Science topic
Computer Security - Science topic
Explore the latest questions and answers in Computer Security, and find Computer Security experts.
Questions related to Computer Security
a standard encryption method that could be used to protect the data since all data are mostly uploaded to cloud now a days , also cybercriminals constantly developing new ways to break encryption algorithms. However, there are a number of promising areas of research, such as quantum cryptography and post-quantum cryptography. These new encryption algorithms are designed to be resistant to even the most powerful computers, and they could offer a significant improvement in data security
Dear Scholars, Researchers, and Academics,
We are pleased to announce a Call for Papers for the upcoming Special Issue to be hosted by the Mesopotamian Academic Press. This prestigious event is dedicated to fostering intellectual exchange and advancing scholarship in the field of Computer Science.
The Mesopotamian Academic Press takes pride in its commitment to nurturing the academic community by providing a platform for thought-provoking discussions and interdisciplinary collaborations. We invite contributions from scholars, researchers, and academics working in various disciplines, such as Big Data, Cybersecurity, Information Technology , and beyond, to submit their original research papers and engage in lively discussions that delve into the multifaceted dimensions.
Sincerely,
Mesopotamian Academic Press
https://mesopotamian.press/journals/index.php/index/index
Writing a paper for my Master's degree. Need an example of cybersecurity attacks by students to the school they were in.
What strategies can be developed using deep learning to strengthen data encryption and privacy in cloud environments?
What is the blockchain architecture for IoT and can blockchain technology protect data confidentiality?
What are the potential cybersecurity vulnerabilities associated with interconnected robotic systems and automated processes? How can we safeguard against malicious attacks, data breaches, and unauthorized control that could compromise critical infrastructure or personal safety?
SMB's, Universities, hospitals, and non-profits struggle with CISA, HIPAA, and NIST compliance or best practices.
As cybersecurity professionals what are the main obstacles you face in assessment and getting stakeholders to upgrade as needed?
Research Aim: Most data transmission is monitored by a firewall, which can also recognise and restrict undesirable traffic. The goal of this study is to highlight the potential features of a firewall while preventing cyber-attacks. The study aims to provide a detailed overview of the various categories of current and contemporary firewalls. The study uses a secondary research methodology to complete the research.
Can Artificial Intelligence(AI) protect privacy? What will be the role of AI in cyber crime and future cyber security?
Hi all - I am looking for an opportunity to review and Data Science and Cyber security paper. Any recommendation will help me.
I am looking for an opportunity to review Cyber Security papers for any Journal, or conference. Any recommendation will help me.
I am looking for research topic for my Phd which should be a combination of Cyber Security and ( Machine learning OR Deep Learning). Kindly assist with possible topic and objectives.
Thank you
Please guide me on how can I find a topic for my thesis and where to start work.
I am a student from Umar Musa Yaradua University Katsina
from Computer Science Department.
I need someone who is going to teach me cyber security.
How can artificial intelligence help improve cyber security systems and techniques in online and mobile banking?
In recent years, technologies that play an important role in the field of Industry 4.0, technologies that determine the current fourth technological revolution, including machine learning technologies, deep learning and artificial intelligence are finding their way into improving cyber security systems. Financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies into specific areas of banking in order to increase process efficiency, economic efficiency, etc. Artificial intelligence is already being used by banks to improve remote communication processes with customers, in call centre departments as part of the creation of automated remote communication systems and digitised adviser avatars, in the process of managing credit risk and other risk categories, and also in the area of cyber-security.Therefore, opportunities are emerging for the application of artificial intelligence technologies in improving cyber-security techniques and systems in various areas of cyber-security in online and mobile banking, including issues such as:
1. improving cyber-security techniques to protect the information systems of financial institutions, including banks, from external cyber-attacks via email and ransomware viruses.
2. improving cybercrime risk management systems for integrated internal information systems connected to the Internet.
3. Improving cyber security techniques implemented through the implementation of new Industry 4.0 technologies, including artificial intelligence, machine learning, Blockchain, multi-criteria simulation models, etc., and advanced analytical techniques such as Big Data Analytics, Business Intelligence.
4. improving the anti-spam systems used to protect email inboxes in order to increase the filtering out of emails where cybercriminals use phishing techniques and/or send malware and ransomware viruses in the background of the email.
