Science topic

Cybersecurity - Science topic

Explore the latest questions and answers in Cybersecurity, and find Cybersecurity experts.
Questions related to Cybersecurity
  • asked a question related to Cybersecurity
Question
4 answers
I am looking for research results on why cybersecurity implementations fail within an operational technology or cyber physical system environment. There are a lot of companies highlighting "problems" with implementations and promoting how their solutions would solve these problems, but I would like to know whether there is credible research available on this issue.
Thank you
Relevant answer
Answer
There will never be an end to cyber attacks and cyber security as long as cybersecurity is reactive and cyber attackers proactive. Since they are always a few steps ahead. They create viruses. They come up with solutions. As long as there is more than one user of the security system, it will always be vulnerable to cyber attacks.
There Gartner et al: (2020) Secure Access Service Edge (SASE) Forecast, confirms that SASE may be the answer. Introduced by Gartner, Secure Access Service Edge (SASE) is a forward-thinking framework in which networking and security functions converge into a single integrated service that works at the cloud edge to deliver performance and protection. Their statement answers the critical question on How can you ensure efficient and secure network access as your business evolves?
  • asked a question related to Cybersecurity
Question
7 answers
I am looking for a research topic for my Master's thesis in cybersecurity, kindly assist with possible issues and objectives.
Implementing machine learning in cybersecurity will be preferred.
Thank you all
Relevant answer
Answer
5 November MMXXII
The Bell Curve...
Cordially...
ASJ
  • asked a question related to Cybersecurity
Question
2 answers
It's a clustering of cybersecurity dataset containing 10000 samples. The elbow plot shows 4 optimal cluster. Can I consider this Silhouette Score as indication of a good K-medoids clustering?
Relevant answer
Answer
Thanks for your response.
I've found in some articles that silhouette analysis or score is also used for cluster evaluation or validation, I used elbow method to find the optimal number of clusters and then trying to evaluate with silhouette analysis or score. But I don't understand if my clustering is good enough or not according to this silhouette score.
I have attached the elbow & silhouette plot.
Please suggest me some cluster evaluation methods.
Regards,
Nurun
  • asked a question related to Cybersecurity
Question
4 answers
Hello,
I chose this topic for my thesis "Improving cybersecurity systems of apps installed on smartphones running in a Cloud computing environment by applying Industry 4.0 technologies."
I had a discussion with my lecturer regarding the topic he said Since in industry 4.0 and cloud computing is so wide I have to narrow down this topic and be specific with it.
How could I be specific with the topic? Any suggestions?
Relevant answer
Answer
  • asked a question related to Cybersecurity
Question
6 answers
Recently, I have started teaching Information Security aka Cybersecurity course at my university. I'm covering most the contents from the following books:
[1] Charles P., Shari P., Jonathon M., Security in Computing, 5th Edition.
[2] William Stallings, Cryptography and Network Security: Principles and Practice, 7th Edition.
However, these books are focused on academic perspective. I'm searching such a book which has covered academy as well as research, mentioned recent advancement in Cybersecurity. You can also tell about courses or websites contain good resources. Thanks in advanced.
Regard-
Md. Sabir Hossain
Faculty Member, Dept. of CSE, CUET
Initiator, Be Researcher BD (BRBD)
Relevant answer
Answer
i found many useful insights and will be waiting for more . Thank you
  • asked a question related to Cybersecurity
Question
3 answers
I have been working primarily on machine learning algorithms, but recently I found privacy-preserving AI interesting. I would like to understand Homomorphic Encryption as one cybersecurity method in detail. I would appreciate any help regarding available resources.
Relevant answer
Answer
Dear Shokofeh Vahidiansadegh,
Info presented below may be helpful:
Can Homomorphic Encryption be Practical?
_____
Homomorphic Encryption for Beginners: A Practical Guide (Part 1)
_____
Somewhat Practical Fully Homomorphic Encryption?
_____
  • asked a question related to Cybersecurity
Question
3 answers
Does anyone know of a Cybersecurity academic book publisher that is relatively fast toward publication? My research partner and myself have written a book, and we are looking to publish it as soon as possible. Any recommendations or suggestions would be greatly appreciated!
Relevant answer
Answer
Dear Joseph Brickley
You may want to review the following info below:
Information Sharing in Cybersecurity: A Review
_____
_____
Which Publishing Path is Best for YOU & Your Unique Author Needs?
  • asked a question related to Cybersecurity
Question
5 answers
I have the impression that cybersecurity is already obsolete for academic purposes. It's an impression made after a year looking for postdoctoral opportunities in the area. It just seems like there are only openings for AI and a tiny fraction for crypto. And even less for other aspects of cybersecurity. Like a wave it seems that cybersecurity has gone from a point where it didn't matter to anyone, has reached the top in the last decade and is already digging a hole in the ground.
  • asked a question related to Cybersecurity
Question
8 answers
The economical and social dependency on the ICT has increased the necessity of safer procedures and operations, using communication tools and computer related technologies . But at the same time, the number of cyber attacks or, simpler, the possibility of malfunctioning, is rising.
Given the complexity of mentioned tasks: is AI the only, or at least the main, tool for dealing with the preservation of normal behaviour of Internet and other related technologies?
  • asked a question related to Cybersecurity
Question
6 answers
Dear ResearchGate members,
My name is Txema Romero. I live and work in Barcelona (Europe).
I am interested in implementing cybersecurity measures in the railway sector.
I would like to write a technical report about how to apply cybersecurity to the railway sector. It would be a review of the different tools and how to apply them (e.g, for ethical hacking, risk analysis of different sub-systems, risk mitigation action plans, cybersecurity design directives, etc.).
Could you please share with me any information in this line?
