OIC-CERT JOURNAL OF CYBER SECURITY
ISSN 2636-9680 | eISSN 2682-9266


 

 

Indexing:

 

Abstracted and indexed in:

 

 

 

Future:

 

 

Edition > Volume 1 > Issue 1

VOLUME 1, ISSUE 1

 

Title:

SBPP: STATISTICAL-BASED PRIVACY-PRESERVING APPROACH FOR DATA GATHERING IN SMART GRID

 

 

Author(s):

Alireza Ahadipour, Mohammad Mohammadi & Alireza Keshavarz-Haddad

 

 

Abstract:

As smart grids are getting popular and being employed widely, the privacy of users in such networks is getting more and more substantial. Decision making in smart grids depends on the information gathered from the users periodically. However, having access to the data relevant to the electricity consumption of users is inconsistent with their privacy.

 

 



Title:

A HYBRID APPROACH TO TRUST INFERENCE IN SOCIAL NETWORKS

 

 

Author(s):

Maryam Fayyaz, Hamed Vahdat-Nejad & Mahdi Kherad

 

 

Abstract:

The trust inference issue in a social network is defined as anticipating the trust level which a user can have to another user who is not directly connected to him in the trust network. This paper proposes a method for trust inference using soft computing. To our best knowledge, it is the first time that soft computing is used to solve the trust inference issue.

 

 



Title:

VULNERABILITY ASSESSMENT AND PENETRATION TESTING OF VIRTUALIZATION

 

 

Author(s):

Ramin Vakili & Hamid Reza Hamidi

 

 

Abstract:

Virtualization brings us lots of significant usages and is a useful technology in data centres and cloud computing. Using virtualization could either reduce security issues or bring new ones. In this research we have tried to review security advantages and disadvantages of virtualization technology.

 

 



Title:

SAFEGUARDING MALAYSIA’S CYBERSPACE AGAINST CYBER THREATS: CONTRIBUTIONS BY CYBERSECURITY MALAYSIA

 

 

Author(s):

Fazlan Abdullah, Nadia Salwa Mohamad & Zahri Yunos

 

 

Abstract:

The world today is becoming dependent on Information and Communication Technology (ICT). Cyber threats on ICT infrastructures can lead to catastrophic damage and disruption, hence an effective information security policy framework is vital in securing the Critical National Information Infrastructure (CNII). Malaysia has implemented the National Cyber Security Policy (NCSP) to safeguard Malaysia’s CNII against cyber threats.

 

 



Title:

DEVELOPING A COMPETENCY FRAMEWORK FOR BUILDING CYBERSECURITY PROFESSIONALS

 

 

Author(s):

Ruhama Mohammed Zain, Zahri Yunos, Mustaffa Ahmad, Lee Hwee Hsiung & Jeffrey Bannister

 

 

Abstract:

The provision of secure networks and services is becoming more critical with the continuing growth of online services and prevalent hacks against systems. In particular, at the national level, countries must protect their critical infrastructure from malicious attacks. Central to this is the requirement to have an adequate pool of industry professionals who are well-versed in cybersecurity.

 

 



Title:

PREVENTING REFLECTIVE DLL INJECTION ON UWP APPS

 

 

Author(s):

Mojtaba Zaheri, Salman Niksefat & Babak Sadeghiyan

 

 

Abstract:

Universal Windows Platform (UWP) is the Microsoft’s recent platform-homogeneous application architecture. It al-lows a code to run on variety of devices including PC, mobile devices, etc., without needing to be rewritten or recompiled. UWP apps are becoming more and more popular and consequently this new application platform is becoming the next attack target for hackers and malware developers.

 

 



Title:

CRAWLER AND SPIDERIN USAGE IN CYBER-PHYSICAL SYSTEMS FORENSICS

 

 

Author(s):

Moein Abedi & Shahrzad Sedaghat

 

 

Abstract:

As a featured subset of cyber-physical-systems, Mobile cyber-physical-systems can make use of Mobile devices, such as smartphones, which serve as a convenient and economical platform for Mobile applications in all places between humans and the geographic world around it. Today, cyber physical systems are popular in power grids, healthcare devices, transportation networks, industrial processes and infrastructure.