeld &amp; M. Rosenberg (Eds.), The language of social research (pp. 115–125). Glencoe, IL: Free Press. Lippmann, W. (1922). Public Opinion. NY: Macmillan. Lodge, M., McGraw, K. M., &amp; Stroh, P. (1989). An impression-driven model of candidate evaluation. American Political Science Review, 83, 399–419. Metzgar, E. (2007, January). Blog setting: Traditional media, agenda-setting &amp; the blogosphere. Paper presented at the annual meeting of the Southern Political Science Association, New Orleans, LA. McCombs, M. E. (2004). Setting the agenda: The mass media and public opinion. Cambridge: Blackwell Polity Press. McCombs, M. E. (2005). A look at agenda-setting: Past, present and future. Journalism Studies, 6(4), 543–557. McCombs, M. E., &amp; Shaw, D. L. (1972). The agenda-setting function of mass media. Public Opinion Quarterly, 36(2), 176–187. McCombs, M. E. &amp; Shaw, D. L. (1993). The evolution of agenda-setting research: Twenty-five years in the marketplace of idea. Journal of Communication, 43(2), 58–67. Miller, R. E., &amp; Wanta, W. (1996). Sources of the public agenda: The president–press–public relationship. International Journal of Public Opinion Research, 8(4), 390–402. Nisbet, E. C. (2008). Media use, democratic citizenship, and communication gaps in a developing democracy. International Journal of Public Opinion Research, 20(4), 454–482. Nisbet, M. C. (2005). The competition for worldviews: Values, information, and public support for stem cell research. International Journal of Public Opinion Research, 17(1), 90–112. Nkrumah, D., &amp; Hassan, S. (2021). Unlocking the gates and setting the agenda: New media brings new life to media culture in Ghana. Global Media Journal, 19(40), 1-9. Owusu, W. Y. (2012). The Ghanaian Media Landscape. University of Oxford Press. Rashi, T., &amp; McCombs, M. (2015). Agenda setting, religion and new media: The Chabad case study. The Journal of Religion, Media and Digital Culture, 4(1), 126–145. Rahn, W. M., Krosnick, J. A., &amp; Breuning, M. (1994). Rationalization and derivation processes in survey studies of political candidate evaluations. American Journal of Political Science, 38, 582–600. Salancik, J. R. (1974). Inference of one’s attitude from behavior recalled under linguistically manipulated cognitive sets. Journal of Experimental and Social Psychology, 10, 415–427. Shaw, D. L., Hamm, B. J., &amp; Terry, T. C. (2006). Vertical versus horizontal media: Using agenda setting and audience agenda-melding to create public information strategies in the emerging papyrus society. Military Review, 86(6), 13–25. Shaw, D. L., McCombs, M., Weaver, D. H., &amp; Hamm, B. J. (1999). Individuals, groups, and agenda melding: A theory of social dissonance. International Journal of Public Opinion Research, 11(1), 2–24. Shaw, D., &amp; McCombs, M. (1977). The emergence of American political issues. St. Paul, MN: West. Scheufele, D. A. (2000). Agenda-setting, priming, and framing revisited: Another look at cognitive effects of political communication. Mass Communication &amp; Society, 3(2-3), 297-316. Tewksbury, D., &amp; Scheufele, D. A. (2020). News framing theory and research. In M. B. Oliver, A. A. Raney, &amp; J. Bryant (Eds.), Media effects: Advances in theory and research. Routledge. (pp. 51-68). Tietaah, G. (2014). “Watching the watchdog: Spotlighting indecent election campaign language on radio in Ghana”. Media Foundation of West Africa. United Nations Development Program (2014). “Media and elections: A guide to electoral practitioner” file:///C:/Users/ /Downloads/2038C-UNDP-Media_and_Elections_LR.pdf. UNDP. (Accessed on September 10, 2023). Vliegenthart, R., &amp; Walgrave, S. (2011). When the media matter for politics: Partisan moderators of the mass media’s agenda-setting influence on parliament in Belgium. Party Politics, 17(3), 321–342. Wallsten, K. (2007). Agenda setting and the blogosphere: An analysis of the relationship between mainstream media and political blogs. Review of Policy Research, 24(6), 567-587. Walgrave, S., Soroka, S., &amp; Nuytemans, M. (2008). The mass media’s political agenda-setting power: A longitudinal analysis of media, parliament, and government in Belgium (1993 to 2000). Comparative Political Studies, 41(6), 814–836. Williams, B. A., &amp; Carpini, M. X. (2004). Monica and Bill, all the time and everywhere: The collapse of gatekeeping and agenda setting in the new media environment. The American Behavioral Scientist, 47(9), 1208-1230. Wyer, R. S., &amp; Srull, T. K. (1986). Human cognition in its social context. Psychological Review, 93, 322–359. Yankem, H. (2015). Radio as a tool of political mobilization in Kenya during the 2013 general elections: a case study of Nairobi County. Unpublished master’s thesis. Zhou, S., Kim, Y., Yunjuan L., &amp; Fei Q. (2016). Is the agenda set? State of agenda-setting research in China and Korea, Asian Journal of Communication, 26(6), 566-582.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!