ORCID Profile
0000-0002-1958-411X
Current Organisations
Universiti Teknologi Malaysia
,
Charles Darwin University
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: IEEE
Date: 07-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer Singapore
Date: 23-07-2021
Publisher: IEEE
Date: 03-2019
Publisher: Springer Science and Business Media LLC
Date: 16-03-2017
Publisher: IGI Global
Date: 2014
DOI: 10.4018/978-1-4666-4490-8.CH028
Abstract: The popularity of Social Network Sites (SNSs) has increased recently. Social network sites provide platforms which operate based on exchanging information among users therefore, information propagation is a significant topic in social networking researches. The goal of this chapter is to study the factors that have a significant role in information diffusion, then compare the role of ties in spreading information and evaluating the strength of ties. The result shows that, although strong ties have an important role, the likelihood of information diffusion by weak ties is higher.
Publisher: IEEE
Date: 07-10-2020
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
Date: 30-11-2019
DOI: 10.35940/IJRTE.C6653.118419
Abstract: The purpose of this study is to study positive and negative factors that can substantially explain mobile commerce (m-commerce) acceptance in Malaysia. A technology acceptance model for m-commerce with eights factors is constructed. Data collected from 400 respondents are being tested on the proposed model. Confirmatory factor analysis is performed to test the reliability and validity of the model and structural equation modelling is performed to access the relationship between behavior intention and each factor. The acceptance of m-commerce is influenced by factors including performance expectancy, effort expectancy, social influence, facilitating conditions, Mobility, Personal İnnovation, Perceived Trust and use behavior while Perceived risk is insignificant in this case The results of this study are useful for m-commerce providers in adapting their m-commerce promotion strategy. This study contributes to the practice by providing a model for m-commerce user technology acceptance, which can be used as the basis for future investigations.
Publisher: MDPI AG
Date: 28-09-2022
DOI: 10.3390/JSAN11040062
Abstract: In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity on the internet of medical things (IoMT) and building cyber resiliency against crime-as-a-service (CaaS) in the healthcare ecosystem are challenging due to various attacks, including spectrum-level threats at the physical layer. Therefore, we conducted a systematic literature review to identify the research gaps and propose potential solutions to spectrum threats on IoMT devices. The purpose of this study is to provide an overview of the literature on wireless spectrum attacks. The papers we reviewed covered cyber impacts, layered attacks, attacks on protocols, sniffing attacks, field experimentation with cybersecurity testbeds, radiofrequency machine learning, and data collection. In the final section, we discuss future directions, including the sniffing attack mitigation framework in IoMT devices operating under a machine implantable communication system (MICS). To analyze the research papers about physical attacks against IoT in health care, we followed the Preferred Reporting Items for Systematic Reviews (PRISMA) guidelines. Scopus, PubMed, and Web of Science were searched for peer-reviewed articles, and we conducted a thorough search using these resources. The search on Scopus containing the terms “jamming attack” and “health” yielded 330 rows, and the investigation on WoS yielded 17 rows. The search terms “replay attack” and “health” yielded 372 rows in Scopus, while PubMed yielded 23 rows, and WoS yielded 50 articles. The search terms “side-channel attack” and “health” yielded 447 rows in Scopus, WoS yielded 30 articles, and the search terms “sniffing attack” and “health” yielded 18 rows in Scopus, while PubMed yielded 1 row, and WoS yielded 0 articles. The terms “spoofing attack” and “health” yielded 316 rows in Scopus, while PubMed yielded 5 rows, and WoS yielded 23 articles. Finally, the search terms “t ering attack” and “health” yielded 25 rows in Scopus, PubMed yielded 14 rows, and WoS yielded 46 rows. The search time frame was from 2003 to June 2022. The findings show a research gap in sniffing, t ering, and replay attacks on the IoMT. We have listed the items that were included and excluded and provided a detailed summary of SLR. A thorough analysis of potential gaps has been identified, and the results are visualized for ease of understanding.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: MDPI AG
Date: 14-02-2023
DOI: 10.3390/TECHNOLOGIES11010031
Abstract: The adaptation of the Internet of Medical Things (IoMT) has provided efficient and timely services and has transformed the healthcare industry to a great extent. Monitoring patients remotely and managing hospital records and data have become effortless with the advent of IoMT. However, security and privacy have become a significant concern with the growing number of threats in the cyber world, primarily for personal and sensitive user data. In terms of IoMT devices, risks appearing from them cannot easily fit into an existing risk assessment framework, and while research has been done on this topic, little attention has been paid to the methodologies used for the risk assessment of heterogeneous IoMT devices. This paper elucidates IoT, its applications with reference to in-demand sectors, and risks in terms of their types. By the same token, IoMT and its application area and architecture are explained. We have also discussed the common attacks on IoMT. Existing papers on IoT, IoMT, risk assessment, and frameworks are reviewed. Finally, the paper analyzes the available risk assessment frameworks such as NIST, ISO 27001, TARA, and the IEEE213-2019 (P2413) standard and highlights the need for new approaches to address the heterogeneity of the risks. In our study, we have decided to follow the functions of the NIST and ISO 270001 frameworks. The complete framework is anticipated to deliver a risk-free approach for the risk assessment of heterogeneous IoMT devices benefiting its users.
