Science topic
Cyber Security - Science topic
Explore the latest questions and answers in Cyber Security, and find Cyber Security experts.
Questions related to Cyber Security
Ensuring the safety and security of AI systems is a critical concern as these technologies become more integrated into essential infrastructure and decision-making processes. AI systems are vulnerable to various threats, including adversarial attacks, data poisoning, and model inversion attacks. These threats can compromise the integrity, confidentiality, and availability of AI systems, leading to potentially severe consequences.
Should Big Data Analytics be used more for personalising services or improving cybersecurity systems?
Currently, it is assumed that Big Data Analytics is a key tool for both personalising services and strengthening cybersecurity. The dilemma is which of these areas to invest more resources in and what the consequences of these decisions may be.
Companies and institutions face the challenge of choosing a strategy for using big data analysis. Personalisation allows for the creation of more attractive products and services, which leads to an increase in sales and customer satisfaction. On the other hand, investments in cybersecurity are crucial in the face of the growing number of cyberattacks and threats to users' privacy. The challenge is to find a balance between the benefits of better personalisation and the need to ensure data protection. In a world of growing digital threats, organisations must decide whether to invest more in protection against cyberattacks or rather in the development of tools to better tailor products to customer expectations.
In view of this, personalising services through Big Data brings greater business benefits than using it in the area of cybersecurity. Big Data should be used primarily to improve cybersecurity, as this is a fundamental prerequisite for the development of the digital economy. Therefore, the optimal approach requires the simultaneous development of both areas, but with a priority depending on the specifics of the industry.
The issue of the role of information, information security, including business information transferred via social media, and the application of Industry 4.0/5.0 technologies to improve systems for the transfer and processing of data and information in social media is described in the following articles:
THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING
APPLICATION OF DATA BASE SYSTEMS BIG DATA AND BUSINESS INTELLIGENCE SOFTWARE IN INTEGRATED RISK MANAGEMENT IN ORGANISATION
The role of Big Data and Data Science in the context of information security and cybersecurity
Cybersecurity of Business Intelligence Analytics Based on the Processing of Large Sets of Information with the Use of Sentiment Analysis and Big Data
And what is your opinion on this topic?
What is your opinion on this matter?
Please answer,
I invite everyone to the discussion,
Thank you very much,
Best wishes,
I invite you to scientific cooperation,
Dariusz Prokopowicz

To what extent does the increasing importance of digital technologies, including artificial intelligence, bring new risks such as cybercrime, disinformation and manipulation of public opinion? How should the development of digital technology applications, including artificial intelligence, be managed in order to significantly reduce the scale of misinformation on online social media and other threats and risks arising from this development?
The results of many studies confirm the thesis that the modern world, dominated by digital technologies, brings not only progress and facilitation, but also new, unprecedented threats. Cybercrime, disinformation and public opinion manipulation are problems that affect an increasing number of people and institutions, undermining trust in technology and weakening democratic processes. Cybercrime, including hacking, data theft and online fraud, poses a serious threat to the security of both individuals and organisations. Disinformation, the deliberate spread of false information, aims to mislead the public and achieve specific goals. The manipulation of public opinion, often using disinformation and other psychological techniques, is used to influence people's attitudes and behaviour. A successful solution to these problems requires a comprehensive approach, including strengthening cybersecurity, combating disinformation, educating people on the safe use of digital technologies, including artificial intelligence technologies, and international cooperation. Research plays an important role in solving these problems by providing the knowledge and analysis necessary to develop effective strategies. In recent years, the importance of digital technologies, including artificial intelligence and other Industry 4.0/5.0 technologies, has increased, with both positive aspects, development opportunities and negative effects, threats and new risks. The development of artificial intelligence applications also brings new risks, such as cybercrime, disinformation and manipulation of public opinion. This raises the following question: How should the development of digital applications, including artificial intelligence, be managed in order to significantly reduce the generation of disinformation on online social media and limit the scale of other threats and risks arising from this development?
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
And what is your opinion on this topic?
What do you think about it?
Please reply,
I invite everyone to the discussion,
Thank you very much,
Best regards,
I invite you to scientific cooperation,
Dariusz Prokopowicz

Does the increased importance of digital technologies in recent years, including the development of artificial intelligence applications, carry the risk of an increase in the scale of cybercrime, such as data theft, hacking attacks and disinformation? How can these serious problems be counteracted?
Despite the many benefits, digital technologies, including artificial intelligence technologies, carry the risk of cybercrime, which is a global challenge. Cybercrime, including data theft, hacking and disinformation, threatens individuals and organisations, undermining trust in technology and generating financial losses. Data theft is unauthorised access to confidential information. Hackers, often organised crime groups, aim to take control of computer systems. Disinformation, spread through social media, serves to manipulate public opinion. Cybercrime, due to its cross-border nature, requires international cooperation in prosecuting perpetrators and harmonising regulations. Effective counteraction to cybercrime requires strengthening cybersecurity, international cooperation and education in the safe use of digital technologies. Research plays an important role in solving the problem of cybercrime by helping to understand the motivations of cybercriminals and develop effective defence strategies.
I have described the key issues of the opportunities and threats to the development of artificial intelligence technologies in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
And what do you think about it?
What is your opinion on this issue?
Please reply,
I invite everyone to the discussion,
Thank you very much,
Best wishes,
I invite you to scientific cooperation,
Dariusz Prokopowicz

