Science topic

Computer Security - Science topic

Explore the latest questions and answers in Computer Security, and find Computer Security experts.
Questions related to Computer Security
  • asked a question related to Computer Security
Question
5 answers
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)
Relevant answer
Answer
you should read a survey articles
  • asked a question related to Computer Security
Question
11 answers
Dear Researchgators;
For the researchers who are specialized in Cybersecurity and/or Network Security, would you please tell us a little about the difference between Cybersecurity and Network Security.
Are they both the same?
Are they different fields?
One is a subset of the other?
It would be great if you can support me with a reference?
Actually, this is not my area of interest but I am doing curiously.
Regards
Relevant answer
Answer
Dear Basim,
I view network security as intrinsic part of cyber security.
Daimi, K., Francia, G., Ertaul, L., Encinas, L. H., & El-sheikh, E. (Eds.). (2018). Computer and network security essentials. Springer.
  • asked a question related to Computer Security
Question
3 answers
I have been working primarily on machine learning algorithms, but recently I found privacy-preserving AI interesting. I would like to understand Homomorphic Encryption as one cybersecurity method in detail. I would appreciate any help regarding available resources.
Relevant answer
Answer
Dear Shokofeh Vahidiansadegh,
Info presented below may be helpful:
Can Homomorphic Encryption be Practical?
_____
Homomorphic Encryption for Beginners: A Practical Guide (Part 1)
_____
Somewhat Practical Fully Homomorphic Encryption?
_____
  • asked a question related to Computer Security
Question
9 answers
please guide me about my MS research?how i work start from start
Relevant answer
Answer
Top 5 Cyber Security Master Thesis Topics
Honeypots in Cybersecurity.
Private Information Storage.
Behavioral and Cognitive Theory in Cybersecurity.
Security, Privacy and Usability.
Language based Cybersecurity.
Regards,
Shafagat
  • asked a question related to Computer Security
Question
3 answers
Does anyone know of a Cybersecurity academic book publisher that is relatively fast toward publication? My research partner and myself have written a book, and we are looking to publish it as soon as possible. Any recommendations or suggestions would be greatly appreciated!
Relevant answer
Answer
Dear Joseph Brickley
You may want to review the following info below:
Information Sharing in Cybersecurity: A Review
_____
_____
Which Publishing Path is Best for YOU & Your Unique Author Needs?
  • asked a question related to Computer Security
Question
4 answers
I have the impression that cybersecurity is already obsolete for academic purposes. It's an impression made after a year looking for postdoctoral opportunities in the area. It just seems like there are only openings for AI and a tiny fraction for crypto. And even less for other aspects of cybersecurity. Like a wave it seems that cybersecurity has gone from a point where it didn't matter to anyone, has reached the top in the last decade and is already digging a hole in the ground.
  • asked a question related to Computer Security
Question
2 answers
Kindly visit the article, and share your honest thoughts in any communication style, even if you are not an expert. Feel free to submit your thoughts here, or under the comments section of the article.
Looking forward to hear your thoughts. Let the fun debates begin!
Best,
M. R.
Relevant answer
Answer
hi,
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a main key, a password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher).Ġasaq; a provably secure key derivation method that, when given access to a true random number generator (TRNG), allows communicating parties, that have a pre-shared secret password p, to agree on a secret key k that is indistinguishable from truly random numbers with a guaranteed entropy.The derivation key index is used to locate the derivation key (i.e. the master DES key) for the issuer BIN, as derived by the online switch in case of EMV cards. .
for more info:
best wishes..
  • asked a question related to Computer Security
Question
10 answers
The economical and social dependency on the ICT has increased the necessity of safer procedures and operations, using communication tools and computer related technologies . But at the same time, the number of cyber attacks or, simpler, the possibility of malfunctioning, is rising.
Given the complexity of mentioned tasks: is AI the only, or at least the main, tool for dealing with the preservation of normal behaviour of Internet and other related technologies?
  • asked a question related to Computer Security
Question
6 answers
Dear ResearchGate members,
My name is Txema Romero. I live and work in Barcelona (Europe).
I am interested in implementing cybersecurity measures in the railway sector.
I would like to write a technical report about how to apply cybersecurity to the railway sector. It would be a review of the different tools and how to apply them (e.g, for ethical hacking, risk analysis of different sub-systems, risk mitigation action plans, cybersecurity design directives, etc.).
Could you please share with me any information in this line?
Thank you. Have a nice rest of the week.
Regards,
  • asked a question related to Computer Security
Question
11 answers
Please suggest to me a good topic for my PhD relevant to Cyber security
Relevant answer
Answer
Dear Nipuna Sankalpa , I feel like this your question is not precise enough.
Cybersecurity is a vast field. Asking for a phd research topic in cybersecurity without further details is not ideal.
What you need to know is that the research project that feats you the most depends on your background, on the expertise of your phd advisor on the topic or he willingness to work on the topic, and also on the environment in which you study. So I recommend you write down a list of potential advisors, contact each supervisor with a description of yourself and your background, and with a summary of what you would like to work on with him. So you somehow choose the eventual topics to work on depending on the expertise of the potential advisors you are going to contact, then depending on wether they are interested in your profile or in the topic you suggested, they will accept, suggest another topic or reject your request.
Notice that in general, people do not post project that believe can be easily solved, if not they would solve them themselves. Some May do, but then I believe they are very few. So take care to not choose something that may be unsolvable.
Finally, my advice: choose a specific branch of cybersecurity which feats your background, read about it, identify some reachable potential advisors actively working in that branch, read some of their works, contact them saying you have read their work, asking some questions you may have, and telling them your are currently looking for a phd position or topic …, they will probably respond to you.