Thank you. Have a nice rest of the week.
Regards,
  • asked a question related to Cybersecurity
Question
3 answers
I am offering M.Sc. Cybersecurity and Digital Forensics, any help on thesis topics
Relevant answer
Answer
Dear Albert,
As part of the issues of cybersecurity and digital forensics, I propose the following topic for the thesis: Analysis of the impact of the increase in the development of e-commerce, e-banking, e-logistics, e-government, etc. recorded during the SARS-CoV-2 (Covid-19) coronavirus pandemic. on the development of cybercrime, including the development of specific techniques of cybercriminal practice, such as the development of various forms of fake mailing, phishing techniques, sending malware and ransomware viruses in e-mails. I described the key determinants of this issue in several of my publications on this Research Gate portal. I invite you to cooperate on this issue.
Best regards,
Dariusz
  • asked a question related to Cybersecurity
Question
5 answers
The typical information/cybersecurity specialist seems to be overworked and this is especially true in the OT/industrial environment where there are even fewer qualified people available. Are there any guidelines or suggestions on what is a reasonable amount of people to dedicate to cybersecurity in general and maybe more specific to the industrial/OT environment?
Relevant answer
Answer
Dear Cobus Pool,
One more important document:
  • asked a question related to Cybersecurity
Question
6 answers
There is a growing demand and recommendations for corporate boardroom to improve cybersecurity policy and governance. One of the top recommendations was the inclusion of cybersecurity experts at the C-level for boardroom leverage and mitigations implementation. There are contentions on the inclusion of cybersecurity professional as a qualifier for the boardroom.
Relevant answer
Answer
Dear Wazee Logunleko,
You may want to look at some additional info:
A cybersecurity committee is often tasked with overseeing the development and implementation of an organization's cybersecurity policy, laying out the standards to which employees must adhere to mitigate the company's vulnerability.
  • asked a question related to Cybersecurity
Question
4 answers
We are in the process of editing a book titled 'Artificial Intelligence and Cybersecurity: Advances and Innovations', by CRC Press, Taylor and Francis Group. Interested authors are requested to submit good quality chapters for the upcoming book.
Relevant answer
Answer
I hope this proposal is no more available
  • asked a question related to Cybersecurity
Question
6 answers
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical challenges for governments and private sectors. Researchers could diversify the available Cyber Security frameworks to serve as a strategy to accommodate various pedagogical missions and guidelines for academic institutionalised policies and procedures for designing and assessing cybersecurity awareness. How could the framework be diversified to benefit pedagogical best fit?
Relevant answer
Answer
The following RG link is also very useful:
  • asked a question related to Cybersecurity
Question
13 answers
Please I need any suggests on PhD Dissertation topics around Cybersecurity/Privacy/AI and Cloud.
Relevant answer
Answer
Federated learning IoT applications is very challenging due to computational issues. This can be a very good research topic for PhD. I have attached an article regarding this.
  • asked a question related to Cybersecurity
Question
9 answers
The ethics of Artificial Intelligence (AI)
There are many discussions about ethics of AI and core principles to keep AI ethical. For you as scientist and researcher, what are key principles to keep AI ethical?
Relevant answer
Answer
Dear Haseeb Javed thank you for your attention.
  • asked a question related to Cybersecurity
Question
13 answers
The COVID-19 crisis which started as a health crisis is now a combination of demand-side and supply-side shocks that risk of becoming a long-standing economic crisis. COVID-19 has generated significant instability and high volatility in global capital markets. Today, the full impact of this virus has not yet been assessed and it is expected that the adverse effects of COVID-19 are likely to continue. What areas of the overall banking and financial secor, including valuation and profitability, are likely to be impacted? All of the following must be reexamined: results from operatons; liquidity; capital resources; possibility of a global recession; workforce shrinking; reduction in productivity; decrease in consumer confidence leading to a reduction in consumption; supply chain disruptions; difficulties with funding; limited information to make good decisions; implications for taxes, trade, and immigration; cybersecurity risks; fraud risks; and privacy risks. Q.E.D.
Relevant answer
Answer
Dear Mr. Doffou!
You raised a relevant topic to consider. The answer is case (country) - and context (regional agreements such as the ones in the EU) dependent one:
1) Nigmonov, A., Shams, S. COVID-19 pandemic risk and probability of loan default: evidence from marketplace lending market. Financ Innov 7, 83 (2021). https://doi.org/10.1186/s40854-021-00300-x Open access:
2) Mathieu Simoens, Rudi Vander Vennet 2022. Does diversification protect European banks’ market valuations in a pandemic?, Finance Research Letters, Volume 44, January 2022, Available at: https://www.sciencedirect.com/science/article/abs/pii/S1544612321001744
Yours sincerely, Bulcsu Szekely
  • asked a question related to Cybersecurity
Question
7 answers
I have interests in cybersecurity impact on social engineering and also cyberattacks and the use of MFA/Behavioural biometrics (e.g. Location, screen angle, etc.) to limit fraudulent transactions. Any suggestions/guidance will be very much appreciated
Relevant answer
Answer
During the SARS-CoV-2 (Covid-19) coronavirus pandemic, the scale of development of e-commerce, remote internet communication, internet payments and settlements, internet and mobile banking, e-business, e-learning, e-logistics, etc. has increased. the online environment in which cybercrime is developing has increased in scale. Therefore, the importance of the issue of improving cybersecurity techniques and instruments is also growing. In view of the above, I propose the following research topic for my thesis: Analysis of the increase in the scale of cybercrime during the SARS-CoV-2 (Covid-19) coronavirus pandemic. In this topic, it is possible to investigate the key determinants of the increase in the scale of cybercrime and to diagnose the types of cybercriminal techniques and types of computer viruses, malware etc. that were most developed by cybercriminals during the pandemic. As part of this issue, it is also possible to study cybersecurity techniques and instruments that were developed during the pandemic.