Cyber security incident response refers to the process of responding to and managing a cyber security incident, such as a data breach, malware outbreak, or denial-of-service (DoS) attack. The goal of incident response is to quickly and effectively contain and mitigate the incident, minimize damage, and restore normal operations.
*Incident Response Phases:*
1. *Preparation*: Develop an incident response plan, establish an incident response team, and conduct regular training and exercises.
2. *Detection*: Identify and detect potential security incidents through monitoring, logging, and alerting.
3. *Containment*: Take immediate action to contain the incident and prevent further damage.
4. *Eradication*: Remove the root cause of the incident and restore systems to a known good state.
5. *Recovery*: Restore normal operations and ensure that systems are functioning as expected.
6. *Post-Incident Activities*: Conduct a post-incident review, identify lessons learned, and implement changes to prevent similar incidents in the future.
*Key Incident Response Activities:*
1. *Incident Classification*: Determine the type and severity of the incident.
2. *Incident Reporting*: Notify relevant stakeholders, including management, customers, and regulatory bodies.
3. *Forensic Analysis*: Collect and analyze evidence to determine the root cause of the incident.
4. *Communication*: Coordinate with stakeholders, including law enforcement, vendors, and customers.
5. *Incident Documentation*: Maintain detailed records of the incident, including timelines, actions taken, and lessons learned.
*Incident Response Team Roles:*
1. *Incident Response Manager*: Oversees the incident response process and coordinates the response effort.
2. *Security Analyst*: Conducts forensic analysis and provides technical expertise.
3. *Communications Specialist*: Handles communication with stakeholders and the media.
4. *Technical Specialist*: Provides technical support and assistance with containment and eradication efforts.
*Best Practices:*
1. *Develop a Comprehensive Incident Response Plan*: Establish a plan that outlines roles, responsibilities, and procedures.
2. *Conduct Regular Training and Exercises*: Ensure that the incident response team is prepared and trained to respond to incidents.
3. *Implement Incident Response Tools and Technologies*: Utilize tools and technologies, such as incident response platforms and threat intelligence feeds, to support incident response efforts.
4. *Continuously Monitor and Improve*: Regularly review and update the incident response plan and procedures to ensure they remain effective and relevant.
Automated cyber threat attribution is critical for identifying the sources of sophisticated cyberattacks, such as Advanced Persistent Threats (APTs). However, existing systems face challenges, including incomplete data integration, limitations in leveraging behavioral patterns, and inaccuracies in distinguishing between similar attack vectors. This question aims to explore the current capabilities, identify gaps, and discuss how emerging technologies, such as AI and advanced graph-based approaches, can enhance attribution accuracy. Insights gained could help guide future research and development in this critical domain.
In today’s rapidly evolving threat landscape, cyber risks are characterized by four critical dimensions: Velocity, Volume, Variety, and Visibility. These “4 Vs” present unique challenges, requiring organizations to adopt continuous assessment strategies that go beyond traditional, static risk evaluations.
This discussion seeks to explore how organizations can effectively implement continuous cyber risk assessment methodologies to address the dynamic nature of cyber risks while ensuring alignment with strategic business objectives.
Key questions include:
- What strategies and frameworks have proven effective in managing the 4 Vs of cyber risks?
- How can organizations enhance real-time risk visibility, prioritization and adaptability?
- What role do people, processes, and technology play in creating a robust approach to continuous cyber risk assessment?
- We invite researchers, practitioners, and cybersecurity enthusiasts to share insights, case studies, and innovative approaches to this pressing topic. Let’s collectively explore how continuous assessment can enable organizations to stay resilient in the face of ever-changing cyber threats.
Dear Researchers, Professors, and Security Policy Makers,
We are pleased to announce the official release of the following three books published by IGI Global. This journey has been one of dedication, exploration, and collaboration. I am proud to have authored and edited these three books alongside my eldest daughter Neha Chaubey, MSc from Imperial College, London, UK to see these works come to fruition.
Our book is honored to have a foreword by Dr. Akshai Aggarwal, Professor Emeritus, University of Windsor, Canada, and Ex Vice Chancellor, Gujarat Technological University, Ahmedabad, India. Read his insightful foreword here
and heartfelt gratitude to my Ph.D. guide, Guru Professor Dr. Savita Gandhi, Ex-Professor and Head of Computer Science, Rollawala Computer Centre, Gujarat University, Ahmedabad, India and currently Dean of Computer Science at GLS University, Ahmedabad, India https://www.igi-global.com/pdf.aspx?tid=360359&ptid=342482&ctid=15&t=Acknowledgment&isxn=9798369359617
These groundbreaking resources are now available:
1. Book Title: "Advancing Cyber Security Through Quantum Cryptography,"
Editors: Nirbhay S. Chaubey, Ganpat University, Gujarat, India
Neha Chaubey, Imperial College, London, UK
2. Book Title: " Harnessing Quantum Cryptography for Next-Generation Security Solutions"
Editors: Nirbhay S. Chaubey, Ganpat University, Gujarat, India
Neha Chaubey, Imperial College, London, UK
3. Book Title: " Advanced Cyber Security Techniques for Data, Blockchain, IoT, and Network Protection"
Editors: Nirbhay S. Chaubey, Ganpat University, Gujarat, India
Neha Chaubey, Imperial College, London, UK
These books focus on advancing research in critical areas such as Quantum Computing, Quantum Cryptography, Cyber Security, Blockchain, IoT, and Network Protection. We highly recommend them as essential resources for academics, Ph.D. research scholars, postgraduate and undergraduate students, cyber security professionals, practitioners, and policymakers. They provide the knowledge necessary to protect the digital frontier and ensure the safety and security of valuable assets.
Explore these valuable resources to enhance your expertise in today's rapidly evolving quantum technology and cybersecurity fields.
We would love to hear your thoughts, or you may even recommend them to others who might find them beneficial.
Your support and feedback mean the world to the book Editors.
Thank you to everyone who has been part of this incredible journey, your encouragement and expertise have made this possible !
Dear Researchers,
We are delighted to share the official release of our cpublished by IGI Global. This groundbreaking resource is now available!
Book Title : "Advancing Cyber Security Through Quantum Cryptography,"
Editors: Nirbhay S. Chaubey, Ganpat University, Gujarat, India
Neha N. Chaubey, Imperial College, London, United Kingdom
Given its focus on advancing research in critical areas, we highly recommend this book as an essential resource for : Faculty Members, Ph.D. Research Scholars, Postgraduate (PG) and Undergraduate (UG) Students, and Professionals in Quantum Computing, IoT, and Cybersecurity.
Explore this valuable resource and elevate your expertise in today’s rapidly evolving fields of quantum technology and cybersecurity!
[CFP]2024 2nd International Conference on Information Education and Artificial Intelligence (ICIEAI 2024) - December
The conference will focus on information-based education, artificial intelligence and other research fields, and invite experts and scholars to introduce research on how artificial intelligence in education can help society meet its needs of providing inclusive and fair high-quality education and promoting lifelong learning for all. The conference will focus on how AI shapes and can shape education in all walks of life, how to advance the science and engineering of AI-assisted interactive learning systems, and how to promote widespread adoption. Discuss how novel research ideas can meet practical needs to build an effective ecosystem of AI-assisted human technologies that support learning. This conference will provide an authoritative international exchange platform for researchers in related fields, promote good academic exchanges among scholars in related fields, and promote the development and application of theories and technologies in this field in universities and enterprises. Participants establish business or research contacts and find global partners for future careers.
Conference Link:
Topics of interest include, but are not limited to:
◕Information Education
○ Educational Science
○ Internet + Education
○ Distance Education
○ Smart education
○ Active learning
○ learning model
......
◕Artificial Intelligence
○ Artificial Intelligence Technology and Application
○ AI and Education
○ Educational Data Mining
○ Machine Perception and Virtual Reality
○ cognitive science
......
Important dates:
Full Paper Submission Date: October 30, 2024
Registration Deadline: December 9, 2024
Conference Dates: December 20-22, 2024
Submission Link:

Please explain the modern methods used now in the field of cyber security?
The Internet of Vehicle IoV sensors generate very large amount of data that transmitted via Wireless WAN Networks and processed by cloud servers. The Quality of Service of very large volume of data sent to Cloud Servers, is often constrained by traffic congestions and delays.
In Cyber Security one of the Challenging Issue Advanced Persistent Threats , What are methods used to against the Advanced Persistent Threats
Could the use of generative artificial intelligence technology to detect cybercrime attacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
How can systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases be improved through the use of generative artificial intelligence technology?
In a situation where companies, enterprises, financial and public institutions have a built in cybercrime risk management system, including email anti-spam applications, anti-virus systems, complex login tools, backap systems for data contained on hard drives, firewalls, cyber threat early warning systems, etc., then most cybercrime attacks targeting these business entities prove to be ineffective, and those that are effective cause very limited problems, financial losses, etc. However, there are still many business entities, especially companies and SMEs, that do not have complex, high-tech, integrated systems built to manage the risk of cybercrime and/or loss of sensitive data stored in databases. In recent years, one of the most serious cybercrime problems causing serious financial losses in some companies, enterprises, public institutions include cyberattacks used by cybercriminals with ransomware-type viruses. A successful attack carried out using ransomware viruses results in infecting a computer, blocking users, company employees from accessing the company's internal systems, stealing or blocking access to data collected in the company's databases, information stored on hard drives, etc., with a simultaneous demand to pay a ransom to remove the imposed blockades. In Poland, of the companies attacked with ransomware viruses, as many as 77 percent agree to pay the ransom. So security systems are still too poorly organized in many companies and institutions. In many business entities, systems for managing the risk of cybercrime and/or loss of sensitive data archived in internal databases are still not professionally built. Cybercrime risk management in many companies and enterprises apparently works poorly or not at all. Since generative artificial intelligence technology is being applied in many areas of cyber-security, so the question arises, could the application of this technology to detect cyber-crime attacks carried out with ransomware-type viruses significantly increase the level of cyber-security in many companies, enterprises, financial and public institutions?
I am conducting research in the problems of analyzing cybercriminal attacks conducted using ransomware viruses and in improving cyber security systems. I have included the conclusions of my research in the following articles:
Analysis of the security of information systems protection in the con-text of the global cyberatomy ransomware conducted on June 2, 2017
Development of malware ransomware as a new dimension of cybercrime taking control of IT enterprise and banking systems
Determinants of the development of cyber-attacks on IT systems of companies and individual clients in financial institutions
The Impact of the COVID-19 Pandemic on the Growing Importance of Cybersecurity of Data Transfer on the Internet
Cybersecurity of Business Intelligence Analytics Based on the Processing of Large Sets of Information with the Use of Sentiment Analysis and Big Data
THE QUESTION OF THE SECURITY OF FACILITATING, COLLECTING AND PROCESSING INFORMATION IN DATA BASES OF SOCIAL NETWORKING
I invite you to get acquainted with the issues described in the above-mentioned publications and to scientific cooperation in these issues.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can cybercrime risk management systems and/or loss of sensitive data archived in internal databases be improved through the application of generative artificial intelligence technology?
Could the application of generative artificial intelligence technology to detect cyberattacks carried out using ransomware viruses significantly increase the level of cyber security in many companies, enterprises, financial and public institutions?
Can generative artificial intelligence technology help detect cybercrime attacks carried out using ransomware viruses?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Hello Researchers and all,
Are you interested in Digital Twin, Cyber Attack and Dynamic Bayesian Network. Do you want to know what can happen to a digital twin based Industrial organization if a Malware and DDoS attack occur? What could be its impact on dynamic situation? If your answer is yes, Here I am sharing with you one of my paper link named, " Analyzing the impact of Cyber Attack on the performance of Digital Twin Based Industrial Organizations" which is got published in Journal of Industrial Information and Integration (Elsevier, Q1, IF = 15.7). You will get a good idea about:
- Digital Twin,
- Cyber attack propagation,
- Markov chain and
- Dynamic Bayesian Network
Not only this, We also discussed different prevention mechanism and resilience mechanism to keep your digital twin mostly functional under Malware and DDoS Attack. If you want to work further on this topic with different cyber attack and prevention mechanism, you will get an idea from this paper how to do this.
Here is the link of the paper:
From this link, you will get a 50 days' free access to the article. Anyone clicking on this link before August 03, 2024 will be taken directly to the final version of this fantastic article on ScienceDirect, which you are welcome to read or download. No sign up, registration or fees are required.
You are welcome to read, download and cite this article and flourish your research skill on cyber attack, Digital twin and Dynamic Bayesian Network.
International Conference on Engineering, Science, Technology, and Innovation (IESTI 2024)
Date: 19-09-2024
Location: Online
Submission Deadline: 15-07-2024**** Extended to 1-8-2024
The Organizing Committee of the International Conference on Engineering, Science, Technology, and Innovation (IESTI 2024) is pleased to invite researchers, practitioners, and professionals to submit papers for presentation and publication at the IESTI conference. This prestigious event aims to bring together leading scholars, researchers, and industry experts to exchange and share their experiences and research results on all aspects of Engineering, Science, Technology, and Innovation.
Topics of Interest
Topics of interest for submission include, but are not limited to:
- Engineering:
- Mechanical Engineering
- Electrical and Electronics Engineering
- Civil Engineering
- Chemical Engineering
- Aerospace Engineering
- Materials Science and Engineering
- Computer Science and Engineering
- Science:
- Physical Sciences
- Life Sciences
- Environmental Sciences
- Earth Sciences
- Chemical Sciences
- Artificial Intelligence
- Technology:
- Information Technology
- Communications Technology
- Nanotechnology
- Biotechnology
- Innovation:
- Technological Innovation
- Innovation Management
- Entrepreneurship
- Sustainable Development
- Policy and Innovation
Submission Guidelines
Authors are invited to submit original, unpublished research papers that are not currently under review elsewhere. All submissions will be peer-reviewed and evaluated based on originality, technical and research content, correctness, relevance to the conference, contributions, and readability.
Paper Submission Process:
1. Format: All papers must be formatted according to the conference template available on the conference website.
2. Length: Full papers should be between 6-10 pages, including all figures, tables, and references.
3. Submission Link: Submit your papers through the online submission system available on the conference website.
4. Review Process: Each paper will undergo a blind peer review process.
5. Notification: Authors will be notified of the review results by 15-08-2024.
6. Camera-Ready Submission: Final versions of accepted papers must be submitted by 31-08-2024.
Important Dates
- Paper Submission Deadline: 15-07-2024 **** Extended to 1-8-2024
- Notification of Acceptance: 15-08-2024
- Camera-Ready Paper Submission: 31-08-2024
- Early Bird Registration Deadline: 20-08-2024
- Conference Dates: 19-09-2024
Conference Proceedings
All accepted and presented papers will be published in the journals listed on the following website:
Special Sessions and Workshops
- IESTI 2024 will also feature special sessions and workshops focusing on current trends and emerging topics in Engineering, Science, Technology, and Innovation. Proposals for special sessions and workshops can be submitted to editor@academicedgepub.co.uk, by 1-8-2024.
Contact Information
For any inquiries regarding paper submissions or the conference, please contact:
- Conference Secretariat: editor@academicedgepub.co.uk
- Address: Academic Edge Publishing LTD, London, United Kingdom
We look forward to your participation in IESTI 2024 and to a successful conference!
We would like to extend our invitation to invite you to join the editorial board of the:
- Journal of Probiotics and Bioactive Molecules Research (JPBMR)
Please send an email including your full name, affiliation, CV, and mention the selected journal to the following email address: editor@academicedgepub.co.uk
Sincerely,
IESTI 2024 Organizing Committee
Please provide information which area will be good for doing Ph.D research in cyber security. Thanks
To what extent has the scale of disinformation generated with the use of applications available on the Internet based on generative artificial intelligence technology increased?
To what extent has the scale of disinformation generated in online social media increased using applications based on generative artificial intelligence technology available on the Internet?
Many research institutions have included among the main types of threats and risks developing globally in 2023 the question of the increase in the scale of organized disinformation operating in online social media. The diagnosed increase in the scale of disinformation generated in online social media is related to the use of applications available on the Internet based on generative artificial intelligence technology. With the help of applications available on the Internet, it is possible without being a computer graphic designer and even without artistic skills to simply and easily create graphics, drawings, photos, images, videos, animations, etc., which can represent graphically professionally created “works” that can depict fictional events. Then, with the help of other applications equipped with generative artificial intelligence technology and advanced language models, i.e. with the help of intelligent chatbots, text can be created to describe specific “fictional events” depicted in the generated images. Accordingly, since the end of 2022, i.e. since the first such intelligent chatbot, i.e. the first versions of ChatGPT, were made available on the Internet, the number of memes, photos, comments, videos, posts, banners, etc. generated with the help of applications equipped with tools based on artificial intelligence technology has been growing rapidly, including the rapid increase in the scale of disinformation generated in this way. In order to limit the scale of the aforementioned disinformation developing in online media, on the one hand, technology companies running social media portals and other online information services are perfecting tools for identifying posts, entries, comments, banners, photos, videos, animations, etc. that contain specific, usually thematic types of disinformation. However, these solutions are not perfect, and the scales of disinformation operating in internecine social media are still high. On the other hand, specific institutions for combating disinformation are being established, NGOs and schools are conducting educational campaigns to make citizens aware of the high scale of disinformation developing on the Internet. In addition, proposed regulations such as the AIAct, which as a set of regulations on the proper use of tools equipped with artificial intelligence technology is expected to come into force in the next 2 years in the European Union may play an important role in reducing the scale of disinformation developing on the Internet.
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
To what extent has the scale of disinformation generated in online social media using applications based on generative artificial intelligence technology available on the Internet increased?
To what extent has the scale of disinformation generated using applications based on generative artificial intelligence technology available on the Internet increased?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