Good luck.
  • asked a question related to Computer Security
Question
6 answers
Hi all,
Does PUF stop side channel attacks?? If so, how does PUF stop side channel analysis based on timing differences or power differences??
Thanks in advance..
Relevant answer
Answer
It does not stop side channel attack. In contrast, one of the problems of PUF is the side channel attack itself.
  • asked a question related to Computer Security
Question
3 answers
I am offering M.Sc. Cybersecurity and Digital Forensics, any help on thesis topics
Relevant answer
Answer
Dear Albert,
As part of the issues of cybersecurity and digital forensics, I propose the following topic for the thesis: Analysis of the impact of the increase in the development of e-commerce, e-banking, e-logistics, e-government, etc. recorded during the SARS-CoV-2 (Covid-19) coronavirus pandemic. on the development of cybercrime, including the development of specific techniques of cybercriminal practice, such as the development of various forms of fake mailing, phishing techniques, sending malware and ransomware viruses in e-mails. I described the key determinants of this issue in several of my publications on this Research Gate portal. I invite you to cooperate on this issue.
Best regards,
Dariusz
  • asked a question related to Computer Security
Question
3 answers
Hello, I am a student of MSc Cyber Security. I need to select a project for my dissertation. I am a bit confused to generate ideas but my initial plan is to do a project based on a cyber security management pathway. Such as regarding policy procedures, incident management framework, ransomware attacks, etc. I am not so interested to do coding stuff but for the project purpose, it's okay. My strength:
1. Policy procedure
2. International framework
3. Payment card security, like PCI DSS.
Please, try to help me with some good ideas.
Relevant answer
Answer
Cyber Security Awareness, and Behavior: A Study
  • asked a question related to Computer Security
Question
10 answers
I am currently undertaking a computer science with cyber security MSc and have been trying to find topics of study for the independent research project which would be interesting to me and I am struggling and am looking for a pointer in the right direction.
I would like to undertake something that is in some way practical in nature to keep it interesting, and the topic has to include some elements of security.
My interests through work are mainly developing serverless applications on AWS and event driven applications and cloud computing but I am really struggling to find something that is both interesting and isn't purely research based and theoretical.
Any pointers would be gratefully received, I still have another four months until I need to write the project proposal but I have already been trying to find something that sparks my interest for the last month or two with little success.
Relevant answer
Answer
Dear Paul Ockleford,
I propose the following topic for the master's thesis on cybersecurity issues: Applications of blockchain and machine learning technologies and other Industry 4.0 technologies as part of improving the cybersecurity risk management of IT systems operating in computing cloud computing environments, in systems based on the Internet of Things, Big Data, and smart technology solutions etc. The research topic may also concern the improvement of techniques and risk management of cybersecurity of information systems used in internet banking and mobile banking.
Best regards,
Dariusz
  • asked a question related to Computer Security
Question
5 answers
The typical information/cybersecurity specialist seems to be overworked and this is especially true in the OT/industrial environment where there are even fewer qualified people available. Are there any guidelines or suggestions on what is a reasonable amount of people to dedicate to cybersecurity in general and maybe more specific to the industrial/OT environment?
Relevant answer
Answer
Dear Cobus Pool,
One more important document:
  • asked a question related to Computer Security
Question
6 answers
There is a growing demand and recommendations for corporate boardroom to improve cybersecurity policy and governance. One of the top recommendations was the inclusion of cybersecurity experts at the C-level for boardroom leverage and mitigations implementation. There are contentions on the inclusion of cybersecurity professional as a qualifier for the boardroom.
Relevant answer
Answer
Dear Wazee Logunleko,
You may want to look at some additional info:
A cybersecurity committee is often tasked with overseeing the development and implementation of an organization's cybersecurity policy, laying out the standards to which employees must adhere to mitigate the company's vulnerability.
  • asked a question related to Computer Security
Question
4 answers
We are in the process of editing a book titled 'Artificial Intelligence and Cybersecurity: Advances and Innovations', by CRC Press, Taylor and Francis Group. Interested authors are requested to submit good quality chapters for the upcoming book.
Relevant answer
Answer
I hope this proposal is no more available
  • asked a question related to Computer Security
Question
6 answers
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical challenges for governments and private sectors. Researchers could diversify the available Cyber Security frameworks to serve as a strategy to accommodate various pedagogical missions and guidelines for academic institutionalised policies and procedures for designing and assessing cybersecurity awareness. How could the framework be diversified to benefit pedagogical best fit?
Relevant answer
Answer
The following RG link is also very useful:
  • asked a question related to Computer Security
Question
7 answers
Greetings,
I just started a doctoral program and realized I have no idea what I want to do for my dissertation. My primary focus for work is system assessment and authorization via the Risk Management Framework (RMF). Ideally, I want to focus on something I have a solid understanding of so something related to RMF seems the way to go...
Can anyone throw out some suggestions? I am hoping to get another perspective in case I have glossed over anything important.
Relevant answer
Answer
Elections, ethics, Submarine Cables or National Defense Cyber Institutional frameworks may be interesting cyber topics. I just found this article so interesting (and may be it insightful for you):
  • asked a question related to Computer Security
Question
5 answers
I wanted to work on these three topics please suggest me
Relevant answer
Answer
Dear Farath Begum ,
Here is a good topic:
Mutual authentication algorithms in client/server architectures utilizing multi-channel security communication schemes.
It involves many aspects of Identity and Access Management (IAM)
  • asked a question related to Computer Security
Question
13 answers
Please I need any suggests on PhD Dissertation topics around Cybersecurity/Privacy/AI and Cloud.