5. Improving cyber-security techniques for online and mobile banking systems with a particular focus on mobile banking implemented on the bank's customer side using smartphones equipped with specific operating systems and web applications.
6. Analysis of the level of effectiveness and cyber security for biometric techniques for encoding access to information systems as an important factor in cyber security.
7. perfecting cyber-security techniques in integrated, internal, intranet information systems operating in financial institutions, including commercial banks characterised by a complex organisational structure and companies forming interconnected business entities.
In view of the above, financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies in various areas of banking, including in the improvement of cyber-security techniques and systems.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can artificial intelligence help improve cyber-security systems and techniques in online and mobile banking?
What do you think about this topic?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz

Abstract MANET is a wireless network that lacks infrastructural support. Most operations they perform are coordinated between nodes because of their limited transmission range. Assess the secure MANET routing protocol in a malicious environment. However, in the MANET environment security is an important constraint that affects the data transmission rate and cause data loss. This paper developed an Intrusion Detection System Conditional RandomField (IDS – CRF) model for security. The developed model uses the hashing function integrated with the Conditional Random Field model. The IDS – CRF model uses the label sequences for data security in the MANET environment. The model uses the DSR protocol with the discriminative field to process the secure data in the MANET. The proposed IDS-CRF model uses the hashing function for improved data transmission security in the MANET environment. The performance of the proposed IDS – CRF model is comparatively examined with the conventional DSR protocol. The comparative analysis expressed that the proposed IDS – CRF model achieves the ~4% reduction in the delay and ~2% reduction in the routing overhead. Similarly, the proposed IDS – CRF model achieves the ~4% reduced energy consumption. In terms of the Packet delivery ratio and throughput the proposed IDS – CRF model achieves the ~4% - ~6% improved performance than DSR model.
Challenges confronting CISOs are evolving beyond technology, cybersecurity, and controls, as Gartner predictions for 2023 reveal. “By 2025, lack of talent or human failure will be responsible for over half of significant cyber incidents."
How can modern cybersecurity leaders strengthen their programs in the face of these challenges?
“By 2025, the consumerization of AI-enabled fraud will fundamentally change enterprise attack surface driving more outsourcing of enterprise trust and focus on security education and awareness.”
We believe, in this report you will learn key findings, market implications, and recommendations on:
- Designing a cybersecurity program that leverages data to improve decision making
- Demonstrating how a strong security performance is relevant to winning business
- Integrating cybersecurity into the overall business with shareable results
- Effectively allocating budget to both technology and education to establish program consistency
This research question focuses on the specific domain of cybersecurity, namely the Internet of Things (IoT). IoT devices are becoming increasingly prevalent in various sectors, including healthcare, transportation, and smart homes, but they also pose unique security risks. Investigating the emerging threats and challenges associated with securing IoT devices and networks can provide valuable insights into the vulnerabilities and potential countermeasures needed to protect these interconnected systems. This research inquiry can contribute to the development of robust security frameworks, protocols, and strategies for IoT deployments, ultimately enhancing the overall cybersecurity landscape.
This question looks at practical examples of how blockchain technology has been implemented to enhance cybersecurity in various industries, such as supply chain management, healthcare data sharing, and identity verification.
This question aims to highlight the fundamental distinctions between traditional cybersecurity approaches, which often rely on centralized control and trusted third
justifiy your answer please........
Despite making significant investments in security technologies, organizations continue to struggle with security breaches: Their adversaries are quick to evolve tactics and stay ahead of the technology curve. Humans may soon be overwhelmed by the sheer volume, sophistication, and difficulty of detecting cyberattacks. People are already challenged to efficiently analyze the data flowing into the security operations center (SOC) from across the security tech stack. This doesn’t include the information feeds from network devices, application data, and other inputs across the broader technology stack that are often targets of advanced attackers looking for new vectors or using new malware. And as the enterprise increasingly expands beyond its firewalls, security analysts are charged with protecting a constantly growing attack surface.
source: The future of cybersecurity and AI | Deloitte Insights
Applied Sciences | Special Issue: Smart Cyberspace and IoT Systems: Challenges and Future Trends (mdpi.com)
Right now, chatgpt is known by everyone. What we think about chatgpt + cyber security?
hello,
I'm a presently running my master degree programme in cybersecurity and i am looking at Digital Forensics and Information security management. I really need good topics and materials on it. Can anyone help please with topics along that path and materials also?