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21377
Abstract: The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.
Publisher: Elsevier BV
Date: 12-2019
Publisher: IEEE
Date: 2018
Publisher: Institute of Advanced Engineering and Science
Date: 12-2020
DOI: 10.11591/IJEECS.V20.I3.PP1173-1184
Abstract: This span study presents an amended unified theory of acceptance and use of technology (UTAUT) which explores key factors affecting Malaysian consumers ' willingness to accept mobile-commerce. A questionnaire survey has been used to collect information from 400 Malaysian smartphone users using a random stratified s le and analyzed using structural equation modelling (SEM) with the use of Smart PLS 3.0. Results show that acceptance and use of mobile-commerce services can also be predicted by the behavioural intentions of users, whose performance expectancy, efforts expectations, social effects, mobility, personal innovations and perceived trust are significantly affected. From these variables, perceived trust is the most significant determinant that directly affects behavioural intention to use mobile-commerce services in Malaysia. It is then followed by mobility, personal innovation, social influence, performance expectancy then effect expectancy. Facilitating Conditions and moderating variables such as gender, age, education, income, marital status, experience and payment have no significant effect on Behavioral Intention to use mobile-commerce services in Malaysia. In conclusion, this study shows that behavioural intention and the use of mobile commerce services in Malaysia have a direct effect. The study will help dealers to avoid spending thousands of dollars on investments that have little impact on whether the customer is embracing and using mobile-commerce. The study also provides quantified indicators and offers a framework for the understanding of the Malaysia mobile-commerce system. The report concludes with a study of the effects of the research findings and provides recommendations for future research. /span
Publisher: IOP Publishing
Date: 10-2019
DOI: 10.1088/1757-899X/561/1/012117
Abstract: Modern storage technology has shifted from traditional offline state to cloud based technology since some time now. Because of this transition, the present society is now more dependent on the online storage solutions. Synchronization of files and keeping a history of changes are critical parts of any cloud system. Therefore, an implementation of Blockchain Technology with traditional file synchronization and versioning system can be extremely fruitful. Blockchain is not a new technology, but recently its importance has sky-rocketed as the society is moving towards the decentralized World Wide Web. Blockchain is “an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way” [1]. Blockchain provides immutable data storage and access with the combination of Proof-of-Work [2, 3]. Due to such appealing features, the study undertaken here investigates and proposes a Blockchain based resilient cloud storage solution that makes a sound utilization of various properties fundamental to any Blockchain based framework.
Publisher: IEEE
Date: 2018
Publisher: Frontiers Media SA
Date: 31-07-2020
Publisher: Foundation of Computer Science
Date: 25-09-2012
DOI: 10.5120/8618-2480
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Springer International Publishing
Date: 2017
Publisher: Association for Research in Vision and Ophthalmology (ARVO)
Date: 14-10-2014
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21361
Abstract: One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability on-demand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.