Relevant answer
Answer
Federated learning IoT applications is very challenging due to computational issues. This can be a very good research topic for PhD. I have attached an article regarding this.
  • asked a question related to Computer Security
Question
7 answers
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Relevant answer
Answer
Len Leonid Mizrah that's a wonderful response and I second you. Atiff Abdalla Mahmoud the issue of academic dishonesty in decentralised learning is an emerging and growing trend. The consequences associated with this trend are also relatively new. This sparks a revision of preventive measures which are currently being used to match the trend. without new inventive and resilient techniques, the issues will only grow to unacceptable proportions of which if this happens the value of education will completely be eroded. My take is that the current measures are not anywhere near enough.
  • asked a question related to Computer Security
Question
3 answers
Usecase- To provide the security of the data by building Next-generation firewalls or Is there any better firewall type to handle the normal systems. Please do suggest me any answers!!.
Relevant answer
Answer
Dear Roshan Reddy,
To enable security of electronic communications there are three groups of problems - endpoint security, cloud / network security, and identity and access management security. Firewalls are important, but it's just a part of the puzzle.
  • asked a question related to Computer Security
Question
7 answers
I have interests in cybersecurity impact on social engineering and also cyberattacks and the use of MFA/Behavioural biometrics (e.g. Location, screen angle, etc.) to limit fraudulent transactions. Any suggestions/guidance will be very much appreciated
Relevant answer
Answer
During the SARS-CoV-2 (Covid-19) coronavirus pandemic, the scale of development of e-commerce, remote internet communication, internet payments and settlements, internet and mobile banking, e-business, e-learning, e-logistics, etc. has increased. the online environment in which cybercrime is developing has increased in scale. Therefore, the importance of the issue of improving cybersecurity techniques and instruments is also growing. In view of the above, I propose the following research topic for my thesis: Analysis of the increase in the scale of cybercrime during the SARS-CoV-2 (Covid-19) coronavirus pandemic. In this topic, it is possible to investigate the key determinants of the increase in the scale of cybercrime and to diagnose the types of cybercriminal techniques and types of computer viruses, malware etc. that were most developed by cybercriminals during the pandemic. As part of this issue, it is also possible to study cybersecurity techniques and instruments that were developed during the pandemic.
Best wishes,
Dariusz
  • asked a question related to Computer Security
Question
2 answers
How to define the LSSS structure, i.e. the matrix M and the function ρ which associates each row of M to an attribute in attribute based encryption?Are there some developed methods that can be used to define the structure?
What is the relationship between tree structure and LSSS? Is tree a kind of LSSS, or an entirely different structure?
Relevant answer
Answer
You can check the Ciphertext Policy ABE Paper ( CPABE). Also feel free to check the CPABE toolkit source code ( http://acsc.cs.utexas.edu/cpabe/). It's awesomely written. Some other implementations in various programming languages are available as well
  • asked a question related to Computer Security
Question
8 answers
Can you explain it there is any future of cyber security?
Relevant answer
Answer
Cybersecurity researchers and analysts are rightly worried that a new type of computer, based on quantum physics rather than more standard electronics, could break most modern cryptography. ... The quantum computers that exist today are not capable of breaking any commonly used encryption methods.
  • asked a question related to Computer Security
Question
6 answers
Actually, I am looking for a research topic for my M.Sc.in thesis.
  • Would you like to specify some projects or journals that are based on ML/Deep Learning Algorithms implemented cybersecurity datasets?
  • Suggest some papers link that might be helpful to gather appropriate knowledge about this area.
Thank you...
Relevant answer
Answer
  • asked a question related to Computer Security
Question
22 answers
Distributed denial of service attacks(DDoS)
Relevant answer
Answer
None, russian hackers are free to wreak havoc in the west.
  • asked a question related to Computer Security
Question
10 answers
Please share me your thoughts, ideas & resources on Cybersecurity Awareness models that can be deployed in Organizations of a third world country, I am looking forward to develop a model with my Thesis.
Relevant answer
Answer
You are most welcome dear Nipuna Sankalpa
Wish you the best always.
  • asked a question related to Computer Security
Question
6 answers
I want suggestions for a master's thesis in cyber security, I'm Interested in the security of cloud computing and also in detecting ransomware using machine learning, but I want more suggestions or som related to them
Relevant answer
Answer
Both appear to be intriguing. Cloud security may be a touch too broad. Ransomware detection, on the other hand, is more specific. Anyway you'd like to look at some related projects first.
  • asked a question related to Computer Security
Question
6 answers
I wanted to use OMNeT ++, VEINS and SUMO , but I can not install them.
is  it  best to use VANETsim for security and privacy concepts in VANETs .
thank you
Relevant answer
Answer
Is there some simulator that can integrate VANET with blockchain networks?
  • asked a question related to Computer Security
Question
3 answers
Hi everybody :)
I am looking for a topic dissertation for my Cybersecurity MSc.
In the last period I got interested about 5G cybersecurity, with Core, RAN and O-RAN threats.
I want to ask if anyone has a interesting idea to develop that could became an interesting experimental/project thesis about cybersecurity aspects (penetration testing, security assessment) on these fields, and not just a survey.
Thank you anyone for your inputs!
Relevant answer
Answer
Deep Learning and SDN -based for cyber-attack detection and mitigation on 5G networks
  • asked a question related to Computer Security
Question
3 answers
Kindly give inputs and guide me . Thank you , Respected RG members .
