Abstracted and indexed in:
Future:
SBPP: STATISTICAL-BASED PRIVACY-PRESERVING APPROACH FOR DATA GATHERING IN SMART GRID
Alireza Ahadipour, Mohammad Mohammadi & Alireza Keshavarz-Haddad
As smart grids are getting popular and being employed widely, the privacy of users in such networks is getting more and more substantial. Decision making in smart grids depends on the information gathered from the users periodically. However, having access to the data relevant to the electricity consumption of users is inconsistent with their privacy.
A HYBRID APPROACH TO TRUST INFERENCE IN SOCIAL NETWORKS
Maryam Fayyaz, Hamed Vahdat-Nejad & Mahdi Kherad
The trust inference issue in a social network is defined as anticipating the trust level which a user can have to another user who is not directly connected to him in the trust network. This paper proposes a method for trust inference using soft computing. To our best knowledge, it is the first time that soft computing is used to solve the trust inference issue.
VULNERABILITY ASSESSMENT AND PENETRATION TESTING OF VIRTUALIZATION
Ramin Vakili & Hamid Reza Hamidi
Virtualization brings us lots of significant usages and is a useful technology in data centres and cloud computing. Using virtualization could either reduce security issues or bring new ones. In this research we have tried to review security advantages and disadvantages of virtualization technology.
SAFEGUARDING MALAYSIA’S CYBERSPACE AGAINST CYBER THREATS: CONTRIBUTIONS BY CYBERSECURITY MALAYSIA
Fazlan Abdullah, Nadia Salwa Mohamad & Zahri Yunos
The world today is becoming dependent on Information and Communication Technology (ICT). Cyber threats on ICT infrastructures can lead to catastrophic damage and disruption, hence an effective information security policy framework is vital in securing the Critical National Information Infrastructure (CNII). Malaysia has implemented the National Cyber Security Policy (NCSP) to safeguard Malaysia’s CNII against cyber threats.
DEVELOPING A COMPETENCY FRAMEWORK FOR BUILDING CYBERSECURITY PROFESSIONALS
Ruhama Mohammed Zain, Zahri Yunos, Mustaffa Ahmad, Lee Hwee Hsiung & Jeffrey Bannister
The provision of secure networks and services is becoming more critical with the continuing growth of online services and prevalent hacks against systems. In particular, at the national level, countries must protect their critical infrastructure from malicious attacks. Central to this is the requirement to have an adequate pool of industry professionals who are well-versed in cybersecurity.
PREVENTING REFLECTIVE DLL INJECTION ON UWP APPS
Mojtaba Zaheri, Salman Niksefat & Babak Sadeghiyan
Universal Windows Platform (UWP) is the Microsoft’s recent platform-homogeneous application architecture. It al-lows a code to run on variety of devices including PC, mobile devices, etc., without needing to be rewritten or recompiled. UWP apps are becoming more and more popular and consequently this new application platform is becoming the next attack target for hackers and malware developers.
CRAWLER AND SPIDERIN USAGE IN CYBER-PHYSICAL SYSTEMS FORENSICS
Moein Abedi & Shahrzad Sedaghat
As a featured subset of cyber-physical-systems, Mobile cyber-physical-systems can make use of Mobile devices, such as smartphones, which serve as a convenient and economical platform for Mobile applications in all places between humans and the geographic world around it. Today, cyber physical systems are popular in power grids, healthcare devices, transportation networks, industrial processes and infrastructure.