Best wishes,
Dariusz
  • asked a question related to Cybersecurity
Question
6 answers
Actually, I am looking for a research topic for my M.Sc.in thesis.
  • Would you like to specify some projects or journals that are based on ML/Deep Learning Algorithms implemented cybersecurity datasets?
  • Suggest some papers link that might be helpful to gather appropriate knowledge about this area.
Thank you...
Relevant answer
Answer
  • asked a question related to Cybersecurity
Question
10 answers
Please share me your thoughts, ideas & resources on Cybersecurity Awareness models that can be deployed in Organizations of a third world country, I am looking forward to develop a model with my Thesis.
Relevant answer
Answer
You are most welcome dear Nipuna Sankalpa
Wish you the best always.
  • asked a question related to Cybersecurity
Question
3 answers
Hi everybody :)
I am looking for a topic dissertation for my Cybersecurity MSc.
In the last period I got interested about 5G cybersecurity, with Core, RAN and O-RAN threats.
I want to ask if anyone has a interesting idea to develop that could became an interesting experimental/project thesis about cybersecurity aspects (penetration testing, security assessment) on these fields, and not just a survey.
Thank you anyone for your inputs!
Relevant answer
Answer
Deep Learning and SDN -based for cyber-attack detection and mitigation on 5G networks
  • asked a question related to Cybersecurity
Question
6 answers
Is there any quantitative research that indicates whether insider or outsider-initiated cybersecurity events are more destructive? Or does the research, if it exists, show that there is no real difference between the two. I suspect the latter, but cannot find a definitive answer.
Relevant answer
Answer
  • asked a question related to Cybersecurity
Question
54 answers
Which Q1 and Q2 research journal of computer science and cybersecurity area journal are most suitable for speedy review and publication process preferably not the paid journal?
Relevant answer
Answer
Check this list.
Deleted research item The research item mentioned here has been deleted
  • asked a question related to Cybersecurity
Question
26 answers
I am currently choosing a topic for my PhD thesis and I have 2 topic ideas but I am a little confused on which shall I proceed with and which topic would be useful and relevant.
One is regarding incorporating AI in cybersecurity and another idea is to do on something related to Mobile App Development (Hybrid app development (security & management), Low code - No code, or using AI for mobile app development).
Are there any other hot topics that I can look into, please do suggest. Thank you so much for your time.
Would really appreciate your thoughts on this :)
Relevant answer
Answer
You are interested in AI and Cyber Security, which are both wide, Cyber Security wider and not disjoint. The presented related topic, therefore, appears rather wide. A topic should be focused on solving identified existing deficiencies. Identify certain problems in an area of cyber security that an area of AI would address properly in a new way. Your supervisors would be of better help.
  • asked a question related to Cybersecurity
Question
22 answers
Should we write a book focused on risk management to address contemporary organizational threats?
What about popular International topics such as cybersecurity warfare, ransom attacks, data breaches, internet espionage, electronic theft and disasters (including terrorism, pandemics, or digital sabotage)?
Is there a sufficient knowledge gap, market demand and practitioner interest to write a case study collection or protocol best-practice explanation about future global risk management?
Would it help the worldwide scientific practitioners, policy writers and decision makers if we discussed contemporary applications of using protocols like cyber kill, F3AID, TIQ-TEST or basic contingency planning?
What should we do next to write this book?
Ken
#research
#risk
#cyber
#bookdesign
#writers
Relevant answer
Answer
Kindly visit..
Strang, K.D., Vajjhala, N.R., & Korstanje, M. E. (2018). Global Risk and Contingency Management Overview. In K.D. Strang & M. E. Korstanje & N.R. Vajjhala (Eds.), Research, Practices, and Innovations in Global Risk and Contingency Management (pp. xxii-xxxix). PA: IGI-Global.
  • asked a question related to Cybersecurity
Question
6 answers
Hi,
I am student of Msc Cybersecurity and I am getting confused what to do for my masters project. Please suggest me some easy project ideas for my master project.
TIA
Relevant answer
Answer
My focus is on hospital cybersecurity issues. Go to the Panacea Project website at Panacearesearch.eu, or visit the websites of CUREX or SPHINX, all Eu Horizon 2020 projects and you will find many ideas for your project, from biometrics for identification, to technical and non technical tools for hospital cybersecurity. All the addresses and contacts are there.
Good luck
Sabina Magalini
  • asked a question related to Cybersecurity
Question
6 answers
How can future Cybersecurity strategies be refined to address the growing sophistication of post-COVID cyber-attacks on individual and corporate cyberspace assets?
Relevant answer
Answer
In response to the restrictions imposed on industries and service sectors, the size of e-commerce growth has risen, as has the development of e-logistics, electronic payments and online settlements, internet and mobile banking, and other related services and technologies. The children are using mobile phones and other devices that are connected to the internet, which may need the implementation of extra security measures in order to safeguard the credentials of the parents. A robust cybersecurity strategy may help an organization or user maintain a strong security posture against hostile assaults that are intended to gain access to, change, delete, destroy, or extort sensitive data from their systems or those of other users.
Regards
Tanvinur Rahman Siam
  • asked a question related to Cybersecurity
Question
12 answers
Hello I am looking for ideas for my final year project in the cyber security field. I am mostly interested in something in Networking, computer forensics, or blockchain technologies.
Relevant answer
Answer
I propose a topic: Analysis of the possibility of using Blockchain technology to improve the level of cybersecurity of online banking and reduce the risk of cybercrime developing thanks to the use of ransomware viruses.