Publisher: IOP Publishing
Date: 05-2020
DOI: 10.1088/1742-6596/1551/1/012005
Abstract: The paper aims to identify behavioural theories that influence information security policies compliance behaviour. A systematic review of empirical studies from eleven online databases (ACM digital library, Emerald Insight, IEEE Xplore digital library, Springer link, Science direct, Scopus, Web of Science, Oxford academic journals, SAGE journals, Taylor & Francis and Wiley online library) are conducted. This review identified 29 studies met its criterion for inclusion. The investigated theories were extracted and analysed. Total of 19 theories have been identified and studied concerning to security policy compliance behaviour. The result indicated that the most established theories in information security compliance behaviour studies are the Theory of Planned Behavior and Protection Motivation theory. Meanwhile, General Deterrence Theory, Neutralization theory, Social Bond Theory / Social Control Theory are used moderately in this research area. Less explored theories are namely Self Determination Theory, Knowledge, Attitude, and Behavior, Social Cognitive Theory, Involvement Theory, Health belief model, Theory of Interpersonal Behavior, Extended Parallel Processing Model, Organisational Control Theory, Psychological Reactance Theory, Norm Activation Theory, Organizational Behaviour Theory, Cognitive Evaluation Theory and Extended Job Demands-Resources. The results from this review may guide the development and evaluation of theories promoting information security compliance behaviours. This will further contribute in the development of an integrated theory of information security compliance behaviour.
Publisher: MDPI AG
Date: 26-05-2022
DOI: 10.3390/S22114032
Abstract: Electronic Health Records (EHR) are the healthcare sector’s core digital strategy meant to improve the quality of care provided to patients. Despite the benefits afforded by this digital transformation initiative, adoption among healthcare organizations has been slower than desired. The sheer volume and sensitive nature of patient records compel these organizations to exercise a healthy amount of caution in implementing EHR. Cyberattacks have also increased the risks associated with non-optimal EHR implementations. An influx of high-profile data breaches has plagued the sector during the COVID-19 pandemic, which put the spotlight on EHR cybersecurity. One objective of this research project is to aid the acceleration of EHR adoption. Another objective is to ensure the robustness of the system to resist malicious attacks. For the former, a systematic review was used to unearth all the possible causes why the adoption of EHR has been anemic. In this paper, sixty-five existing proposed EHR solutions were analyzed and it was found that there are fourteen major challenges that need to be addressed to reduce friction and risk for health organizations. These were privacy, security, confidentiality, interoperability, access control, scalability, authentication, accessibility, availability, data storage, data ownership, data validity, data integrity, and ease of use. We propose EHRChain, a new framework that tackles all the listed challenges simultaneously to address the first objective while also being designed to achieve the second objective. It is enabled by dual-blockchains based on Hyperledger Sawtooth to allow patient data decentralization via a consortium blockchain and IPFS for distributed data storage.
Publisher: American Scientific Publishers
Date: 2018
Publisher: IEEE
Date: 2017
Publisher: IEEE
Date: 2017
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21366
Abstract: It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request permission only during runtime, but not all users have this update. This is important because user permission is required to perform certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security.
Publisher: IEEE
Date: 2019
Publisher: Elsevier BV
Date: 2021
Publisher: IEEE
Date: 07-10-2020
Publisher: American Scientific Publishers
Date: 10-2016
Publisher: IEEE
Date: 28-11-2020
Publisher: IEEE
Date: 03-2019
Publisher: Springer International Publishing
Date: 02-11-2019
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IEEE
Date: 09-2013
Publisher: Institute of Advanced Engineering and Science
Date: 10-03-2021
DOI: 10.11591/IJEECS.V21.I3.PP1820-1829
Abstract: span D /span span lang="EN-AU" ata centers are primarily the main targets of cybercriminals and security threats as they host various critical information and communication technology (ICT) services. Identifying the threats and /span span managing the risks associated with data centers have become a major challenge as this will enable organizations to optimize their resources to focus on the most hazardous threats to prevent the potential risks and damages. The objective of this paper is to identify major ICT security threats to data centers in the Malaysian public sector and their causes. The data for this study was collected through interview sessions. A total of 33 respondents from various government organizations were interviewed. The results revealed that the technical threats, /span span lang="EN-MY" spyware, phishing, bluesnarfing threats, social engineering and virus, trojan, malware, ransomware, viral websites threats are the major categories of threats often encountered by the malaysian public sector organizations. The /span span causes for these threats /span span lang="EN-MY" are lack of budget, competent personnel, and manpower for security tasks, user awareness lack of /span span compliances and monitoring insufficient security policies and procedures as well as deliberate cyber attacks. The outcome of this study will give a greater degree of awareness and understanding to the ICT security officers, who are entrusted with data center security. /span