Relevant answer
Answer
I propose the following research topic: Analysis of the determinants of the development of cybercrime techniques and instruments and the improvement of IT systems, improvement of cybersecurity of data transfer posted on online platforms, databases and Big Data systems, social media portals, data processing platforms in the computing cloud, etc. in the open sorce formula.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
4 answers
I am looking for research topic for my Phd which should be a combination of Cyber Security and ( Machine learning OR Deep Learning). Kindly assist with possible topic and objectives.
Thank you
Relevant answer
Answer
Dear Hamza Mouncif,
Artificial Intelligence (AI), including different forms of machine learning, form the basis for the development of various Digital Twins (DTs).Through the use of DTs, the two worlds - the real world and the virtual world - grow closer and closer together. Various security problems are of enormous importance.
My literature sources should justify this more precisely.
General idea of DTs illustrate my figures at the address:
Best regards and much success
Anatol Badach
Matthias Eckhart, Andreas Ekelhart: „Digital Twins for Cyber-Physical Systems Security: State of the Art and Outlook“; In book: Security and Quality in Cyber-Physical Systems Engineering, Nov 2019
Sadeq Almeaibed, Saba Al-Rubaye, Antonios Tsourdos, Nicolas P. Avdelidis: Digital Twin Analysis to Promote Safety and Security in Autonomous Vehicles; IEEE Communications Standards Magazine, Vol. 5, Issue 1, Mar 2021; DOI: 10.1109/MCOMSTD.011.2100004
Christian Gehrmann, Martin Gunnarsson: A Digital Twin Based Industrial Automation and Control System Security Architecture; IEEE Transactions on Industrial Informatics, Vol. 16, Issue 1, Jan 2020; DOI: 10.1109/TII.2019.2938885
Abhishek Pokhrel, Vikash Katta, Ricardo Colomo-Palacios: „Digital Twin for Cybersecurity Incident Prediction: A Multivocal Literature Review“; ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering; Jun 2020, DOI: 10.1145/3387940.3392199
  • asked a question related to Computer Security
Question
6 answers
Is there any quantitative research that indicates whether insider or outsider-initiated cybersecurity events are more destructive? Or does the research, if it exists, show that there is no real difference between the two. I suspect the latter, but cannot find a definitive answer.
Relevant answer
Answer
  • asked a question related to Computer Security
Question
54 answers
Which Q1 and Q2 research journal of computer science and cybersecurity area journal are most suitable for speedy review and publication process preferably not the paid journal?
Relevant answer
Answer
Check this list.
Deleted research item The research item mentioned here has been deleted
  • asked a question related to Computer Security
Question
26 answers
I am currently choosing a topic for my PhD thesis and I have 2 topic ideas but I am a little confused on which shall I proceed with and which topic would be useful and relevant.
One is regarding incorporating AI in cybersecurity and another idea is to do on something related to Mobile App Development (Hybrid app development (security & management), Low code - No code, or using AI for mobile app development).
Are there any other hot topics that I can look into, please do suggest. Thank you so much for your time.
Would really appreciate your thoughts on this :)
Relevant answer
Answer
You are interested in AI and Cyber Security, which are both wide, Cyber Security wider and not disjoint. The presented related topic, therefore, appears rather wide. A topic should be focused on solving identified existing deficiencies. Identify certain problems in an area of cyber security that an area of AI would address properly in a new way. Your supervisors would be of better help.
  • asked a question related to Computer Security
Question
22 answers
Should we write a book focused on risk management to address contemporary organizational threats?
What about popular International topics such as cybersecurity warfare, ransom attacks, data breaches, internet espionage, electronic theft and disasters (including terrorism, pandemics, or digital sabotage)?
Is there a sufficient knowledge gap, market demand and practitioner interest to write a case study collection or protocol best-practice explanation about future global risk management?
Would it help the worldwide scientific practitioners, policy writers and decision makers if we discussed contemporary applications of using protocols like cyber kill, F3AID, TIQ-TEST or basic contingency planning?
What should we do next to write this book?
Ken
#research
#risk
#cyber
#bookdesign
#writers
Relevant answer
Answer
Kindly visit..
Strang, K.D., Vajjhala, N.R., & Korstanje, M. E. (2018). Global Risk and Contingency Management Overview. In K.D. Strang & M. E. Korstanje & N.R. Vajjhala (Eds.), Research, Practices, and Innovations in Global Risk and Contingency Management (pp. xxii-xxxix). PA: IGI-Global.
  • asked a question related to Computer Security
Question
6 answers
Hi,
I am student of Msc Cybersecurity and I am getting confused what to do for my masters project. Please suggest me some easy project ideas for my master project.
TIA
Relevant answer
Answer
My focus is on hospital cybersecurity issues. Go to the Panacea Project website at Panacearesearch.eu, or visit the websites of CUREX or SPHINX, all Eu Horizon 2020 projects and you will find many ideas for your project, from biometrics for identification, to technical and non technical tools for hospital cybersecurity. All the addresses and contacts are there.
Good luck
Sabina Magalini
  • asked a question related to Computer Security
Question
6 answers
How can future Cybersecurity strategies be refined to address the growing sophistication of post-COVID cyber-attacks on individual and corporate cyberspace assets?
Relevant answer
Answer
In response to the restrictions imposed on industries and service sectors, the size of e-commerce growth has risen, as has the development of e-logistics, electronic payments and online settlements, internet and mobile banking, and other related services and technologies. The children are using mobile phones and other devices that are connected to the internet, which may need the implementation of extra security measures in order to safeguard the credentials of the parents. A robust cybersecurity strategy may help an organization or user maintain a strong security posture against hostile assaults that are intended to gain access to, change, delete, destroy, or extort sensitive data from their systems or those of other users.