Best wishes,
Dariusz Prokopowicz
  • asked a question related to Cybersecurity
Question
3 answers
Greetings! I am interested in open-data locations on the web related to cybersecurity or cybercrime attacks recorded over the past 1-3 years, and the location of those attacked?
Relevant answer
Answer
Not sure if it is useful for you.
There are quite a number of datasets listed here:
  • asked a question related to Cybersecurity
Question
3 answers
Greetings! I'm interested in learning which Criminal Justice peer-review journals exist that focus exclusively on Cybersecurity and Cybercrime. If anyone can recommend valuable sources, that would be very helpful.
  • asked a question related to Cybersecurity
Question
8 answers
I am working on cloud computing and cybersecurity projects, and want to have some recommendations on what are the reputable journals that publish cloud computing and cybersecurity related topics.
Relevant answer
Answer
Good day. The International Cloud Security Alliance (CSA) provides an avenue for cloud security practitioners to publish, via their peer review process. The CSA provides many of the important guidelines that can be followed for properly acquiring or implementing cloud solutions. https://cloudsecurityalliance.org/research/artifacts/
  • asked a question related to Cybersecurity
Question
4 answers
Searching for a IoT medical devices network dataset for intrusion detection purposes with ML.
Relevant answer
Answer
You can use this intrusion dataset. . It is generic and can fit any IIoT and IoT system.
(PDF) X-IIoTID: A Connectivity-and Device-agnostic Intrusion Dataset for Industrial Internet of Things (researchgate.net)
  • asked a question related to Cybersecurity
Question
18 answers
Hi I'm a student. I would like to propose a topic for a phd thesis in cybersecurity. your ideas will be welcome.
Relevant answer
Answer
go to fsi journal and read a new research
  • asked a question related to Cybersecurity
Question
5 answers
Second International Conference on Advances in Cybersecurity (ACeS 2020) -- Springer Publisher
The proceedings of the of ACeS 2019 has been published in CCIS Proceedings by Springer Singapore. The book can be found at https://www.springer.com/gp/book/9789811526923
It is our pleasure to invite you to submit your paper to the Second International Conference on Advances in Cybersecurity (ACeS 2020). The conference is organized by National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia and will be held at Setia SPICE Convention Centre, Penang, Malaysia from 13 to 15 September 2020.
Online presentations will be provided for international participants.
All accepted papers will be published in Springer's Communications in Computer and Information Science (CCIS) series and submitted to ISI for inclusion. CCIS is indexed in Scopus and ISI.
Cyber security has always been a challenge as attackers and hackers keep finding new ways to carry out cyber-attacks and cybercrime. Although this is an established research domain, there is a need for researchers to explore and find solutions to combat new and emerging threats and vulnerabilities. The focus of this conference will be two-fold:
1. Existing and established areas: Even with so many years of research and solutions contributed, there is still a sharp rise in cyber-threats. This includes DDoS attacks, data theft, social engineering attacks, etc.
2. New and emerging areas: New domains such as the Internet of Things (IoT), Industry 4.0, Blockchain, cloud & edge computing has brought upon new security challenges and opportunities. In addition, the advancement in Machine Learning and Artificial Intelligence incorporated with Big Data allows new techniques and approaches by improving real-time threat and vulnerability analytics.
This conference provides a platform for researchers in the area of Cyber security and related areas to share their findings and solutions. Experts are expected to give keynotes on various topics in Cyber security.
ACeS 2020 is co-located with WCIT 2020. WCIT 2020 is the 24th edition of World Congress on Information Technology and it returns to Malaysia, the gateway to Southeast Asia with 4,000 visionaries, captains of industry, government leaders and academics that span across 100 countries.
Participants of ACeS 2020 have the opportunity to gain full access (worth USD 1,200) to WCIT 2020 with an additional fee of USD300.
Conference Link: https://www.aces.usm.my/
Important Dates
Submission due : April 15, 2020
Acceptance notification : July 15,2020
Camera Ready Deadline: July 30, 2020
Early Bird Registration : August 15, 2020
Standard Registration : August 31, 2020
We cordially invite you to participate in the conference and attend the various events.
For general enquiries, please contact: aces@usm.my or Whatsapp: +60175248245
We look forward to seeing you at ACeS 2020.
Thank you.
Faithfully,
ACeS 2020 Chairs
International Conference on Advances in Cybersecurity 2020
Relevant answer
Answer
i can help
Dr. MOHAMMAD FAISAL currently working at the department of computer science and IT, University of Malakand Pakistan, received his M.S. degree in information security management from SZABIST, Pakistan, in 2012, and the Ph.D. degree in network security from the Department of Computer Science and Information Technology, University of Malakand in 2018. His research interests include ML and security of wireless ad hoc networks MANETs, VANETs, IoT, Cloud, Fog, Edge, Blockchain and digital forensics.
  • asked a question related to Cybersecurity
Question
5 answers
Hello,
Does anyone have a list of Scopus/SCI-indexed journals with rapid publication and low publication charges in the field of computer security or computer science engineering?
Thank You
Relevant answer
Answer
I think your suggestion is a dangerous one. I strongly think that ARDA Conference is a questionable company (https://www.ardaconference.com/ ) they are not mentioned positively in http://eusa-riddled.blogspot.com/2018/12/futurological-congress.html
If you go to: https://www.ardaconference.com/journals-publication.phpthey mention a list of (mostly) questionable suggestions, see for example:
Linguistica Antverpiensia https://www.scopus.com/sourceid/5800207685a journal with hijacked version issues see https://www.researchgate.net/post/Hijacked_journals_in_Scopus
Systematic Reviews in Pharmacy https://www.scopus.com/sourceid/19700201140in the meantime discontinued
In my reply of March 22nd in the following question https://www.researchgate.net/post/How_can_i_know_about_fake_and_authentic_of_journalthey had another list of highly suspicious titles.