Thanks
I need to understand what & how to choose sampling techniques I should pick to explore cryptography issues in cyber security domain.
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
Dear ResearchGate members,
My name is Txema Romero. I live and work in Barcelona (Europe).
I am interested in implementing cybersecurity measures in the healthcare sector.
I would like to write a technical report about how to apply cybersecurity to the healthcare sector. It would be a review of the different tools and how to apply them (e.g, for ethical hacking, risk analysis, risk mitigation action plans, cybersecurity design directives, etc.).
Could you please share with me any information related to this topic?
Thank you. I look forward to hearing from you.
Regards,
Dear Professor
I hope this message finds you well. I am writing to ask for your support in voting for my research paper for the Cybersecurity Award in [Track A--- Best Theoretical Research Paper]. My paper is titled [Securityand Privacy in Internet of Things] and it presents innovative findings in Cybersecurity.
As you may know, this award recognizes outstanding contributions to the field and winning it would be a great honor for me. I believe my paper deserves to win because it makes a significant contribution to the field and has the potential to impact future research in the area.
I would be grateful if you could take a few seconds to vote for my paper. You can find more information about the award and the voting process on the [Cybersecurity Award 2023] website [https://cybersecurity.springeropen.com/]. The deadline for voting is [26 May 2023].
Thank you for your time and support. Please let me know if you have any questions or need more information about my research paper.
Best regards,
[Md AlimulHaque]
Vote for my research paper 2023
Dear Professor
I hope this message finds you well. I am writing to ask for your support in voting for my research paper for the Cybersecurity Award in [Track A--- Best Theoretical Research Paper]. My paper is titled [Securityand Privacy in Internet of Things] and it presents innovative findings in Cybersecurity.
As you may know, this award recognizes outstanding contributions to the field and winning it would be a great honor for me. I believe my paper deserves to win because it makes a significant contribution to the field and has the potential to impact future research in the area.
I would be grateful if you could take a few seconds to vote for my paper. You can find more information about the award and the voting process on the [Cybersecurity Award 2023] website [https://cybersecurity.springeropen.com/]. The deadline for voting is [26 May 2023].
Thank you for your time and support. Please let me know if you have any questions or need more information about my research paper.
Best regards,
[Md AlimulHaque]

Please suggest me Ph.D. topic on cybersecurity particularly considering either app security, context-aware systems, and small devices including but not limited to embedded control systems, IoT applications, and sensor networks. Or a topic relates to AI & Machine Learning.
"Which topics do you recommend for computer engineering with a focus on cyber security and deep learning, or any other hot topics suitable for a PhD degree in computer and communication engineering? I am in the early stages of my research and would appreciate any suggestions, including relevant papers. Additionally, I am seeking a co-supervisor to guide me throughout my research."
Currently the cybersecurity is reactive. It reacts to the presence of certain signatures in the operating system, applications, middleware, protocols, frameworks and networks. When these signatures are detected, the appropriate patches are applied to plug the vulnerabilities represented by the signatures.
In this reactive approach, the initiative remains with the attacker. The defense is reactive to what the attacker does. And there is always a time lag between the initiative by the attacker and the construction of the corresponding signatures.
This is not a winning strategy.
Cybersecurity has taken many directions, trends, and new ideas. But this scenario has not changed, the strategy remain a strategy that is not a winning strategy.
In human based decision making, the law enforcement preempts the offender, and arrests the offender before the offence has taken place.
In cybersecurity, we need such a strategy. This would preempt the attacker. It would stop the attack before it begins.
Choudhary Associates in Bowie, MD, have a product that can accomplish this. That constitutes a winning strategy. The details and operations are proprietary. They cannot be disclosed. But the product can be demonstrated in operational scenarios.
Who do you think is a potential customer? How do you think the product can be marketed (currently there is no sales and marketing budget).
Would you be willing to invest in further development, marketing and sales? Who would be interested? Who could be a financier?
Good day All, I just registered for a Post Grad Diploma in ICT. What are the latest topics that I can tackle for my research. I am interested in Cybersecurity but I just don't know where to begin choosing a topic.
"Which topics do you recommend for computer engineering with a focus on cyber security and deep learning, or any other hot topics suitable for a PhD degree in computer and communication engineering?