what are the steps needed in carrying out restoration on a ship’s computer system after a cyber attack
Dear colleagues,
I am pleased to inform you about the call for papers for the journal Risks.
As Guest Editor, I extend a warm invitation for you to submit a manuscript for consideration and potential publication in a special issue on "Economics of Cyber Security and Cyber Insurance."
The deadline for manuscript submission is November 30th, 2024.
For further details, please visit the website:
Please let me know if you and your colleagues are interested in submitting a manuscript for this special issue.
Feel free to share this call for papers widely!
I look forward to hearing you
Call for Quality Chapters
Book Title: Advancing Cyber Security Through Quantum Cryptography
(No Processing / Publication Charges)
Call for Chapters from the Researchers for the Scopus Indexed IGI Global Book
***************************************************************************
Abstract/Book Chapter Submission Link
For detailed manuscript formatting and submission guidelines at
***************************************************************************
Important dates:
· Chapter Proposal (1,000 to 2,000 words) Submission: April 14, 2024
· Notification of Acceptance Chapter Proposal: April 28, 2024
· Full Chapter (Minimum 7,000 words) Submission: June 16, 2024
· Review Results Returned: July 21, 2024
· Final Acceptance Notification: August 18, 2024
· Final Chapter Submission: August 25, 2024
***************************************************************************
Thank you! We look forward to seeing all of the great submissions.
Editors:
Neha Chaubey, Imperial College, London, United Kingdom, nchaubey123@gmail.com
Nirbhay Chaubey, Ganpat University, India, nirbhay@ieee.org
***************************************************************************

How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which previously employees of these entities enter into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
Despite the training and updating of internal rules and regulations in many companies and enterprises regarding the proper use of intelligent chatbots, i.e., for example, the ChatGPT made available online by OpenAI and other similar intelligent applications that more technology companies are making available on the Internet, there are still situations where reckless employees enter sensitive data of the companies and enterprises where they are employed into these online tools. In such a situation, there is a high risk that the data and information entered into ChatGPT, Copilot or any other such chatbot may subsequently appear in a reply, an edited report, essay, article, etc. by this application on the smartphone, laptop, computer, etc. of another user of the said chatbot. In this way, another Internet user may accidentally or through a deliberate action of searching for specific data come into possession of particularly important, key, sensitive data for a business entity, public institution or financial institution, which may concern, for example, confidential strategic plans, i.e., information of great value to competitors or intelligence organizations of other countries. This kind of situation has already happened and occurred in some companies characterized by highly recognizable brands in specific markets for the sale of products or services. Such situations clearly indicate that it is necessary to improve internal procedures for data and information protection, improve issues of efficiency of data protection systems, early warning systems informing about the growing risk of loss of key company data, and improve systems for managing the risk of potential leakage of sensitive data and possible cybercriminal attack on internal company information systems. In addition, in parallel to improving the aforementioned systems that ensure a certain level of data and information security, internal regulations should be updated on an ongoing basis according to the scale of the risk, the development of new technologies and their implementation in the business entity, with regard to the issue of correct use by employees of chatbots available on the Internet. In parallel, training should be conducted, during which employees learn about both new opportunities and risks arising from the use of new applications and tools based on generative artificial intelligence technology made available on the Internet. Another solution to this problem may be to order the company to completely ban employees from using smart chatbots made available on the Internet. In such a situation, the company will be forced to create its own, operating as internal such applications and intelligent chatbots, which are not connected to the Internet and operate solely as integral modules of the company's internal information systems. This type of solution will probably involve the company incurring significant financial expenses as a result of creating its own such IT solutions. The costs can be significant and many small companies' financial barrier can be high. However, on the other hand, if the construction of internal IT systems equipped with their own intelligent chatbot solutions becomes an important element of competitive advantage over key direct competitors, the mentioned financial expenses will probably be considered in the category of financial resources allocated to investment and development projects that are important for the future of the company.
The key issues of opportunities and threats to the development of artificial intelligence technology are described in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How to reduce the risk of leakage of sensitive data of companies, enterprises and institutions, which employees of these entities previously input into ChatGPT or other intelligent chatbots equipped with generative artificial intelligence technology in an attempt to facilitate their work?
How do you mitigate the risk of leakage of sensitive data of companies, enterprises and institutions that previously employees of these entities enter into ChatGPT?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Please inform me about universities who offer online Ph.D in Cyber Security area with little or minimum fee, as I want to pursue the study but due to financial problems facing difficulties. Your kind answers/suggestions will be much appreciated. Thanks.
Hi all,
I am currently in the exploration of detecting multi-stage cyber attacks. I've encountered challenges regarding the availability and quality of existing benchmark datasets. Many publicly accessible datasets either present limitations in scope, featuring only simple and isolated attack types like port scans and Denial of Service (DoS) activities, or offer few complete scenarios, often outdated. For example, datasets such as DARPA 2000, with its two multi-step Distributed Denial of Service (DDoS) scenarios, and UNB ISCX 2012, featuring an Island-hopping scenario, fall short due to their age and limited representation of contemporary attack strategies.
I'm reaching out to the cybersecurity research community with the following question: Are there any recent public datasets that encompass complete attack scenarios?
Your insights and recommendations would be invaluable in advancing our understanding and capabilities for detecting complex cyber threats.
looking forward to engaging in a stimulating discussion on this crucial aspect of cybersecurity research.
Best regards,
Why don't the companies running social networking sites that make money from ads posted on their social media bear full responsibility for the content of the ads posted and for the financial, social, moral and other damages caused by ads that are not properly verified?
In today's most popular online social media, there have recently been many untrustworthy advertisements for various products and services, including misleading ads presenting false, unreliable, fraudulent offers of pseudo financial services. Often beginners or experienced influencers and youtubers play the role of presenting certain offers. Sometimes the people presenting certain untrustworthy offers of products or services are seemingly random people who, seemingly as mere citizens of the Internet who want to share their experiences of using various offers, presenting mainly or exclusively positive aspects of using certain presented products and services in reality are paid by the companies whose offers they present. Sometimes influencers and youtubers are given ownership of a specific advertised product for free as a form of gratification. In addition, artificial intelligence technology is increasingly being used to create advertising spots broadcast on social media. Individuals and companies using generative artificial intelligence technology, including applications based on AI technology available for free on the Internet to create advertising spots are taking advantage of legal loopholes, i.e. the lack of legal regulations that would normalize this sphere of the use of AI technology and limit the scale of misinformation, generation of fejknews, untrustworthy advertisements presenting various product and service offers using misleading content to the public that is inconsistent with facts, unverified using reliable, objective expert knowledge, scientific research conducted, etc. In addition, in AI-generated spots, animations and advertising videos, more and more often, instead of human influencers and youtubers, there are replacing them with a kind of avatars, digitally generated people who do not exist in reality. It happens that digitally generated images of real existing public figures of politicians, athletes, showbiz people, actors, singers, etc. are used in unreliably generated spots, animations and advertising videos, into whose mouths are put statements, texts, words that in reality they have never spoken. Recently, more and more often in the online social media, in which there are certain segments, generations of Internet users, citizens, there are many unreliable, taking advantage of the low level of knowledge in the field, offers of pseudo financial services, offers of supposedly super easy and highly profitable investments in cryptocurrencies, in miraculous investment strategies in Bitcoin requiring virtually no knowledge of finance, extra unique investment offers in precious metals, in contracts on selected securities, shares of dynamically growing startups basing their development on artificial intelligence technology, conducting innovative research projects with the aim of creating a miracle cure for cancer or other difficult-to-treat or incurable diseases. Public organizations and institutions representing the interests of consumer citizens, dealing with the issue of consumer protection and competition, investigating the problem of unreliable and misleading citizens presented in social media spots, animations, advertising videos, NGOs and socially active organizations are trying to warn citizens against such unreliable, fraudulent, false content ads. However, the main role in protecting citizens acting as consumers of information should be played by the technology companies running the aforementioned online social media. Leading online technology companies running popular social media sites are developing new technologies and are most equipped with modern ICT, Industry 4.0/5.0 technologies, and are therefore most predisposed to create reliably effective systems for verifying the content used in advertising campaigns run on their social media. This is because there is a lack of legal regulations in the legal normatives that would oblige the companies running social networks earning money from the advertisements posted to verify the content used in the advertisements, to check the issue of compliance of the content of the advertisements with the facts, with the generally applicable expert knowledge, with the results of scientific research conducted, and to make the said technology companies fully responsible for the content of the advertisements posted in their social media and for the financial, social, moral and other damages caused by the advertisements not properly verified. Besides, in addition to the necessary legal regulations, there should be a system of mandatory insurance fund financed by the said technology companies, from which compensation would be paid for all the negative effects caused by the broadcast on social media of fake news, misleading product and service offers, unreliable influencers, youtubers, advertising companies, etc. An additional solution that should be introduced is the possibility of legal enforcement of financial claims on the aforementioned insurance funds from unreliable influencers, youtubers, advertising companies, etc.
I have described the key issues of the determinants of the development of social media with attention to the issue of cyber security and the technologies used Industry 4.0 in my article below:
The postpandemic reality and the security of information technologies ICT, Big Data, Industry 4.0, social media portals and the Internet
I described the key issues of opportunities and threats to the development of artificial intelligence technologies in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
In view of the above, I address the following question to the esteemed community of scientists and researchers:
Why don't the companies running social networks that make money from the ads posted on their social media bear full responsibility for the content of the ads posted and for the financial, social, moral and other damages caused by ads that are not properly verified?
Why don't the companies running social media sites bear full responsibility for the content of unreliable ads posted?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Specifically to clients in commercial banking institutions
With the rapid development of online banking, including mobile banking, are commercial banks increasing spending on improving cyber risk management processes to a greater extent than on credit risk management?
In recent years, the importance of managing the risk of cybercrime of information systems and the potential loss of data transferred over the Internet has been growing, as well as improving systems and instruments for cyber security of information systems using modern ICT, Internet and Industry 4.0 information technologies, including, among others, Internet of Things technology. A major factor in the growing importance of information systems cybercrime risk management is the rapid development of online and mobile banking. In addition, during the SARS-CoV-2 (Covid-19) coronavirus pandemic, the development of online and mobile banking accelerated. This was due to the increase in the scale of digitization and internetization of various spheres of business entities during the pandemic. The financial sector, including the commercial banking sector, is one of those sectors in the economy where the opportunities for the application of ICT information technologies, Internet technologies, Industry 4.0/5.0 including artificial intelligence, artificial neural networks, machine learning, deep learning, Internet of things, cloud computing, Big Data Analytics, multi-criteria simulation models, digital twins, Blockchain, virtual and augmented reality, etc. are the greatest. On the other hand, this is also a sphere of advanced information systems that is particularly vulnerable to attacks from cyber criminals using various cybercriminal techniques to extort bank account access data from bank customers and/or hacking into e-banking systems. In this area, something is constantly happening. On the one hand, banks are implementing new ICT information technologies and Industry 4.0/5.0 and on the other hand, cybercriminals are also taking advantage of these new technologies. Often it even happens the other way around, i.e., first the cybercriminals create new techniques to seize customer data necessary to log in to bank accounts operating on Internet bubble systems and then the bank's hired IT specialists patch system gaps and improve security for access to bank IT systems, improve firewalls, anti-virus applications, etc. However, commercial banks operating under the formula of classic deposit-credit banking get most of their revenue from their banking activities, generate most of their profits from their lending activities, from providing loans to different types of business entities, to citizens, to other banks that act as borrowers. Procedures for granting credit, improving credit risk management, regulations shaping credit activities improved, perfected and adapted to the changing economic environment usually for many decades. In contrast, the development of online and mobile banking was realized in a much shorter period of time than the development of commercial banks' lending activities. As a result, the procedures associated with lending activities in recent years are no longer subject to the same degree of change as the development of communication procedures, techniques for accessing banking products, etc. under the development of Internet banking. In addition, due to the development of online and mobile banking, the increase in the scale of cyber-attacks on banking systems has increased the importance of improving the security of banking information systems. The aforementioned increase in scale has been faster in recent years compared to the improvement of credit business procedures. As a result, commercial banks have in recent years allocated significantly more expenditures on improving cyber-security systems and instruments for banking information systems, on improving cybersecurity risk management systems than on improving credit risk management systems. Besides, both risk management processes can increasingly be carried out in an integrated manner.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
With the rapid development of online banking, including mobile banking, are commercial banks increasing spending on improving cyber risk management processes more than on credit risk management?
Are commercial banks increasing spending on improving cybersecurity risk management processes more than on credit risk management?
And what is your opinion on this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