In other words, they use journals with issues and lure potential victims who are under the impression that they can publish in a (safe) Scopus indexed journal. Not even mentioning the construction that you can submit your paper ‘through’ them, I see no normal procedure in this (and suspect that they charge you for this at some point).
So, in conclusion I would say stay away from this one. Use the Scopus source list you can find here: For those interested I included the latest list with titles, discontinued titles etc. (see enclosed file).
Best regards.
  • asked a question related to Cybersecurity
Question
17 answers
Hi, I am looking forward for collaborators (academic and research work) who are interested to work in the following area:
Quantum Attacks
Quantum Computing
Quantum Artificial Intelligence
Post-quantum Cryptography
Internet of Drones
Blockchain and Quantum Computing
Relevant answer
Answer
Hello Sir,
I am interested in the suggested topics. My domain is cloud computing security using cryptographic techniques. I have few publications in this domain. Please have a look.
Regards
  • asked a question related to Cybersecurity
Question
1 answer
We are conducting a short survey (< 10 minutes) to get a better understanding of the #cybersecurity implications due to the automation and digitalization of the Architecture, Engineering, Construction, and Operations
#AECO) industry.
Please participate here: https://lnkd.in/gJ4BJBh
Thanking you in advance for your time and consideration.
#aecindustry
#cybersecurity
#digitalconstruction
#BIM
#constructionautomation
#constructiontechnology
Relevant answer
Answer
ok
  • asked a question related to Cybersecurity
Question
10 answers
I am looking for a research topic for my thesis relevant to Digital twin & Cybersecurity, Please give me your suggestions
Relevant answer
Answer
  • asked a question related to Cybersecurity
Question
24 answers
Greetings fellow researchers,
I am currently pursuing my MS in Information Security. My favourite area of research is cybersecurity>cybercrimes (probably something related to ethical hacking, digital forensics, etc.). I need your help to find a suitable topic for research (for the purpose of thesis). Please guide me accordingly. Thanking you in advance.
Relevant answer
Answer
In the field of cybersecurity, I propose the following research topic: Analysis of the determinants of the increase in the risk of cybercriminal attacks on state administration institutions and corporations, enterprises, key public institutions, banks, etc., where ransomware viruses and malicious software distributed via e-mail are used.
Best regards,
Dariusz Prokopowicz
  • asked a question related to Cybersecurity
Question
6 answers
I need cybersecurity datasets for training machine learning algorithms, they could be for:
- intrusion detection
- DDoS detection
- Malware detection
- etc.
Relevant answer
Answer
1) Digital Image Forensics: Image Manipulation or forgery detection.
2) Deep fakes: There are lots of datasets in kaggle and github
  • asked a question related to Cybersecurity
Question
4 answers
The best simulator that can aid the design of a Bayesian Neural Network model.
Relevant answer
Answer
hi, you can find Bayesian machine learning models in python library scikit-learn https://scikit-learn.org/stable/modules/naive_bayes.html
  • asked a question related to Cybersecurity
Question
6 answers
Merging of Datasets for Optimal Machine Learning Solutions.
Relevant answer
Answer
I don't think so
I agree with the opinion of prof Arturo Geigel
  • asked a question related to Cybersecurity
Question
5 answers
Are there any law regulating cybersecurity in medical devices?
Relevant answer
Answer
In Poland it could be a pure hacking and additionaly it might be qualified as causing direct danger to health or life. Besides, data protection regulations may be applied.
  • asked a question related to Cybersecurity
Question
4 answers
Can anyone suggest payment based fast track sure publication in computer science or cybersecurity SJR or JCR journals?
Relevant answer
Answer
Many thanks
  • asked a question related to Cybersecurity
Question
3 answers
I would like to know what are the cybersecurity applications that depend on CVSS score to establish a defense mechanism for example or to determine the best action the defender may take.
I know one application is moving target defense, but I'm wondering if there are any others?
Relevant answer
  • asked a question related to Cybersecurity
Question
13 answers
There is consensus on the principle that cybersecurity can better be achieved through transnational cooperation rather every country or block on its own. Yet, the work undertaken under the auspices of the United Nations, namely under the General Assembly, is progressing at a very slow pace. I recently published a research article on that ongoing work at the UN in the field of cybersecurity, available at : . It confirms that progress is slow, so this raises a few questions. What is needed to improve multilateral cooperation on cybersecurity? Are there some specific topics of cybersecurity that should be prioritized in the multilateral arenas? What format (binding, non-binding, information sharing, confidence-building) should the expected deliverables have?
Relevant answer
Answer
thanks for your valuable question
  • asked a question related to Cybersecurity
Question
20 answers
With emerging technologies, the availability of data at every point of customer interaction has increased. Consequently, the need to monitor and secure the data has increased. With data being gathered, monitored, and analyzed at incredible speed, AI applications in cybersecurity play a pivotal role in data security, accuracy, prevention of misuse. Experts believe that Artificial Intelligence has both negative and positive effects on cybersecurity. AI algorithms use training data to learn how to respond to different situations.
Some examples of AI in cybersecurity have been known. Darktrace also uses A.I to develop its cybersecurity products such as Antigena, a powerful AI-based cybersecurity product for incident response and protection of data and infrastructure. Ipreo also uses the Enterprise Immune System to identify threats across the digital network from cloud services to industrial control systems. The product uses AI to monitor users and devices, and workflows to understand behavior across the digital environment making sure the organization is safe from ransomware. 