I am in the early stages of my research and would appreciate any suggestions, including relevant papers. Additionally, I am seeking a co-supervisor to guide me throughout my research."
What mechanisms are adequate to effectively protect nations' critical infrastructures. I believe that it is necessary to develop new cybersecurity frameworks that take risk analysis as a solid basis for protecting them.
Non-repudiation is a legal term defined as protection against an individual falsely denying having performed a particular action. It provides the capability to determine whether a given individual took a specific action, such as created information, approved information or sent or received a message.
Social media platforms such as WhatsApp have a function which allows one to send a message to an individual or a group and DELETE the message from all the recipients leaving them with no evidence of what has been sent. This allows the sender to deny having sent such a message. Read-once messages which get destroyed upon being read can also be a breach of non-repudiation on Social Media platforms.
What is your view of these functions on social media platforms? Legally are they acceptable?
This question is related to cyber security as we are receiving logs and flows as many times we are not able to capture usernames in many events.
Is important cybersecurity experts know about research methodologies?
NIST's new cybersecurity profile is designed to help mitigate risks to systems that use positioning, navigation and timing (PNT) data, including systems that underpin modern finance, transportation, energy and other critical infrastructure. While its scope does not include ground- or space-based PNT source signal generators and providers (such as satellites), the profile still covers a wide swath of technologies.
Source:
Safeguarding Critical Infrastructure: NIST Releases Draft Cybersecurity Guidance, Develops GPS-Free Backup for Timing Systems | NIST
Assessing Cyber Threats To Canadian Infrastructure - Canada.ca
The SCPS Lab (https://www.scpslab.org/) is hiring for two Ph.D. positions in the following areas:
- Federated Defense Against Adversarial Attacks in IIoT.
- Threat and Anomaly Detection for Cloud Security.
The required skills for potential graduate students include:
- Strong background in cyber security.
- Strong background in machine learning and data analytic techniques.
- Background in detection and estimation theory.
- Strong oral and written communication skills.
To apply, please contact Dr. Hadis Karimipour (hadis.karimipour@ucalgary.ca) with your most recent C.V. and a list of two references.
Hi everyone
I need new ideas for a Ph.D. Degree in Cybersecurity.
Thank you in advance
Humans represent a mystery to be deciphered by security/cybersecurity experts because their behaviors, attitudes, beliefs, rituals and decisions (the general characteristics that define a culture) constitute a little-understood universe for executives and their heads of security. Frequently cited in various international research projects and reports is the fact that people are the weakest links in the security chain. Time and again, it is determined that, despite all the technical efforts and security procedures, people are highly likely to expose organizations to vulnerabilities.
source:
The Human Factor in Information Security (isaca.org)
“Chain” is defined here as the sequence of connected links that enables a system to function. Its strength is defined in terms of the connection that is least strong.
Dreyer, P.; T. Jones; K. Klima; J. Oberholtzer; A. Strong; J. Welburn; Z. Winkelman; “Estimating the Global Cost of Cyber Risk: Methodology and Examples,” Rand Corporation, 2018, https://www.rand.org/pubs/research_reports/RR2299.html
Cyberthreats are more imminent and dangerous than ever in terms of their persistence and severity. The volume keeps growing too, with the number of breaches rising 15.1% from 2020 to 2021. The costs per breach are also increasing–jumping 24.5% during the same period. A recent ThoughtLab study revealed the top cybersecurity challenges that are top-of-mind for IT leaders.
sources:
1) Automation answers for cybersecurity challenges - ServiceNow
2) New Special Issue Title Cyber Security for IT Systems, in Journal - pplied Sciences (ISSN 2076-3417)
Respected all Professors,
I would like to know what could possibly be the best book on research methodology for emerging technologies, or if anyone can help me determine what should be the least learning outcome for the student after studying the research methodology in the computer science domain. From what I've seen, a lot of students don't learn much in the research methodology class.
I would need some good suggestions and help.
HI,
I'm a master degree student intresested in Access Control Management and Data Protection. Any good topic suggestion and material will be apprciaated.
I'm student in master degree in network and cybersecurity, and I have a project when I must to create a AAA architecture. But the teacher don't want we use RADIUS (because too easy :P ).