HI,
I'm a master degree student intresested in Access Control Management and Data Protection. Any good topic suggestion and material will be apprciaated.
Here are some key points for a discussion forum
1. Data Protection and Privacy
2. Preventing Unauthorized Access
3. Protection Against Cyber Attacks
What is the future of generative artificial intelligence technology applications in finance and banking?
The banking sector is among those sectors where the implementation of new ICT, Internet and Industry 4.0/5.0 information technologies, including but not limited to the applications of generative artificial intelligence technology in finance and banking. Commercial online and mobile banking have been among the particularly fast-growing areas of banking in recent years. In addition, the SARS-CoV-2 (Covid-19) coronavirus pandemic, in conjunction with government-imposed lockdowns imposed on selected sectors of the economy, mainly service companies, and national quarantines, the development of online and mobile banking accelerated. Solutions such as contactless payments made with a smartphone developed rapidly. On the other hand, due to the acceleration of the development of online and mobile banking, the increase in the scale of payments made online, the conduct of online settlements related to the development of e-commerce, the scale of cybercriminal activity has increased since the pandemic. When the company OpenAI put its first intelligent chatbot, i.e. ChatGPT, online for Internet users in November 2022 and other Internet-based technology companies accelerated the development of analogous solutions, commercial banks saw great potential for themselves. More chatbots modeled on ChatGPT and new applications of tools based on generative artificial intelligence technology made available on the Internet quickly began to emerge. Commercial banks thus began to adapt the emerging new AI solutions to their needs on their own. The IT professionals employed by the banks thus proceeded with the processes of teaching intelligent chatbots, implementing tools based on generative AI to selected processes and activities performed permanently and repeatedly in the bank. Accordingly, AI technologies are increasingly being implemented by banks into cyber-security systems, processes for analyzing the creditworthiness of potential borrowers, improving marketing communications with bank customers, perfecting processes for automating remote telephone and Internet communications of banks' call center departments, developing market analyses carried out on Big Data Analytics platforms using large sets of data and information extracted from various bank information systems and from databases available on the Internet, online financial portals and thousands of processed posts and comments of Internet users contained in online social media pages, increasingly automated and generated in real time ba based on current large sets of information and data development of industry analysis and analysis and extrapolation into the future of market trends, etc. The scale of new applications of generative artificial intelligence technology in various areas of banking processes carried out in commercial banks is growing rapidly.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
What is the future of generative artificial intelligence technology applications in finance and banking?
What is the future of AI applications in finance and banking?
And what is your opinion on this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best wishes,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Framing my question:
I think we mostly used Public Wi-Fi networks in most cases.
In this context, how can we examine the legal and regulatory landscape of public Wi-Fi security, including the potential liability of network operators, the role of government agencies in promoting network security, and the impact of regulations on user privacy and data security?
Despite making significant investments in security technologies, organizations continue to struggle with security breaches: Their adversaries are quick to evolve tactics and stay ahead of the technology curve. Humans may soon be overwhelmed by the sheer volume, sophistication, and difficulty of detecting cyberattacks. People are already challenged to efficiently analyze the data flowing into the security operations center (SOC) from across the security tech stack. This doesn’t include the information feeds from network devices, application data, and other inputs across the broader technology stack that are often targets of advanced attackers looking for new vectors or using new malware. And as the enterprise increasingly expands beyond its firewalls, security analysts are charged with protecting a constantly growing attack surface.
source: The future of cybersecurity and AI | Deloitte Insights
Applied Sciences | Special Issue: Smart Cyberspace and IoT Systems: Challenges and Future Trends (mdpi.com)
Hello,
I am developing a training framework for cyber security. I proposed curriculum based on my observations and discussions. Now, I would like to verify its effectiveness using a scientific method. Your comments and recommendations would be much appreciated. Thank you in advance.
Can artificial intelligence help optimize remote communication and information flow in a corporation, in a large company characterized by a multi-level, complex organizational structure?
Are there any examples of artificial intelligence applications in this area of large company operations?
In large corporations characterized by a complex, multi-level organizational structure, the flow of information can be difficult. New ICT and Industry 4.0 information technologies are proving to be helpful in this regard, improving the efficiency of the flow of information flowing between departments and divisions in the corporation. One of the Industry 4.0 technologies that has recently found various new applications is artificial intelligence. Artificial intelligence technology is finding many new applications in recent years. The implementation of artificial intelligence, machine learning and other Industry 4.0 technologies into various business fields of companies, enterprises and financial institutions is associated with the increase in digitization and automation of processes carried out in business entities. For several decades, in order to refine and improve the flow of information in a corporation characterized by a complex organizational structure, integrated information systems are being implemented that informationally connect applications and programs operating within specific departments, divisions, plants, etc. in a large enterprise, company, corporation. Nowadays, a technology that can help optimize remote communication and information flow in a corporation is artificial intelligence. Artificial intelligence can help optimize information flow and data transfer within a corporation's intranet.
Besides, the technologies of Industry 4.0, including artificial intelligence, can help improve the cyber security techniques of data transfer, including that carried out in email communications.
In view of the above, I address the following question to the esteemed community of researchers and scientists:
Can artificial intelligence help optimize remote communication and information flow in a corporation, in a large company characterized by a multi-level, complex organizational structure?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz

"Which topics do you recommend for computer engineering with a focus on cyber security and deep learning, or any other hot topics suitable for a PhD degree in computer and communication engineering? I am in the early stages of my research and would appreciate any suggestions, including relevant papers. Additionally, I am seeking a co-supervisor to guide me throughout my research."
Hello everyone:)
Can anyone recommend me some publications on data destruction? I am looking for e.g. publications concerning:
- the use of microwave radiation in the destruction of data or data carriers,
- analyzes of thermal resistance of data carriers, Curie temperature for the magnetic layer of hard drives, resistance of NAND systems,
- solutions used in the chemical destruction of data carriers,
but also other methods of data destruction, both physical and software (e.g. overwriting).
Or maybe someone knows and uses some unusual or little-known data destruction methods?
How should the architecture of an effective computerised platform for detecting fakenews and other forms of disinformation on the internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies be designed?
The scale of the development of disinformation on the Internet including, among other things, fakenews has been growing in recent years mainly in social media. Disinformation is mainly developing on social media sites that are popular among young people, children and teenagers. The growing scale of disinformation is particularly socially damaging in view of the key objective of its pursuit by cybercriminals and certain organisations using, for example, the technique of publishing posts and banners using fake profiles of fictitious Internet users containing fakenews. The aim is to try to influence public opinion in society, to shape the general social awareness of citizens, to influence the assessment of the activities of specific policies of the government, national and/or international organisations, public or other institutions, to influence the ratings, credibility, reputation, recognition of specific institutions, companies, enterprises, their product and service offerings, individuals, etc., to influence the results of parliamentary, presidential and other elections, etc. In addition to this, the scale of cybercriminal activity and the improvement of cyber security techniques have also been growing in parallel on the Internet in recent years. Therefore, as part of improving techniques to reduce the scale of disinformation spread deliberately by specific national and/or international organisations, computerised platforms are being built to detect fake news and other forms of disinformation on the internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies. Since cybercriminals and organisations generating disinformation use new Industry 4.0 technologies in the creation of fake profiles on popular social networks, new information technologies, Industry 4.0, including but not limited to Big Data Analytics, artificial intelligence, deep learning, machine learning, etc., should also be used to reduce the scale of such harmful activities to citizens.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How should the architecture of an effective computerised platform for detecting factoids and other forms of disinformation on the Internet built using Big Data Analytics, artificial intelligence and other Industry 4.0 technologies be designed?
And what do you think about it?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best wishes,
Dariusz Prokopowicz

How will the rivalry between IT professionals operating on two sides of the barricade, i.e. in the sphere of cybercrime and cyber security, change after the implementation of generative artificial intelligence, Big Data Analytics and other technologies typical of the current fourth technological revolution?
Almost from the very beginning of the development of ICT, the rivalry between IT professionals operating on two sides of the barricade, i.e. in the sphere of cybercrime and cyber security, has been realized. In a situation where, within the framework of the technological progress that is taking place, on the one hand, a new technology emerges that facilitates the development of remote communication, digital transfer and processing of data then, on the other hand, the new technology is also used within the framework of hacking and/or cybercrime activities. Similarly, when the Internet appeared then on the one hand a new sphere of remote communication and digital data transfer was created. On the other hand, new techniques of hacking and cybercriminal activities were created, for which the Internet became a kind of perfect environment for development. Now, perhaps, the next stage of technological progress is taking place, consisting of the transition of the fourth into the fifth technological revolution and the development of 5.0 technology supported by the implementation of artificial neural networks based on artificial neural networks subjected to a process of deep learning constantly improved generative artificial intelligence technology. The development of generative artificial intelligence technology and its applications will significantly increase the efficiency of business processes, increase labor productivity in the manufacturing processes of companies and enterprises operating in many different sectors of the economy. Accordingly, after the implementation of generative artificial intelligence and also Big Data Analytics and other technologies typical of the current fourth technological revolution, the competition between IT professionals operating on two sides of the barricade, i.e., in the sphere of cybercrime and cybersecurity, will probably change. However, what will be the essence of these changes?
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How will the competition between IT professionals operating on the two sides of the barricade, i.e., in the sphere of cybercrime and cyber security, change after the implementation of generative artificial intelligence, Big Data Analytics and other technologies typical of the current fourth technological revolution?
How will the realm of cybercrime and cyber security change after the implementation of generative artificial intelligence?
What do you think about this topic?
What is your opinion on this issue?
Please answer,
I invite everyone to join the discussion,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me on the basis of my research.
In writing this text I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