Relevant answer
Answer
  • Normally AI Detects malicious activities and stops cyber attacks. And It Analyzes mobile endpoints for cyber threats – Google is already using AI in machine learning for the same, it will improve human analysis from malicious attack detection to endpoint protection.. in our work we uses in automating mundane security tasks
  • asked a question related to Cybersecurity
  • asked a question related to Cybersecurity
Question
5 answers
Dear All
Previously asked any suggestions about research topic cybersecurity and IoT security. l had discussions with university and concluded the ultimate area will be focusing is proposed title: "Investigation and analysis machine learning methods for internet of thing (IoT) security issues".
So this time l need to be more specific area of research, any suggestions from anyone please.
Relevant answer
Answer
The software update is another major issue of IoT security
  • asked a question related to Cybersecurity
Question
3 answers
Dear All,
Id you are interested in the area my Adversarial Multimedia Forensics, myy PhD thesis now available on EURASIP database at the https://theses.eurasip.org/theses/859/machine-learning-techniques-for-image-forensics/
Thanks
Relevant answer
Answer
good luck
  • asked a question related to Cybersecurity
Question
3 answers
Cybersecurity investments in companies
Relevant answer
Answer
Dear Sithembiso Mpofu,
Whenever it comes to any particular business, organization, etc., there cannot be any misconceptions. That is a securiy organization/team/service ought to be set up to begin with. They agree with the management on business security policy, standards, and procedures. Then they perform vulnerability analyses, assess risk factors, and come up with threat analyses that they supposed to protect that business from. Misconceptions about cybersecurity have laymen, people who are professionally disatached from the cybersecurity realities. It's preatty much like all except medical professional know how to heal diseases - you know what's happening in those cases!
  • asked a question related to Cybersecurity
Question
3 answers
Hello everyone.
I conduct a research for my master thesis, aiming to find how much a user understands the need for cybersecurity measures for their smartphones, specifically when used as a tool for their work, even if they use their personal smartphone (BYOD) or a provided one by the organization.
The data collection is anonymous and no account is needed (google form).
The questionnaire will take about 10~12 minutes to complete.
Thank you for your time
Relevant answer
Answer
i have been answered your questioner, good luck
  • asked a question related to Cybersecurity
Question
5 answers
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.
We are talking about security, but is defining security sufficient to protect against any kind of identity theft or from a Remote Access Trojan for example?
Cyber defense is a philosophy that requires simulation and communication, that will lead us to understand the philosophy of attack.
Relevant answer
Answer
Dear Ayoub Toubi,
Using wording like "attack phylosophy' and "phylosophy of defence" is rather a slang leading most of readers away from the essence of the question. In order to protect any entity, from a private citizen to a business, organization, industry, or a government agency, first what is to be done is to define what are security threats, and what are their respective vulnerabilities. In every particular case, it is the key important analysis which outcomes lay out the entire picture of what are the most critical risk factors that ought to be protected in the first place. These analyses results of the key risk factors identification are being closely reviewed and agreed with the top management, and the security policy of the whole organization gets established, including more and less argent security priorities, security standards, security budget, etc.. There is a whole nomenclature of possible cyber and non-cyber attacks that can be and are launched online or not online. Considering online cybersecurity attack - every known and prior studied attack (like for instance Distributed Denial of Service Attack has a particular protocol / mechanism of its implementation, as well as various methods of its identification and necessary counter measures to repel such an attack. Hence, the original question mixes apples and oranges. Security is a multifaceted set of policies, protocols, sciences, technologies and practices, whereas each particular new cyber-attack's technology and protocol are a subject of studying by narrow specialized software, network, hardware, crypto and other specialists to work out the appropriate defense strategies against new unknown yet attacks, or prior studied attacks new modifications.
  • asked a question related to Cybersecurity
Question
8 answers
Computer security, cybersecurity or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
Relevant answer
Answer
One of the key goals in IoT (not only in Bangladesh) is to protect security of one's home IoT network's authentication credentials, especially online. Otherwise, ransomware requests could be numerous. Let's say a hacker had remotely stolen over the Internet your pin or password from one's apartment / house heating/cooling IoT system, and set temperature very high hot in a hot summer day. The one comes back home and feels a devilish heat in the home/apartment. Yet, one sees a phone message, which for example says: "transfer immediately $X to to such and such particular destination. Then, I immediately send you the new pin/password to enable you to cool the apartment. It can be easily guessed that many people would pay to a hacker immediately, under the circumstances.
  • asked a question related to Cybersecurity
Question
4 answers
I am looking for sources on this subject, books, magazines, or academic researches concerned with the topic of cybersecurity and the competition between China and America in this field.
  • asked a question related to Cybersecurity
Question
7 answers
Hello everyone,
I have to prepare a presentation in which I have to present a non-technical skill of cybersecurity consultant. In this, I have selected Teamwork means what the need for teamwork in cybersecurity consultancy is, what teamwork consists of, what it looks like and what tools are required to measure teamwork
Please, kindly share any information
Thanks & regard,
Osama Faheem
Relevant answer
Answer
To implement any project, whether it is under cybersecurity domain or not, you need to pass five phases:
The first pjase is the project analysis
The second phase is the project design.
The third phase is the project implementation.
The fourth phase is the project testing and finally the is the project maintenance which we may need it in the event that there is a defect in the implementation phase.
Each of these five stages is separate science from the other, therefore the teamwork in needed either in cybersecurity or in other domains.
regards
  • asked a question related to Cybersecurity
Question
3 answers
Cybersecurity projects
Relevant answer
Answer
If penetration testing for a certain network, application, or system has never been done in the past, it is eligible as a project due to novelty.
  • asked a question related to Cybersecurity
Question
1 answer
Hello,
I was just wondering if there may be anyone who works in IT, Cybersecurity or who may be remote working due to the Covid 19 pandemic, who might be able to fill out a survey form for my MSc Cybersecurity project for Sheffield Hallam University?