You have access to several files :
- error_message.txt : where you can found the complete error message
- shema.txt : the schema of network in ASCII format
- conf_freediamter.txt : The configuration file of freediameter
- conf_NAS.txt : The config file of CISCO switch 2960 which is the NAS
If you have need to another information, don't hesitate to ask me!
kindly tell me the scope of research in computer virus model with stochastic term and what are the limitation.
I am currently taking master's in computer engineering with specialization in Applied Cybersecurity. I have a hard time to come up with a thesis title. Would be very happy and grateful for all the suggestions. My study must have an integration of hardware and software. Thank you so much!
It has been more than half a century since the concept of Cybersecurity Operation Center (SOC) made its way into publication in 1980. Throughout these years there have been many developments in the computing sciences and other fields that use the same acronym SOC, and it may even be used in fields which will be invented in the future. The integration of Cybersecurity Operation Center to every sector is inevitable, and the usage of search engines will continue to grow. Therefore, for better communication and clarity among the internet community and for the search engines, it is recommendable to use CyOC instead of SOC as an acronym for Cybersecurity Operation Center.
What is your insight? Do we need to continue using SOC or update it to CyOC?
It is becoming obvious that social component is an important factor in dealing with threats and actual cyberattacks. Even the concept social engineering has acquired relevance among theoretical and practical approaches to cybersecurity. At the same time, social behaviour is strongly linked with individual psychological characteristics.
Do you consider Activity theory as a suitable theory for analyzing and studying attackers'/users' behaviour in cybersecurity research and application?
I am looking forward to doing a research paper relevant to Cybersecurity for Digital Marketing for a coming up Research symposium in my Institution, please suggest me some topics relevant to it, Anyone interested can also join me as a Co-Author
How can Big Data optimize urban planning and design?
With most enterprise resources being hosted on the cloud, users tend not to be very aware of online security etiquette. This leaves the organisation's resources vulnerable to adversary attacks.
Who should be responsible for the total all-round awareness, implementation and enforcement of resource security? Is it the service providers, the clients or both?
I am looking for research results on why cybersecurity implementations fail within an operational technology or cyber physical system environment. There are a lot of companies highlighting "problems" with implementations and promoting how their solutions would solve these problems, but I would like to know whether there is credible research available on this issue.
Thank you
During my research, I have dilemma on how to present the research methodology. I intend to study noise minimization schemes namely linearization, key switching, modulus switching and bootstrapping. Need suggestions.
I am looking for a research topic for my Master's thesis in cybersecurity, kindly assist with possible issues and objectives.
Implementing machine learning in cybersecurity will be preferred.
Thank you all
please guide me about my MS research?how i work start from start
what is the scope of research in the field of mathematical biology or mathematical model
It's a clustering of cybersecurity dataset containing 10000 samples. The elbow plot shows 4 optimal cluster. Can I consider this Silhouette Score as indication of a good K-medoids clustering?

Hello,
I am developing a training framework for cyber security. I proposed curriculum based on my observations and discussions. Now, I would like to verify its effectiveness using a scientific method. Your comments and recommendations would be much appreciated. Thank you in advance.
The paper The Limitations of Deep Learning in Adversarial Settings explores how neural networks might be corrupted by an attacker who can manipulate the data set that the neural network trains with. The authors experiment with a neural network meant to read handwritten digits, undermining its reading ability by distorting the samples of handwritten digits that the neural network is trained with.
I'm concerned that malicious actors might try hacking AI. For example
- Fooling autonomous vehicles to misinterpret stop signs vs. speed limit.
- Bypassing facial recognition, such as the ones for ATM.
- Bypassing spam filters.
- Fooling sentiment analysis of movie reviews, hotels, etc.
- Bypassing anomaly detection engines.
- Faking voice commands.
- Misclassifying machine learning based-medical predictions.
What adversarial effect could disrupt the world? How we can prevent it?
I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
I'm thinking about doing academic project on Intrusion detection and prevention system on cloud computing. I also want to know how it can be successfuly conducted. Anyone having ideas on this topic would be much appreciated.
All we know that, Cloud infrastructures are the subject of the cybersecurity attack for the upcoming digital world known as Economic Denial of Sustainability (EDoS). On the other hand DDoS attacks are made possible by massive botnets for the unavailable or down of the server. Since both EDoS and DDoS are performed in the same way.
So what are the differences between EDoS and DDoS?
How can we detect the EDoS attack in the cloud?
And what are the possible solutions for the prevention of EDoS attacks?