This is because I am a PhD Information Technology Student majoring on Cyber security.
I am trying to formulate PhD Information Technology seminar topic under Cyber security.
I wish to formulate a PhD Information Technology Seminar Topic under Cyber security.
Hello everyone,
I would like to make a thorough investigation on the most promising simulation platforms for simulation and analysis of Cyber Attacks on Cyber Physical Energy Systems, along with the application of security solutions and their impact on performance.
To the best of my knowledge, a combination of two or more simulation/emulation tools might be required. E.g. a tool representing the cyber components (such as ns-2, Omnet++, Emulab) along with a tool representing the power grid physical components, (such as MATLAB).
Since investigation and proposals of the research community is still going on, hence the selection of the simulation platform(s) seems to be inconsistent among the researchers.
Through this question, I would request the research community of this field to share their knowledge and experience in this regard, with thanks.
There countries where digital electoral systems may be a subject to possible cyber threads. The idea of having e-Government and Digital Electoral Systems is very practical. It allows people to vote from anywhere remotely. The study shows that data collection, storage, processing and transmission may be subject possible Cyber Attack.
Digital transformation has ensured that cybersecurity is one of the biggest issues currently facing CIOs. In the future, cybersecurity is only going to become more of a priority as the business world becomes increasingly digital and cyber threats grow in number and in sophistication. But to succeed on cybersecurity, CIOs must prepare themselves for the developing threats and issues, and must develop a proactive people-centered strategy.
Source: How to use cybersecurity to generate business value
AI has advace applications. What its effective for strength or weaknesses the security in cyber.
I am looking for an opportunity to review Cyber Security papers for any Journal, or conference. Any recommendation will help me.
I want suggestions for a master's thesis in cyber security, I'm Interested in the security of cloud computing and also in detecting ransomware using machine learning, but I want more suggestions or som related to them
As Homomorphic Encryption schemes like CKKS are not capable of performing non-linear functions such as comparison, other PET techniques, including MPC can provide us with a level of security for a desired machine learning application.
Currently, I'm searching for the current related works that combine CKKS and, MPC; particularly 2PC function secret sharing. Every idea would be greatly appreciated!
Research Aim: Most data transmission is monitored by a firewall, which can also recognise and restrict undesirable traffic. The goal of this study is to highlight the potential features of a firewall while preventing cyber-attacks. The study aims to provide a detailed overview of the various categories of current and contemporary firewalls. The study uses a secondary research methodology to complete the research.
Hi all - I am looking for an opportunity to review and Data Science and Cyber security paper. Any recommendation will help me.
I am looking for research topic for my Phd which should be a combination of Cyber Security and ( Machine learning OR Deep Learning). Kindly assist with possible topic and objectives.
Thank you
Furthermore, how effective are the current prevention mechanisms in mitigating these threats?
I am a student from Umar Musa Yaradua University Katsina
from Computer Science Department.
I need someone who is going to teach me cyber security.
How can artificial intelligence help improve cyber security systems and techniques in online and mobile banking?
In recent years, technologies that play an important role in the field of Industry 4.0, technologies that determine the current fourth technological revolution, including machine learning technologies, deep learning and artificial intelligence are finding their way into improving cyber security systems. Financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies into specific areas of banking in order to increase process efficiency, economic efficiency, etc. Artificial intelligence is already being used by banks to improve remote communication processes with customers, in call centre departments as part of the creation of automated remote communication systems and digitised adviser avatars, in the process of managing credit risk and other risk categories, and also in the area of cyber-security.Therefore, opportunities are emerging for the application of artificial intelligence technologies in improving cyber-security techniques and systems in various areas of cyber-security in online and mobile banking, including issues such as:
1. improving cyber-security techniques to protect the information systems of financial institutions, including banks, from external cyber-attacks via email and ransomware viruses.
2. improving cybercrime risk management systems for integrated internal information systems connected to the Internet.
3. Improving cyber security techniques implemented through the implementation of new Industry 4.0 technologies, including artificial intelligence, machine learning, Blockchain, multi-criteria simulation models, etc., and advanced analytical techniques such as Big Data Analytics, Business Intelligence.
4. improving the anti-spam systems used to protect email inboxes in order to increase the filtering out of emails where cybercriminals use phishing techniques and/or send malware and ransomware viruses in the background of the email.
5. Improving cyber-security techniques for online and mobile banking systems with a particular focus on mobile banking implemented on the bank's customer side using smartphones equipped with specific operating systems and web applications.
6. Analysis of the level of effectiveness and cyber security for biometric techniques for encoding access to information systems as an important factor in cyber security.
7. perfecting cyber-security techniques in integrated, internal, intranet information systems operating in financial institutions, including commercial banks characterised by a complex organisational structure and companies forming interconnected business entities.
In view of the above, financial institutions, including commercial banks, are implementing a certain generation of artificial intelligence technologies in various areas of banking, including in the improvement of cyber-security techniques and systems.
In view of the above, I address the following question to the esteemed community of scientists and researchers:
How can artificial intelligence help improve cyber-security systems and techniques in online and mobile banking?
What do you think about this topic?
What is your opinion on this subject?
Please respond,
I have described the key issues of opportunities and threats to the development of artificial intelligence technology in my article below:
OPPORTUNITIES AND THREATS TO THE DEVELOPMENT OF ARTIFICIAL INTELLIGENCE APPLICATIONS AND THE NEED FOR NORMATIVE REGULATION OF THIS DEVELOPMENT
Please write what you think in this issue? Do you see rather threats or opportunities associated with the development of artificial intelligence technology?
I invite you to familiarize yourself with the issues described in the article given above and to scientific cooperation on these issues.
I invite you to scientific cooperation in this problematic.
Please write what you think in this problematics?
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz
The above text is entirely my own work written by me based on my research.
In writing this text, I did not use other sources or automatic text generation systems.
Copyright by Dariusz Prokopowicz

Right now, chatgpt is known by everyone. What we think about chatgpt + cyber security?
I need to understand what & how to choose sampling techniques I should pick to explore cryptography issues in cyber security domain.
These days VAS are playing important roles in mobile networks, so without their security nobody can rely on them. In these instances cryptography plays an important role in securing these issues. I want to know the best way to apply cryptography VAS. Also any references would be appreciated.
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
What you can suggest for me?
"Which topics do you recommend for computer engineering with a focus on cyber security and deep learning, or any other hot topics suitable for a PhD degree in computer and communication engineering?
I am in the early stages of my research and would appreciate any suggestions, including relevant papers. Additionally, I am seeking a co-supervisor to guide me throughout my research."
I am trying to make a dataset based on MITRE ATT&CK (https://attack.mitre.org/) website to create AI-based threat intelligence. However, I didn't find any automated tools or readymade datasets for it.
Is there any dataset based on the MITRE ATT&CK?
Thanks in advance.
This question is related to cyber security as we are receiving logs and flows as many times we are not able to capture usernames in many events.
The SCPS Lab (https://www.scpslab.org/) is hiring for two Ph.D. positions in the following areas:
- Federated Defense Against Adversarial Attacks in IIoT.
- Threat and Anomaly Detection for Cloud Security.
The required skills for potential graduate students include:
- Strong background in cyber security.
- Strong background in machine learning and data analytic techniques.
- Background in detection and estimation theory.
- Strong oral and written communication skills.
To apply, please contact Dr. Hadis Karimipour (hadis.karimipour@ucalgary.ca) with your most recent C.V. and a list of two references.
Can 'e' be the set of all relatively prime numbers from 1 till the phi(n)?
Cyberthreats are more imminent and dangerous than ever in terms of their persistence and severity. The volume keeps growing too, with the number of breaches rising 15.1% from 2020 to 2021. The costs per breach are also increasing–jumping 24.5% during the same period. A recent ThoughtLab study revealed the top cybersecurity challenges that are top-of-mind for IT leaders.
sources:
1) Automation answers for cybersecurity challenges - ServiceNow
2) New Special Issue Title Cyber Security for IT Systems, in Journal - pplied Sciences (ISSN 2076-3417)
With most enterprise resources being hosted on the cloud, users tend not to be very aware of online security etiquette. This leaves the organisation's resources vulnerable to adversary attacks.
Who should be responsible for the total all-round awareness, implementation and enforcement of resource security? Is it the service providers, the clients or both?
please guide me about my MS research?how i work start from start
Will green cryptocurrencies be created with which new, pro-environmental and pro-climate, green economic ventures will be financed?
Is this a purely futurological vision or is it already feasible?
Green cryptocurrencies should be developed according to new eco-innovative technologies, so that their creation, digging will use much less electricity than today. Currently, digging cryptocurrencies still uses as much energy as a medium-sized country on a global scale. The issue of saving electricity consumption is particularly relevant in the context of the current energy crisis and, in the future, also in the context of a multi-year developing climate crisis. Therefore, green cryptocurrencies, which will be used to finance new pro-environmental and pro-climate green business ventures, should also be created using many times less electricity than at present in order to be green in themselves.
In what direction will the development of green cryptocurrencies develop? Will green cryptocurrencies be used to finance new pro-environmental and pro-climate green business ventures or will green cryptocurrencies be cryptocurrencies that are mined using significantly less electricity than at present?
Or perhaps both? This would be best for the environment, the climate and the planet's biosphere.
In view of the above, I address the following questions to the esteemed community of researchers and scientists:
Will green cryptocurrencies be created with which to finance new environmentally and climate-friendly green economic ventures?
What do you think about this topic?
What is your opinion on this subject?
Please respond,
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz Prokopowicz