I am researching how Covid 19 has affected the Cybersecurity threat landscape, and how companies and their employees are handling the sudden change to remote working practices due to social distancing.
If you meet the criteria or know someone who would, could you please either fill in a survey form or pass it on?
Thank you.
Link to survey:
Relevant answer
Answer
  • asked a question related to Cybersecurity
Question
29 answers
Currently l am thinking of perusing research computing, ideal area cybersecurity problems and IoT, so far proposed research title "security risk assessment in IoT systems: Data privacy and security" any suggestions please experts
Relevant answer
DOI: 10.1109/ACCESS.2019.2946400
  • asked a question related to Cybersecurity
Question
23 answers
The physical security of IT assets is critical to achieving any cybersecurity goals. A threat actor who can access IT assets such as laptops or servers can potentially commit theft or breach security, which in turn can affect the confidentiality, availability, and integrity of information systems. That is why, for example, the physical access to the office or server rooms complete with CCTVs, password-protected screen-savers, password-protected BIOS, and disk-encryption use on portable devices.
So what do you think? Should Physical security be part of cybersecurity? Yes or NO! and Why?
Answers will be used for "Education-use-only"
Relevant answer
Answer
Firewall as a security device considers physical security. Also, TRNG ( True Random Number Generation) considers as a physical unpredictable device.
Regards
  • asked a question related to Cybersecurity
Question
5 answers
Dear All,
I have been exploring some tools that can be leveraged to perform cyber tests of IEC61850. any recommendations would be helpful.
Regards,
  • asked a question related to Cybersecurity
Question
3 answers
Dear research fellows,
We are conducting a survey to gauge the awareness, interest, and concerns related to the cybersecurity implications of the automation and digital transformation taking place in the Architecture, Engineering, Construction, and Operations (AECO) industry. The survey is targeted to the industry, but we also want to have participation from academia and researchers.
The questionnaire can be found here: https://nyu.qualtrics.com/jfe/form/SV_elIAtgTZTMIC0cJ
Thank you in advance for your participation!
Relevant answer
Answer
I too can answer the survey.
  • asked a question related to Cybersecurity
Question
11 answers
recent hot area of research in the field of cyber forensics
Relevant answer
Answer
Below I briefly described the issues related to cybercrime and cybersecurity, which I researched and described in scientific publications that are available on the Research Gate portal. Over the past few years, the scale of cybercrime attacks on the IT systems of various institutions, including government institutions, on the databases of social media portals, on the ICT systems of banks, on electronic banking systems has been growing. Cybercriminals are increasingly attacking mobile online banking systems made available to Internet users and bank customers through mobile devices, mainly via smartphones. Research shows that the scale of cybercrime attacks on the IT systems of banks, institutions, etc. using social engineering combined with perfidiously created malicious software such as ransomware, i.e. encrypting access to data on disks or redirecting users to fake websites of banks and institutions on the Internet to phishing personal data, access passwords to electronic banking accounts and, as a result, to steal money. For several years, many mailbox users have appeared strange emails of unknown origin, which are sent as spam from private other email accounts or others with false information. Attachments containing false information are attached to many of these suspicious emails, usually sent by cybercriminals and hackers. Attachments are usually of the WORD * .doc document type, the Acrobat Reader * .pdf format, image files or other formats, and often contain Ransomware-type viruses. These are very dangerous viruses that encrypt access to a computer's disk. In addition, cyber criminals are increasingly using mailboxes set up on the e-mail portal to send infected e-mails to subsequent Internet users by generating fake emails so that they look like a specific user of the mailbox would send e-mails prepared by cybercriminals to their friends. These types of cybercrime techniques are becoming more common. Why are Internet technology companies that dominate the market and offer e-mail services do not improve the security of e-mail communication systems using e-mail boxes to significantly reduce cybercriminals' activity harmful to citizens? This question is still valid. On the other hand, internet banks and technology internet companies, technology fintechs are constantly improving cyber security techniques. The development of Business Intelligence business intelligence, Blockchain technology, data analysis in Big Data database systems, artificial intelligence to track movements and attacks made by cybercriminals, for prognostic analyzes, etc. can be helpful in the process of improving IT systems risk management. Therefore, the skilful and efficient use of data science technology can be helpful in combating cybercrime, but it all depends on how these technologies will be used and, as a consequence, who will win in the following years in this IT, information "arms race". I conduct research in this area. Conclusions from the research I published in scientific publications that are available on the Research Gate website. I invite you to scientific cooperation.
Greetings,
Dariusz Prokopowicz
  • asked a question related to Cybersecurity
Question
15 answers
I'm intrested in Artificial Intelligence for Cybersecurity and looking for a good book or video.
Relevant answer
Answer
https://www.csiac.org/ is worthwhile, the webinars are splendid
  • asked a question related to Cybersecurity
Question
3 answers
what are the key recent gaps in Cybersecurity measures using frameworks?
research gaps in cybersecurity 2019-2020 index
research projects in cybersecurity
Relevant answer
Answer
Before I misspeak, are you referring to the technical or functional aspect. Both?
  • asked a question related to Cybersecurity
Question
3 answers
Dear fellow researchers,
We are conducting a survey to gauge the awareness, interest, and concerns related to the cybersecurity implications of the automation and digital transformation taking place in the Architecture, Engineering, Construction, and Operations (AECO) industry. The survey is targeted to the industry, but we also want to have participation from academia and researchers.
The questionnaire can be found here: https://nyu.qualtrics.com/jfe/form/SV_elIAtgTZTMIC0cJ
Thank you in advance for your participation!
Relevant answer
Answer
Done, Good work and good luck.
