Sanaz Kavianpour

Sanaz Kavianpour
Abertay University | UAD · School of Design and Informatics

Ph.D.

About

18
Publications
7,716
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
100
Citations

Publications

Publications (18)
Conference Paper
Social networks are becoming more and more real with their power to influence public opinions, election outcomes, or the creation of an artificial surge in demand or supply. The continuous stream of information is valuable, but it comes with a big data problem. The question is how to mine social text at a large scale and execute machine learning al...
Preprint
BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards) providing access to data for research whilst protecting patient confidentially. Accessing sensitive data without compromising the privacy and security of the data is a complex process....
Article
Full-text available
The majority of medical devices in the healthcare system are not built-in security concepts. Hence, these devices' built-in vulnerabilities prone them to various cyber-attacks when connected to a hospital network or cloud. Attackers can penetrate devices, tamper, and disrupt services in hospitals and clinics, which results in patients' health and l...
Article
Full-text available
With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion det...
Article
Social Network Sites (SNSs) served as an invaluable platform to transfer information across a large number of users. SNSs also disseminate users data to third-parties to provide more interesting services for users as well as gaining profits. Users grant access to third-parties to use their services, although they do not necessarily protect users’ d...
Article
Full-text available
Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environm...
Article
Full-text available
Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environm...
Conference Paper
Full-text available
Facebook is significant platform for third-party developers to run written applications in order to provide users extra functionality and services. Third-party applications (TPAs) access to user’s profile and exchange their information. In doing so, this may lead to information leakage and privacy risks. Although Facebook has control over third-par...
Conference Paper
Full-text available
Attack detection is one of the most important issues for computer networks security. Intrusion Detection System (IDS) monitors network for malicious activity. In this paper, a method is proposed to identify the attacks in IDS. This method generates rule sets for Intrusion Detection System using non-dominated sorting genetic algorithm (NSGA-II). NSG...
Article
Full-text available
— Trust concerns have increased dramatically by the augmentation of online social network sites (OSNSs) popularity. The worth of OSNSs is to form relationships and propagate social information from users' interactions which is beneficial for not only the users but inclusive of cooperator and business values. Thus, the question lies in creating arch...
Conference Paper
Full-text available
The popularity of social network sites has increased extremely during the previous years. Social network sites provide an intimacy interactive platform on the Internet for exchanging information among users. Users may disclose their ideas, comments, pictures or videos, secrets about their business or other private information that may be used by in...
Chapter
Full-text available
The popularity of Social Network Sites (SNSs) has increased recently. Social network sites provide platforms which operate based on exchanging information among users; therefore, information propagation is a significant topic in social networking researches. The goal of this chapter is to study the factors that have a significant role in informatio...
Article
Full-text available
Internet has over the years developed to a platform where more and more companies and organizations control their businesses. Consumers are spending considerably more time shopping online in general compared to only a decade ago, and the numbers are still increasing. The main purpose of this research is to bring out which factors are most important...
Conference Paper
Full-text available
Social Network Sites (SNSs) are one of the most significant and considerable topics that draw researches attention nowadays. Recently, lots of people from different areas, ages and genders join to SNSs and share lots of different information about various things. Spreading information can be harmful for users’ privacy. In this paper, first we descr...
Article
Full-text available
Emerge of online social network sites is one of the hypes since the last decade which can threaten the privacy of online users. In this paper, first we review the history of social networks and their features. Then we examine some methods that can be used on online social networks in order to anonymize user information. Finally we try to propose a...

Network

Cited By

Projects

Projects (2)
Project
To consider the security problem from a holistic perspective in order to propose a secure model for IoT.