I am working on cyber security domain. Currently, the work is to trace out the real ip address behind the VPN.
1. Is there any technique or api to trace out the real ip address which is masked with VPN?
2. How to determine whether the input ip address is original/proxy/vpn without any api support?
Researchers, Kindly provide the suggestion for the above questions.
#cybersecurity #vpn #proxy #networksecurity #researcher
I'm thinking about doing academic project on Intrusion detection and prevention system on cloud computing. I also want to know how it can be successfuly conducted. Anyone having ideas on this topic would be much appreciated.
Looking for academicians and industry people to collaborate on Artificial intelligence, Machine Learning, Data Science, Cyber Security and Robotics for new peer reviewed Journals. If interested to join as Editorial board members or contribute as authors please message me or mail to rwinston@imanagerpublications.com
#academia #academicpublishing #industry #artificialintelligence #machinelearning #datascience #cybersecurity #Robotics
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)

Does anyone know about some good journal that will publish e-banking and cyberthreat related papers?
Please suggest to me a good topic for my PhD relevant to Cyber security
Hi all,
I am looking for well analyzed case studies of cyber security incidents within the transportation sector. It can include rail, aeronautical or even motor vehicles.
Thank you,
Cobus Pool
I am currently undertaking a computer science with cyber security MSc and have been trying to find topics of study for the independent research project which would be interesting to me and I am struggling and am looking for a pointer in the right direction.
I would like to undertake something that is in some way practical in nature to keep it interesting, and the topic has to include some elements of security.
My interests through work are mainly developing serverless applications on AWS and event driven applications and cloud computing but I am really struggling to find something that is both interesting and isn't purely research based and theoretical.
Any pointers would be gratefully received, I still have another four months until I need to write the project proposal but I have already been trying to find something that sparks my interest for the last month or two with little success.
Dear Researchers,
I'm a student on Ph.D. studies at the University of Ljubljana, and I work on research for detecting APT attacks, but in the early stages of the attack, when attackers mostly use social engineering methods and human vector attacks to infiltrate in some system. Our focus is the Cloud environment and detecting the attacks in the Cloud environment. One of the essential parts of this research is aggregating data from logs and cloud metrics in daily format and data in the form used to detect the attacks.
The problem with this approach is that it requires logs and Cloud metrics collected during a more extended period (at least one year). Still, all publicly available datasets contain data collected in 10 to 15 days.
To you know, how could I find a Cloud project (real project or project in a sandbox environment) from which I could retrieve logs and metrics of hosts deployed on the system (virtual machines, containers, serverless functions, ...), network logs and metrics, and logs of IAM?
Thank you in advance for your time and consideration.
Yours Respectfully,
According to IBM Security X-Force (2021), server access was the third most common attack type in 2020. Nearly 36% of the server access attacks X-Force Incident Response observed in 2020 targeted the finance and insurance sector, with business services (14%), manufacturing (7%), and healthcare (7%) also getting hard hit.
The threats of server access attacks do not seem to go away or rather slow down, BUT they seem to get more complicated.
Are the current mitigation techniques for preventing server access attacks well-designed?
Besides that, Do you think adopting the Zero Trust security strategy will prevent this phenomenon? According to your experience. What are your thoughts on the matter?
COVID-19 has had a significant impact on the educational sector, resulting in a shift from face-to-face to a decentralized learning environment, creating a unique opportunity for network-based academic dishonesty. Prior research has shown that during the COVID-19 pandemic, students engaged in network-based academic dishonesty as a consequence of the breach of weak and legacy software programs that monitor network-based academic dishonesty.
Are the current mitigation techniques for preventing network-based academic dishonesty well-designed? What are your thoughts on the matter?
Distributed denial of service attacks(DDoS)
According to a survey conducted by Sophos, 2020 was a tough year for education, with the sector experiencing the highest level of ransomware attacks of all industries. Ransomware attacks have been on the top list of dangerous threats to information systems for over a decade. The threats of ransomware attack do not seem to go away or rather slow down BUT seems to get more complicated.
Are the current mitigation techniques well designed to prevent the attacks? What are your thoughts?
Will cybercrime in the coming years affect hacker attacks aimed at technology devices of the Internet of Things?
Will cybercrime in the future mainly concern the technology of the Internet of Things?
Will the improvement of the risk management process of the Internet information transfer in the future concern mobile devices and Internet of Things technology?
Is the online mobile banking currently offered mainly on smartphones also extended to other devices functioning as part of the Internet of Things technology?
Please reply
I invite you to discussion and scientific cooperation
Dear Friends and Colleagues of RG
I described the problem of cybercrime in publications:
I invite you to discussion and cooperation.
Best wishes

Kindly give inputs and guide me . Thank you , Respected RG members .
Which Q1 and Q2 research journal of computer science and cybersecurity area journal are most suitable for speedy review and publication process preferably not the paid journal?
Appropriate datasets for cyber security.
In my opinion, the information posted on social media portals are not 100 percent. safe.
There have been cases of hacking and stealing information from thousands of records, user profiles of these portals.
In addition, there are developed techniques for building programs that read information from commentators entered into thousands of profiles of social media portals.
Then this information is a research material for the sentiment analyzes carried out, i.e. analyzes of opinions prevailing among users of these portals on specific companies, brands, products and services.
Do you agree with my opinion?
Please reply
Best wishes

Hello!
I’m Jonathan, an MSc student studying Cyber Security at Edge Hill University. As part of my project thesis, I’m conducting a short questionnaire on small and medium enterprise cyber security and, in particular, the opinions of professional individuals on the topic of vulnerability assessment and penetration testing as a way of securing IT infrastructure. The survey also details some features of the project, including the active design and development of an autonomous VAPT tool for SMEs.
Your help on providing answers and opinions is greatly appreciated and will deliver a fundamental basis for my research. Permission is also granted if you wish to notify others that may be interested in the project.
If you wish to contribute, you can do so using this link: https://vaptian.com/go/survey. The survey is hosted by Qualtrics.
The survey is entirely optional, and all data collected is anonymous. You can terminate your participation at any time for any reason.
Thank you in advance.
The increasing energy demand and the necessity to reduce CO2 emissions are worldwide problems. This motivates the increasingly "green" choices, in order to reduce the anthropogenic environmental impact, made by companies and governments of many countries in the world. Nonetheless, among the clean energy options currently available on the world market, only nuclear power can provide constant energy, regardless of weather or geological conditions, making nuclear one of the most promising low-carbon energy options. However, the nuclear fission reactors are characterized by the formation of radioactive waste, and this problem can be partially solved through the spent fuel reprocessing.
"In its 2020 edition of Energy, Electricity and Nuclear Power Estimates for the Period up to 2050, the International Atomic Energy Agency's (IAEA's) high case projection has global nuclear generating capacity increasing from 392 GWe in 2019 to 475 GWe by 2030, 622 by 2040 and 715 by 2050".
The main points that can then be discussed:
- total installation costs and the time to build a nuclear power plant;
- long-term profitability and maintenance costs;
- storage of the last waste ;
- research on spent fuel recycling optimization and next-generation reactors;
- industrial and cyber security;
- deep prejudices in many countries due to singular accidents;
- nuclear fusion possibility.