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer International Publishing
Date: 2018
Publisher: Oxford University Press (OUP)
Date: 24-03-2021
DOI: 10.1093/BJS/ZNAB101
Abstract: Preoperative SARS-CoV-2 vaccination could support safer elective surgery. Vaccine numbers are limited so this study aimed to inform their prioritization by modelling. The primary outcome was the number needed to vaccinate (NNV) to prevent one COVID-19-related death in 1 year. NNVs were based on postoperative SARS-CoV-2 rates and mortality in an international cohort study (surgical patients), and community SARS-CoV-2 incidence and case fatality data (general population). NNV estimates were stratified by age (18–49, 50–69, 70 or more years) and type of surgery. Best- and worst-case scenarios were used to describe uncertainty. NNVs were more favourable in surgical patients than the general population. The most favourable NNVs were in patients aged 70 years or more needing cancer surgery (351 best case 196, worst case 816) or non-cancer surgery (733 best case 407, worst case 1664). Both exceeded the NNV in the general population (1840 best case 1196, worst case 3066). NNVs for surgical patients remained favourable at a range of SARS-CoV-2 incidence rates in sensitivity analysis modelling. Globally, prioritizing preoperative vaccination of patients needing elective surgery ahead of the general population could prevent an additional 58 687 (best case 115 007, worst case 20 177) COVID-19-related deaths in 1 year. As global roll out of SARS-CoV-2 vaccination proceeds, patients needing elective surgery should be prioritized ahead of the general population.
Publisher: IEEE
Date: 08-2019
Publisher: Maya Global Education Society
Date: 19-03-2019
Abstract: Purpose of the study: The aim of this study is to investigate undergraduate engineers’ perceptions on the industrial collaboration program. Methodology: This study used both quantitative and qualitative methods of analysis. Based on purposive s ling, 150 undergraduate engineers were selected and were required to complete a questionnaire and participate in focus group interviews. Numerical data obtained using the questionnaire were tabulated based on frequencies and percentages. Thematic analysis was performed to identify patterns that emerged from the focus group interview transcripts. Main findings: Study findings indicate a positive trend in students’ perceptions on the benefits of the program besides indicating a gap in their ability and competency. Thematic analysis based on the focus group interviews reveal three emerging themes which indicate that the respondents found the program to have boosted their confidence, besides being useful and meaningful. Applications of this study: This study contributes to the design of English for Specific Purposes (ESP) curriculum, specifically for engineers. ESP curriculum design as well as teaching and learning should include industry leaders’ intervention. Novelty/Originality of this study: This study will be the entry point for employer engagement in teaching and learning as well as in ESP curriculum development for engineers in the context of a technical university.
Publisher: Springer Science and Business Media LLC
Date: 04-01-2022
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21434
Abstract: Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.
Publisher: InTech
Date: 22-03-2011
DOI: 10.5772/14130
Publisher: IEEE
Date: 2017
Publisher: Association for Research in Vision and Ophthalmology (ARVO)
Date: 19-10-2015
Publisher: Croatian Communications and Information Society
Date: 26-04-2019
DOI: 10.24138/JCOMSS.V15I2.707
Abstract: Mobile Edge Computing (MEC) is relatively a novel concept in the parlance of Computational Offloading. MEC signifies the offloading of intensive computational tasks to the cloud which is generally positioned at the edge of a mobile network. Being in an embryonic stage of development, not much research has yet been done in this field despite its potential promises. However, with time the advantages are gaining growing attention and MEC is gradually taking over some of the resource-intensive functionalities of a traditional centralized cloud-based system. Another new idea called Task Caching is emerging rapidly with the offloading policy. This joint optimization idea of Task Offloading and caching is relatively a very new concept. It has been in use for reducing energy consumption and delay time for mobile edge computing. Due to the encouraging offshoots from some of the current research on the joint optimization problem, this research initiative aims to take the progress forward. The work improves upon the “prioritization of the tasks” by adopting a very practical approach discussed forward, and proposes a different way for Task Offloading and caching to the edge of the cloud, thereby bringing a significant enhancement to the QoS of MEC.