  • asked a question related to Cybersecurity
Question
9 answers
Dear fellow roboticist,
Many now agree that robotics is set to be the next major technological revolution. A robot can be defined as a cyber-physical system that can automate traditional and nontraditional tasks of humans in an automated manner. Adding new capabilities is increasingly important for the robotics domain, but security aspects are rapidly gaining relevance with the advent of industry 4.0 and IoT.
Security should not be mistaken with safety. Safety is about preventing the robot harming the environment where it operates, whereas security is about preventing the environment from harming the robot. With the aim of better understanding the current concerns in robot cybersecurity, a number of industrial and academic partners have created the Robot Security Survey. The questionnaire will be used to produce research material and all results will be completely anonymized.
Thank you for participating!
To participate, use the link below:
Relevant answer
Answer
Thank you for the survey. We have to care! Otherwise, particularly with quantum computing, we can't be ahead of the game!
  • asked a question related to Cybersecurity
Question
4 answers
Universal Robots A/S does not care about cybersecurity as we have witnessed in the past (Akerbeltz, industrial robot ransomware in ). Motivated by this attitude, Alias Robotics is launching an initiative to empower security researchers, but also end-users, distributors and system integrators of Universal Robots' technology with the information they so much require to make use of this technology securely. We are announcing the week of Universal Robots bugs. During the following days, our team will dedicate resources to file openly security flaws and receive the researchers input on bugs they might have found. Have you got any security flaws that you are aware?
Read more in our article down below.
Relevant answer
Answer
I saw your paper and the database
The question that I have for you and your team is:Are you going to expand on a security framework for robotics?
Will you be interested in collaboration?
Regards
  • asked a question related to Cybersecurity
Question
6 answers
Hi all,
For the next one month, I am making all of my paid publications freely accessible to the #infosec community. Students/professionals/Professors, if you are looking for some additional reading/learning materials during the #covid19 lockdown, then feel free to access these resources. You can also share it with your fellow colleagues.
Also requesting esteemed University Professors to share this with their students and help them with continued learning during this crisis.
Relevant answer
Answer
Ronnie Joseph The current coupon got exhausted again. I have created a new one. Allows 10 signups. That's how Udemy lets me create free coupons :)
  • asked a question related to Cybersecurity
Question
36 answers
With the stock markets in turmoil, one may be overly concerned with the coronavirus or COVID-19.
Mathematics and cybersecurity "laws of trust" can help. Models in news networks forget that mortality rates decrease sharply for new infections, in favor of people's attention -- and that is good!
The new coronavirus is now at least 20 times more deadly than the old, common cold virus (2-15%, depends on age group, 15% for 80 years old, versus 0.1% for the common cold). This is the biggest difference that indicates greater care.
However:
1. Herd effect: The percentage that survives protect those who have not yet been infected, and this acts more and more efficiently. For example, surviving workers protect from transfer to uninfected co-workers. The Internet helps, allowing people to work from the safety of a remote location, even home.
2. Own immune system: The percentage that survives "learn" in their immune system about the new virus, and the mortality rate from reinfection is expected to drop from average 2% to less than 0.1%. One can only be infected once with COVID-19 (re-infection is much less likely)! Infection brings immunity or death, decreasing the number of potential agents.
This thought also protects, creating a positive attitude when facing the problem, which brings the solution itself -- from 2% deadly to just 0.1%.
Meanwhile, mathematics indicates that self-isolation is the best prevention and helps get to 0.1% quicker. There should be a spike of COVID-19 within the northern flu season now, of December (mainly, where it originated: China) to March, but activity can last as late as May (US CDC data), followed by an overall exponential decline to the 0.1% level.
Also, mathematics lead us to consider that the typical flu season in the Southern Hemisphere spans that hemisphere's winter months of May to July, expectedly making COVID-19 deaths to be much less pronounced in the south. Travel to the Southern hemisphere from the North (an ironically inverted migration?) may also be an isolation technique, at least until April-May/2020.
Comments? What is your qualified opinion?
Relevant answer
Answer
Isolation is currently the best preventive solution because Coronavirus has a high level of infection and there is no vaccine or any other fully effective Coronavirus drug yet. In addition, it is estimated that many people who do not have disease symptoms, do not get sick, but they may already be infected with Coronavirus, so that the pandemic does not expand, all people should follow the recommendations, i.e. you should wash your hands often, stay at home and limit the exit from home to the necessary minimum. people who show any symptoms of a cold, such as a runny nose or cough, should not leave the house because they may be infected with Coronavirus, even though they are not seriously ill. The idea is to minimize the extent of the spread of the Coronavirus pandemic and currently isolation, home quarantine is the best solution for all people, regardless of whether they are sick or not.
Best wishes.
Dariusz Prokopowicz
  • asked a question related to Cybersecurity
Question
8 answers
Question for my computer scientists friends! In an encryption system with global keys alongside user's public keys (used by Blackberry), can a modification occur in the decryption of the message? #phdlife #blackberry #encryption #cybersecurity
Relevant answer
Answer
Yes
  • asked a question related to Cybersecurity
Question
11 answers
We would appreciate someone installing our authentication system, and giving us feedback on various aspects like ease of installation, user experience, bugs (hopefully, none...).
We will give you a free licence for an unlimited number of users and unlimited number of installations. Ideally, we'd like to test with about a hundred users, but any number will do in practice.
You'll need to have a Linux or Sun (SPARC) Solaris system for the main server, but user connections can be from any device, running any O/S - including smartphones, tablets, etc.
You'll also need an Oracle database. You can download Oracle 11g from their website, for free.
Installation takes about an hour, plus the time to migrate any existing users - for which we can supply a free tool.
Thanks in advance.