Regards
Tanvinur Rahman Siam
  • asked a question related to Computer Security
Question
18 answers
Appropriate datasets for cyber security.
Relevant answer
Answer
  • asked a question related to Computer Security
Question
12 answers
Hello I am looking for ideas for my final year project in the cyber security field. I am mostly interested in something in Networking, computer forensics, or blockchain technologies.
Relevant answer
Answer
I propose a topic: Analysis of the possibility of using Blockchain technology to improve the level of cybersecurity of online banking and reduce the risk of cybercrime developing thanks to the use of ransomware viruses.
Best wishes,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
3 answers
Greetings! I am interested in open-data locations on the web related to cybersecurity or cybercrime attacks recorded over the past 1-3 years, and the location of those attacked?
Relevant answer
Answer
Not sure if it is useful for you.
There are quite a number of datasets listed here:
  • asked a question related to Computer Security
Question
3 answers
Greetings! I'm interested in learning which Criminal Justice peer-review journals exist that focus exclusively on Cybersecurity and Cybercrime. If anyone can recommend valuable sources, that would be very helpful.
  • asked a question related to Computer Security
Question
8 answers
I am working on cloud computing and cybersecurity projects, and want to have some recommendations on what are the reputable journals that publish cloud computing and cybersecurity related topics.
Relevant answer
Answer
Good day. The International Cloud Security Alliance (CSA) provides an avenue for cloud security practitioners to publish, via their peer review process. The CSA provides many of the important guidelines that can be followed for properly acquiring or implementing cloud solutions. https://cloudsecurityalliance.org/research/artifacts/
  • asked a question related to Computer Security
Question
18 answers
Hi I'm a student. I would like to propose a topic for a phd thesis in cybersecurity. your ideas will be welcome.
Relevant answer
Answer
go to fsi journal and read a new research
  • asked a question related to Computer Security
Question
8 answers
Tool need to have features like viz, scan, create botnet, launch attack
Relevant answer
Answer
Our tweaked version of httperf which supports IP multiplexing( simulating thousands of IPs from a single server):
Defending Web Servers Against Flash Crowd Attacks
  • asked a question related to Computer Security
Question
8 answers
Which simulator is more helpful in doing research in Edge Computing
Relevant answer
Answer
Authentication and key exchange
  • asked a question related to Computer Security
Question
20 answers
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes
Relevant answer
Answer
The level of cybersecurity of data collected on social media is constantly being raised. However, there is still no full 100 percent. cybersecurity on this issue.
I invite you to the discussion,
Regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
6 answers
Can someone guide me on "Investigation of Security Enhancement Techniques in Edge Computing using Deep Learning Models."
Any base paper which is related to this topic is helpful
  • asked a question related to Computer Security
Question
8 answers
I am looking forward for some suggestion that how to proceed towards my PHD as I do not have any past research expierence and did not study any research based subjects in my masters of networking. Now I am looking forward for PHD in cloud computing or something related to IoT/cyber security. Please suggest as your valuable comments can help me track my career.
  • asked a question related to Computer Security
Question
10 answers
Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
Relevant answer
Answer
Dr. MOHAMMAD FAISAL currently working at the department of computer science and IT, University of Malakand Pakistan, received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
  • asked a question related to Computer Security
Question
5 answers
Second International Conference on Advances in Cybersecurity (ACeS 2020) -- Springer Publisher
The proceedings of the of ACeS 2019 has been published in CCIS Proceedings by Springer Singapore. The book can be found at https://www.springer.com/gp/book/9789811526923
It is our pleasure to invite you to submit your paper to the Second International Conference on Advances in Cybersecurity (ACeS 2020). The conference is organized by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia and will be held at Setia SPICE Convention Centre, Penang, Malaysia from 13 to 15 September 2020.
Online presentations will be provided for international participants.
All accepted papers will be published in Springer's Communications in Computer and Information Science (CCIS) series and submitted to ISI for inclusion. CCIS is indexed in Scopus and ISI.
Cyber security has always been a challenge as attackers and hackers keep finding new ways to carry out cyber-attacks and cybercrime. Although this is an established research domain, there is a need for researchers to explore and find solutions to combat new and emerging threats and vulnerabilities. The focus of this conference will be two-fold:
1. Existing and established areas: Even with so many years of research and solutions contributed, there is still a sharp rise in cyber-threats. This includes DDoS attacks, data theft, social engineering attacks, etc.
2. New and emerging areas: New domains such as the Internet of Things (IoT), Industry 4.0, Blockchain, cloud & edge computing has brought upon new security challenges and opportunities. In addition, the advancement in Machine Learning and Artificial Intelligence incorporated with Big Data allows new techniques and approaches by improving real-time threat and vulnerability analytics.
This conference provides a platform for researchers in the area of Cyber security and related areas to share their findings and solutions. Experts are expected to give keynotes on various topics in Cyber security.
ACeS 2020 is co-located with WCIT 2020. WCIT 2020 is the 24th edition of World Congress on Information Technology and it returns to Malaysia, the gateway to Southeast Asia with 4,000 visionaries, captains of industry, government leaders and academics that span across 100 countries.
Participants of ACeS 2020 have the opportunity to gain full access (worth USD 1,200) to WCIT 2020 with an additional fee of USD300.
Conference Link: https://www.aces.usm.my/
Important Dates
Submission due : April 15, 2020
Acceptance notification : July 15,2020
Camera Ready Deadline: July 30, 2020
Early Bird Registration : August 15, 2020
Standard Registration : August 31, 2020
We cordially invite you to participate in the conference and attend the various events.
For general enquiries, please contact: aces@usm.my or Whatsapp: +60175248245
We look forward to seeing you at ACeS 2020.