Publisher: Springer International Publishing
Date: 27-05-2017
Publisher: IEEE
Date: 2017
Publisher: IEEE
Date: 28-11-2020
Publisher: IEEE
Date: 09-2017
Publisher: Informa UK Limited
Date: 06-01-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: MDPI AG
Date: 13-04-2023
DOI: 10.3390/JSAN12020036
Abstract: Privacy in Electronic Health Records (EHR) has become a significant concern in today’s rapidly changing world, particularly for personal and sensitive user data. The sheer volume and sensitive nature of patient records require healthcare providers to exercise an intense quantity of caution during EHR implementation. In recent years, various healthcare providers have been hit by ransomware and distributed denial of service attacks, halting many emergency services during COVID-19. Personal data breaches are becoming more common day by day, and privacy concerns are often raised when sharing data across a network, mainly due to transparency and security issues. To tackle this problem, various researchers have proposed privacy-preserving solutions for EHR. However, most solutions do not extensively use Privacy by Design (PbD) mechanisms, distributed data storage and sharing when designing their frameworks, which is the emphasis of this study. To design a framework for Privacy by Design in Electronic Health Records (PbDinEHR) that can preserve the privacy of patients during data collection, storage, access and sharing, we have analysed the fundamental principles of privacy by design and privacy design strategies, and the compatibility of our proposed healthcare principles with Privacy Impact Assessment (PIA), Australian Privacy Principles (APPs) and General Data Protection Regulation (GDPR). To demonstrate the proposed framework, ‘PbDinEHR’, we have implemented a Patient Record Management System (PRMS) to create interfaces for patients and healthcare providers. In addition, to provide transparency and security for sharing patients’ medical files with various healthcare providers, we have implemented a distributed file system and two permission blockchain networks using the InterPlanetary File System (IPFS) and Ethereum blockchain. This allows us to expand the proposed privacy by design mechanisms in the future to enable healthcare providers, patients, imaging labs and others to share patient-centric data in a transparent manner. The developed framework has been tested and evaluated to ensure user performance, effectiveness, and security. The complete solution is expected to provide progressive resistance in the face of continuous data breaches in the patient information domain.
Publisher: IEEE
Date: 07-2019
Publisher: IEEE
Date: 12-2016
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Springer International Publishing
Date: 2021
Publisher: MDPI AG
Date: 07-03-2020
DOI: 10.3390/ELECTRONICS9030452
Abstract: In this digital age, we are observing an exponential proliferation of sophisticated hardware- and software-based solutions that are able to interact with the users at almost every sensitive aspect of our lives, collecting and analysing a range of data about us. These data, or the derived information out of it, are often too personal to fall into unwanted hands, and thus users are almost always wary of the privacy of such private data that are being continuously collected through these digital mediums. To further complicate the issue, the infringement cases of such databanks are on a sharp rise. Several frameworks have been devised in various parts of the globe to safeguard the issue of data privacy in parallel, constant research is also being conducted on closing the loopholes within these frameworks. This study aimed to analyse the contemporary privacy by design frameworks to identify the key limitations. Seven contemporary privacy by design frameworks were examined in-depth in this research that was based on a systematic literature review. The result, targeted at the healthcare sector, is expected to produce a high degree of fortification against data breaches in the personal information domain.
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Frontiers Media SA
Date: 14-12-2020
DOI: 10.3389/FPSYG.2020.570345
Abstract: Young academics have been facing a problem of high turnover rate due to missing links between the institutions’ policies and the performance. This study explores the effect of job embeddedness and community embeddedness on creative work performance and intentions to leave of young teaching staff in academic institutions in Pakistan. In this study, 300 qualified young academics from public and private universities were selected as subjects and asked to complete a questionnaire. Data were collected via mail-survey. A variance-based structural equation model is employed to measure the path model. The results show that the fit-dimension of organizational- and community-embeddedness, along with the moderating effect of organization size and the availability of nearby alternative jobs have a significant impact on improving perceived creative performance and reducing staff turnover intentions. This study suggests that organizations should focus on organizational-fit and community-fit constructs in their nurturing strategies to embed young teachers in their academic institutions. This study also suggests that monetary rewards only are relatively ineffective to improve retention. Hence, public and private sector universities should facilitate meaningful contributions from young teachers in creative work and provide opportunities for social interactions and personal development.
