Rela Muni’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (17)


Figure 1: 5G industries (Explained 2018)
Figure 3: Boston Consulting Group (Group 2015)
Figure 4: Key challenges for Industry 4.0 1-Digital skills: according to the Siemens Financial Services research survey, respondents have indicated three key areas of shortage, within digital skills domain: digital production expertise, digital maintenance capabilities and operating and
THREATS AND CHALLENGES OF CYBER-ENABLED INDUSTRIES UNDER FOURTH INDUSTRIAL REVOLUTION (IS IT SOLVING COMPLICATED PREDICAMENTS OR WELCOMING NEW THREATS?)
  • Article
  • Full-text available

June 2018

·

457 Reads

Anil Lamba

·

Satinderjeet Singh

·

·

[...]

·

Rela Muni
Download

Preventing and Detecting Cyber Attacks (Stl & Amf) on Additive Manufacturing (Am) Process Chain

May 2018

·

166 Reads

·

2 Citations

SSRN Electronic Journal


Quantum Computing Technology (QCT) - A Data Security Threat

April 2018

·

230 Reads

·

2 Citations

Advancements in computer science and technology make quantum computation increasingly possible, which would result in unprecedented computational efficiency and allow quantum physicists and chemists to completely model complex quantum mechanical systems. Quantum algorithms have already shown significant advantages over classical algorithms in terms of both runtime and power. Quantum computation opens up new research opportunities in areas such as machine learning, mathematics, and cryptography. However, quantum computation could also pose a danger to online data security. 1. Introduction Alan Turing catalyzed the beginnings of computer science when he conceived the idea of a programmable machine; this was, of course, the Turing machine, revealed to the world in 1936. Since then, generations of scientists worked to bring today's society the modern computer. With these innovations came immense progress in efficient calculations and communication. While computers today perform algorithmic tasks more quickly than Turing could have ever imagined, researchers in computer science are proposing an even faster method of computation on the basis of quantum mechanical theory. These quantum computers have the potential to significantly outperform their classical counterparts and provide unprecedented computational power. This paper investigates the inner workings and potential applications of quantum computers, proposes viable materials for constructing a quantum computer, discusses monetary restrictions on quantum computer construction, and assesses the impact of quantum computation on data security.









Citations (14)


... Moreover, the launch of general-purpose quantum machines is also expected within this decade to solve the complicated number theory problems, such as discrete logarithmic and factorization, in a specific time, which is a resilient potential threat to block cipher applications (Lindsay 2020;Lamba et al. 2018;Mashatan and Turetken 2020;Kumari and Gupta 2021). It has also been revealed that the low-dimensional chaos-based encryption algorithms (Pérez and Cerdeira 1995;Parker and Short 2001) will suffer the potential loss of confidentiality because of predictable trajectories and small keyspace (Kocarev 2001;Wang et al. 2011;Li et al. 2018). ...

Reference:

Construction of multivalued cryptographic boolean function using recurrent neural network and its application in image encryption scheme
Quantum Computing Technology (QCT) - A Data Security Threat

... Therefore, conventional information gathering, management, and analysis methods might not operate on this scale [195,196]. Also, the complexity of the data produced by IoT provides a different front for the existing data processing mechanisms [197][198][199][200]. Personal security and data protection are two of the main considerations in the company implementation of IoT facilities and implementations [102,198]. ...

EMBEDDING MACHINE & DEEP LEARNING FOR MITIGATING SECURITY & PRIVACY ISSUES IN IOT ENABLED DEVICES & NETWORKS

... Copula is a function that can combine several single variable marginal distribution functions that are uniform in one dimension into one multivariable distribution function [16]. According to [17,18], copulas can better describe the dependencies between random variables. ...

MITIGATING CYBER SECURITY THREATS OF INDUSTRIAL CONTROL SYSTEMS (SCADA & DCS)

... Instead, IoT can easily take advantage of the decentralized capabilities offered by blockchain networks. From this point onward, future developments of the Internet of Things do not have to rely on centralized services for trust [42][43][44]. The Internet of Things (IoT) and Blockchain integration frameworks have both been the subject of in-depth research in recent scholarly works. ...

Mitigating IoT Security and Privacy Challenges Using Distributed Ledger Based Blockchain (Dl-BC) Technology

SSRN Electronic Journal

... We present a new approach that uses configuration information on firewalls and vulnerability information on all network devices to build attack graphs that show how far inside and outside attackers can progress through a network by successively compromising exposed and vulnerable hosts. [12] 2018, One of the key advantages of additive manufacturing (AM) is its digital thread, which allows for rapid communication, iteration, and sharing of a design model and its corresponding physical representation. While this enables a more efficient design process, it also presents opportunities for cyber-attacks to impact the physical word. ...

Preventing and Detecting Cyber Attacks (Stl & Amf) on Additive Manufacturing (Am) Process Chain

SSRN Electronic Journal

... The idea of integrating advanced technologies is an innovation in the transportation field. However, such integration increases the exposure to potential threats in the computing platform environment and introduces vulnerabilities to the in-vehicle cutting-edge technology [1]. Furthermore, it enhances the risk of taking control of the vehicle without permission from the vehicle owner [2], which considerably affects driver safety and vehicle security. ...

Identifying & Mitigating Cyber Security Threats in Vehicular Technologies

SSRN Electronic Journal

... Some of the methodologies for secured communication in cloud infrastructure are discussed here [15][16][17][18]. The researchers evaluated a multi-cloud system for data reliability as well as identity management. ...

A Study Paper on Security Related Issue Before Adopting Cloud Computing Service Model

SSRN Electronic Journal

... NIST SP800-30 31 ), but they always need to be adapted for the actual domain and system in any case, and full applicability cannot be expected. The work by Lamba et al. 32 claims that most existing general-purpose risk management standards are not specific enough for a single domain, and domainspecific standards from other domains (e.g. aviation) are not applicable, and application of the 'closest candidate' is needed nevertheless. ...

To Classify Cyber-Security Threats in Automotive Doming Using Different Assessment Methodologies

SSRN Electronic Journal

... The analysis identifies key areas of focus, including network security, information security, web application security, and the Internet of Things (IoT), as critical elements in safeguarding supply chains against cyber threats (Abd Latif et al., 2021). Lamba et al. (2017) investigate the use of information systems in SCM for companies with multicomponent production, aiming to identify effective strategies for information support of supply chain processes. The research highlights the importance of addressing sources of uncertainties, risks, and cybersecurity to integrate business processes between suppliers and customers effectively. ...

Analyzing and Fixing Cyber Security Threats for Supply Chain Management

SSRN Electronic Journal