Thank you.
Faithfully,
ACeS 2020 Chairs
International Conference on Advances in Cybersecurity 2020
Relevant answer
Answer
i can help
Dr. MOHAMMAD FAISAL currently working at the department of computer science and IT, University of Malakand Pakistan, received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
  • asked a question related to Computer Security
Question
5 answers
Hello,
Does anyone have a list of Scopus/SCI-indexed journals with rapid publication and low publication charges in the field of computer security or computer science engineering?
Thank You
Relevant answer
Answer
I think your suggestion is a dangerous one. I strongly think that ARDA Conference is a questionable company (https://www.ardaconference.com/ ) they are not mentioned positively in http://eusa-riddled.blogspot.com/2018/12/futurological-congress.html
If you go to: https://www.ardaconference.com/journals-publication.phpthey mention a list of (mostly) questionable suggestions, see for example:
Linguistica Antverpiensia https://www.scopus.com/sourceid/5800207685a journal with hijacked version issues see https://www.researchgate.net/post/Hijacked_journals_in_Scopus
Systematic Reviews in Pharmacy https://www.scopus.com/sourceid/19700201140in the meantime discontinued
In my reply of March 22nd in the following question https://www.researchgate.net/post/How_can_i_know_about_fake_and_authentic_of_journalthey had another list of highly suspicious titles.
In other words, they use journals with issues and lure potential victims who are under the impression that they can publish in a (safe) Scopus indexed journal. Not even mentioning the construction that you can submit your paper ‘through’ them, I see no normal procedure in this (and suspect that they charge you for this at some point).
So, in conclusion I would say stay away from this one. Use the Scopus source list you can find here: For those interested I included the latest list with titles, discontinued titles etc. (see enclosed file).
Best regards.
  • asked a question related to Computer Security
Question
1 answer
We are conducting a short survey (< 10 minutes) to get a better understanding of the #cybersecurity implications due to the automation and digitalization of the Architecture, Engineering, Construction, and Operations
#AECO) industry.
Please participate here: https://lnkd.in/gJ4BJBh
Thanking you in advance for your time and consideration.
#aecindustry
#cybersecurity
#digitalconstruction
#BIM
#constructionautomation
#constructiontechnology
Relevant answer
Answer
ok
  • asked a question related to Computer Security
Question
5 answers
Hello,
I have three queries mentioned below:
  1. I have submitted my manuscript around two months ago at "COMPUTERS AND ELECTRICAL ENGINEERING, AN INTERNATIONAL JOURNAL". The average number of weeks to the initial decision is 4-7 weeks (as written on a Journal webpage) and it's been around 11 weeks and still, I have not got any updates from them. Please let me know what can I do next?
  2. Also, is it possible to submit the same manuscript to more than one journal at once to save time? If any of the journals will reply me, I will withdraw the manuscript from other journals.
  3. Please let me know some free Scopus Indexed Journals related to Computer Engineering/Computer Security which will take little time to make decisions because I am in a hurry. It is my first time publishing a paper and I want it to be published anyhow at the earliest (because I need to go abroad and the deadline for scholarships is approaching).
Thank You
Relevant answer
Answer
You may also have a look into this discussion: https://www.researchgate.net/post/Unreasonable_review_times
  • asked a question related to Computer Security
Question
10 answers
I am looking for a research topic for my thesis relevant to Digital twin & Cybersecurity, Please give me your suggestions
Relevant answer
Answer
  • asked a question related to Computer Security
Question
8 answers
In my opinion, sensitive personal data concerning individual users who set up profiles, collected on social media portals, are not fully secure. This is confirmed by the occurrence of data leaks, data theft by cybercriminals.
In connection with the above, the issue of information security on the Internet is becoming an increasingly global problem and therefore, in the global approach, institutions and security systems for the transfer of information on the Internet should be developed. The security of information on the Internet can refer to many aspects of data security both at the level of central state institutions and international organizations as well as the security of personal data of individual citizens, sensitive data of citizens collected on various websites, including social media portals.
The improvement of risk management and information security systems at the supranational level is also a key issue. Technological companies managing social media portals on the one hand try to improve data security systems about users setting up accounts on social media portals. On the other hand, it is also important to cooperate with key, central data security institutions on the Internet that operate transnational. This is important from the point of view of improving information security systems on the Internet in order to limit the possibility of using social media portals by cybercriminals operating transnational, using various social engineering techniques.
Please, answer, comments.
I invite you to the discussion.
Best wishes
Relevant answer
Answer
In recent months, there have been cybercriminal attacks on public institutions and large enterprises as well as technology companies based on data stolen by cybercriminals from social networks and by sending fake e-mails containing malware and hidden ransomware viruses.
Regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
20 answers
Greetings fellow researchers,
I am currently pursuing my MS in Information Security. My favourite area of research is cybersecurity>cybercrimes (probably something related to ethical hacking, digital forensics, etc.). I need your help to find a suitable topic for research (for the purpose of thesis). Please guide me accordingly. Thanking you in advance.
Relevant answer
Answer
In the field of cybersecurity, I propose the following research topic: Analysis of the determinants of the increase in the risk of cybercriminal attacks on state administration institutions and corporations, enterprises, key public institutions, banks, etc., where ransomware viruses and malicious software distributed via e-mail are used.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
3 answers
Theoretical researches were done by many institutions and academicians in replication and scalable transaction management in geo-replicated cloud storage services but the implementation of different technologies to them is so rural. Therefore, I implement Machine Learning to said areas in cloud storage services which Machine Learning is a sub-group of Artificial Intelligence. I did not research only subjects, I created prototype solutions for future problems which I predict from the “quantity creates quality” statement because the quantity of users in cloud storage increase demands to quality. These demands can meat by data which were generated by a big amount of users or just by quantity. Am I right? :)
Relevant answer
Answer
Hi. Plz see the following link:
  • asked a question related to Computer Security
Question
5 answers
In connection with the development of cybercrime, should the surveillance of citizens by national security services be developed, expanded, increased?
To what extent can the developed range of citizens' surveillance be improved as part of the improvement of national cyber security systems?
As part of the improvement of cyber security systems, should the services for combating cybercrime be able to surveillance the entire activity of citizens on the Internet?
Are legal norms regulating the issues of cyber security, services for combating cybercrime and data security gathered in Big Data database systems of large online technology companies fully adapted to the rapidly growing ICT and Internet technology?
Please reply
Best wishes
Relevant answer
Answer
Most citizens are unaware of how much information about Internet users is possessed by Internet technology companies that offer certain information services on the Internet.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
6 answers
I need cybersecurity datasets for training machine learning algorithms, they could be for:
- intrusion detection
- DDoS detection
- Malware detection
- etc.
Relevant answer
1) Digital Image Forensics: Image Manipulation or forgery detection.
2) Deep fakes: There are lots of datasets in kaggle and github
  • asked a question related to Computer Security
Question
6 answers
Merging of Datasets for Optimal Machine Learning Solutions.
Relevant answer
Answer
I don't think so
I agree with the opinion of prof Arturo Geigel
  • asked a question related to Computer Security
Question
1 answer
What are the new topics or state-of-the-art researches in Cyber Security and IoT where Machine Learning and Deep learning related technologies are being incorporated? and appropriate for phd
I have a little experience in machine learning and I want to use it in those areas
Now, I would like to take it further and incorporate ML in the world of Cyber Security related problems.
Relevant answer
Answer
Use of neural network/deep learning for IoT cyebrsecurity anomalies detection
  • asked a question related to Computer Security
Question
5 answers
Are there any law regulating cybersecurity in medical devices?
Relevant answer
Answer
In Poland it could be a pure hacking and additionaly it might be qualified as causing direct danger to health or life. Besides, data protection regulations may be applied.
  • asked a question related to Computer Security
Question
13 answers
What currently dominate and are the standards and instruments for ensuring the security of data transfer and analysis in Big Data database systems developed?
Please reply
Best wishes
Relevant answer
Answer
Since Big Data and / or Data Science resources in the databases of many Internet technology companies are constantly growing, is the importance of cyber security of the information systems of these companies and the data stored in these databases growing analogically?
Thank you, Regards,
Dariusz Prokopowicz
  • asked a question related to Computer Security
Question
4 answers
Can anyone suggest payment based fast track sure publication in computer science or cybersecurity SJR or JCR journals?
Relevant answer
Answer
Many thanks
  • asked a question related to Computer Security
Question
4 answers
What are the priorities that need to be addressed for AI systems to be dependable and trustworthy?
Data-intensive AI systems are expanding rapidly and are affecting many aspects of our daily life. While effectiveness of AI systems is growing, their dependability and trust seems to be endangered. Redefining and dealing with issues like data security, data privacy are among the key challenges AI systems are facing. What is your opinion on that?
Relevant answer
Answer
Maybe this will bring some fresh perspektives:
"The Black Box" phenomenon:
According to the Merriam-Webster online dictionary, a black box is “a usually complicated electronic device whose internal mechanism is usually hidden from or mysterious to the user; broadly: anything that has mysterious or unknown internal functions or mechanisms.” As organizations advance to implementing Type III and Type IV AI technologies (see below..) — utilizing machines or platforms that can learn on their own or communicate with each other — how the algorithms are operating becomes less transparent or understandable.
→ The black box factor will become more and more of a challenge as an organization’s AI activities become more sophisticated.
To illustrate, what I mean in detail, I invite you to read a little bit further on:
Types of AI
In The Conversation’s “Understanding the four types of AI, from reactive robots to self-aware beings,” Arend Hintze, assistant professor of Integrative Biology & Computer Science and Engineering at Michigan State University, outlines four types of AI:
Type I. Reactive machines: This is AI at its simplest. Reactive machines respond to the same situation in exactly the same way, every time. An example of this is a machine that can beat world-class chess players because it has been programmed to recognize the chess pieces, know how each moves, and can predict the next move of both players.
Type II. Limited memory: Limited memory AI machines can look to the past, but the memories are not saved. Limited memory machines cannot build memories or “learn” from past experiences. An example is a self-driving vehicle that can decide to change lanes because a moment ago it noted an obstacle in its path.
Type III. Theory of mind: Theory of mind refers to the idea that a machine could recognize that others it interacts with have thoughts, feelings, and expectations. A machine embedded with Type III AI would be able to understand others’ thoughts, feelings, and expectations, and be able to adjust its own behavior accordingly.
Type IV. Self-awareness: A machine embedded with Type IV AI would be self-aware. An extension of “theory of mind,” a conscious or self-aware machine would be aware of itself, know about its internal states, and be able to predict the feelings of others.
In other words, a Type II self-driving vehicle would decide to change lanes when a pedestrian is in its path, simply because it recognizes the pedestrian as an obstacle. A Type III self-driving vehicle would understand that the pedestrian would expect the vehicle to stop, and a Type IV self-driving vehicle would know that it should stop because that is what the self-driving vehicle would want if it (the self-driving vehicle) were in the path of another oncoming vehicle. Wow.
Most “smart machines” today are manifestations of Type I or Type II AI. Ongoing research and development initiatives will enable organizations to advance toward practical applications of Type III and Type IV AI.
AI Opportunities and Risks
The first step toward understanding the organization’s AI opportunities and risks is to thoroughly understand the organization’s big data opportunities and risks.
Opportunities
– The ability to compress the data processing cycle.
– The ability to reduce errors by replacing human actions with perfectly repeatable machine actions.
– The ability to replace time-intensive activities with time-efficient activities (process automation), reducing labor time and costs.
– The ability to have robots or drones replace humans in potentially dangerous situations.
– The ability to make better predictions, for everything from predicting sales of certain goods in particular markets to predicting epidemics and natural catastrophes.
– The ability to drive revenue and grow market share through AI initiatives.
Risks
– The risk that unidentified human biases will be imbedded in the AI technology.
– The risk that human logic errors will be imbedded in the AI technology.
– The risk that inadequate testing and oversight of AI results in ethically questionable results.
– The risk that AI products and services will cause harm, resulting in financial and/or reputational damage.
– The risks that customers or other stakeholders will not accept or adopt the organization’s AI initiatives.
– The risk that the organization will be left behind by competitors if it does not invest in AI.
– The risk that investment in AI (infrastructure, research and development, and talent acquisition) will not yield an acceptable ROI.
Maybe you concentrate on a certain area of AI application, so to focus to a more specific approach, maybe industry specific or competency specific, like this categorisation implies:
AI Competencies
– Natural language processing
– API´s (Application program interfaces) such as facial recognition, image analytics, and text analytics
– Algorithms and advanced modeling
– Probabilities and applied statistics
– Data analytics
– Software engineering / Programming language
– Machine learning
– Computer vision
– Robotics
So, finally, let´s have a look on a AI Framework
Such a Framework can be comprised of three components:
AI Strategy, AI Governance, and the Human Factor
An organization’s AI strategy might be an obvious extension of the organization’s overall digital or big data strategy. It should be a deliberate AI strategy consistent with the organization’s objectives.
AI governance
1 General
AI governance refers to the structures, processes, and procedures implemented to direct, manage, and monitor the AI activities of the organization in pursuit of achieving the organization’s objectives. The level of formality and structure for an organization’s AI governance will vary based on the specific characteristics of that organization.
→ → AI governance establishes accountability and oversight, helps to ensure that those responsible have the necessary skills and expertise to effectively monitor AI, and helps to ensure the organization’s values are reflected in its AI activities. This last point should not be overlooked or given little attention.
→ → AI activities must result in decisions and actions that are in line with the ethical, social, and legal responsibilities of the organization.
2 Data Architecture & Infrastructure
AI data architecture and infrastructure will likely be one in the same as the organization’s architecture and infrastructure for handling big data. It includes considerations for:
– The way that data is accessible (metadata, taxonomy, unique identifiers, and naming conventions).
– Information privacy and security throughout the data lifecycle (data collection, use, storage, and destruction).
– Roles and responsibilities for data ownership and data use throughout the data lifecycle.
3 Data Quality
The completeness, accuracy, and reliability of the data on which AI algorithms are built are critical. Unfortunately, it is not unusual for organizations to have a poorly defined, incoherent structure to their data. Often, systems do not communicate with each other or do so through complicated add-ons or customizations. How this data is brought together, synthesized, and validated is crucial.
4 S-M-A-R-T / Performance
As organizations integrate AI into their activities, metrics should be defined to (maybe?..) show how AI activities are aligned to business objectives and business strategy.
The Human Factor
Algorithms are developed by humans. Human error and biases (both intentional and unintentional) will impact the performance of the algorithm. The human factor component considers whether:
– The risk of unintended human biases factored into AI design is identified and managed.
– AI has been effectively tested to ensure that results reflect the original objective.
– AI technologies can be transparent given the complexity involved.
– AI output is being used legally, ethically, and responsibly.
It is widely recognized that human error is the most common cause of information privacy and security breaches. Similarly, the human factor component addresses the risk of human error compromising the ability of AI to deliver the expected results.
  • asked a question related to Computer Security
Question
3 answers
A researcher is currently collecting data for a research on cyber security. please use this link to participate in the survey. you can also share it on other groups. Thank you. https://docs.google.com/forms/d/e/1FAIpQLSc1nK7mE72AjAGEOxIDUIQHdA2NQsOWa3pHvs2OtvYk6-9VSQ/viewform
Relevant answer
Answer
Yeah I am also not from Nigeria, but as a person that works in IT I am only afraid of what my parents/other people in the house download and let the infection in that way.
The last time I got scammed was never and the last virus I had was before I even knew what a virus was 12 years ago.
  • asked a question related to Computer Security
Question
3 answers
Hello , I have a questionnaire available
"A Cyber-Security Adoption Framework for organizations"
It needs arbitration approved by specialists in universities or who possess an academic degree in the field of specialization. The questionnaire is required to be arbitrated by (10) specialists, with the importance of the arbitrators ’contact information being correct and legal, with the necessity of having the names of the arbitrators to be able to communicate with them.
Thank you ..
Regards
Relevant answer
Answer
I am interested for your research. I have already done this types of research. Can you please send me details for the purpose.
  • asked a question related to Computer Security
Question
3 answers
while running CICflowmeter soft from canadian institute of cyber security for capturing live network packets, i m getting this error
ValueError: Unknown pypcap network interface 'wlan0'
anyone have guide pls
Relevant answer
Answer
Seems like your pcap driver isn't installed or configured properly...
  • asked a question related to Computer Security
Question
28 answers
Hi I looking for cyber security Dataset.
Please Fill this feedback from and circulate in your University and group.
Relevant answer
Answer