Publisher: MDPI AG
Date: 12-06-2019
DOI: 10.3390/INFO10060209
Abstract: Spam emails, also known as non-self, are unsolicited commercial or malicious emails, sent to affect either a single in idual or a corporation or a group of people. Besides advertising, these may contain links to phishing or malware hosting websites set up to steal confidential information. In this paper, a study of the effectiveness of using a Negative Selection Algorithm (NSA) for anomaly detection applied to spam filtering is presented. NSA has a high performance and a low false detection rate. The designed framework intelligently works through three detection phases to finally determine an email’s legitimacy based on the knowledge gathered in the training phase. The system operates by elimination through Negative Selection similar to the functionality of T-cells’ in biological systems. It has been observed that with the inclusion of more datasets, the performance continues to improve, resulting in a 6% increase of True Positive and True Negative detection rate while achieving an actual detection rate of spam and ham of 98.5%. The model has been further compared against similar studies, and the result shows that the proposed system results in an increase of 2 to 15% in the correct detection rate of spam and ham.
Publisher: IEEE
Date: 2019
Publisher: Hindawi Limited
Date: 29-08-2019
DOI: 10.1155/2019/5747136
Abstract: Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the erse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified.
Publisher: IEEE
Date: 2018
Publisher: IACSIT Press
Date: 2013
Publisher: IEEE
Date: 2019
Publisher: Wiley
Date: 09-03-2021
DOI: 10.1111/ANAE.15458
Abstract: Peri‐operative SARS‐CoV‐2 infection increases postoperative mortality. The aim of this study was to determine the optimal duration of planned delay before surgery in patients who have had SARS‐CoV‐2 infection. This international, multicentre, prospective cohort study included patients undergoing elective or emergency surgery during October 2020. Surgical patients with pre‐operative SARS‐CoV‐2 infection were compared with those without previous SARS‐CoV‐2 infection. The primary outcome measure was 30‐day postoperative mortality. Logistic regression models were used to calculate adjusted 30‐day mortality rates stratified by time from diagnosis of SARS‐CoV‐2 infection to surgery. Among 140,231 patients (116 countries), 3127 patients (2.2%) had a pre‐operative SARS‐CoV‐2 diagnosis. Adjusted 30‐day mortality in patients without SARS‐CoV‐2 infection was 1.5% (95%CI 1.4–1.5). In patients with a pre‐operative SARS‐CoV‐2 diagnosis, mortality was increased in patients having surgery within 0–2 weeks, 3–4 weeks and 5–6 weeks of the diagnosis (odds ratio (95%CI) 4.1 (3.3–4.8), 3.9 (2.6–5.1) and 3.6 (2.0–5.2), respectively). Surgery performed ≥ 7 weeks after SARS‐CoV‐2 diagnosis was associated with a similar mortality risk to baseline (odds ratio (95%CI) 1.5 (0.9–2.1)). After a ≥ 7 week delay in undertaking surgery following SARS‐CoV‐2 infection, patients with ongoing symptoms had a higher mortality than patients whose symptoms had resolved or who had been asymptomatic (6.0% (95%CI 3.2–8.7) vs. 2.4% (95%CI 1.4–3.4) vs. 1.3% (95%CI 0.6–2.0), respectively). Where possible, surgery should be delayed for at least 7 weeks following SARS‐CoV‐2 infection. Patients with ongoing symptoms ≥ 7 weeks from diagnosis may benefit from further delay.
Publisher: MDPI AG
Date: 29-05-2023
DOI: 10.3390/S23115174
Abstract: The privacy and security of patients’ health records have been an ongoing issue, and researchers are in a race against technology to design a system that can help stop the compromising of patient data. Many researchers have proposed solutions however, most solutions have not incorporated potential parameters that can ensure private and secure personal health records management, which is the focus of this study. To design and develop a solution, this research thoroughly investigated existing solutions and identified potential key contexts. These include IOTA Tangle, Distributed Ledger Technology (DLT), IPFS protocols, Application Programming Interface (API), Proxy Re-encryption (PRE), and access control, which are analysed and integrated to secure patient medical records, and Internet of Things (IoT) medical devices, to develop a patient-based access management system that gives patients full control of their health records. This research developed four prototype applications to demonstrate the proposed solution: the web appointment application, the patient application, the doctor application, and the remote medical IoT device application. The results indicate that the proposed framework can improve healthcare services by providing immutable, secure, scalable, trusted, self-managed, and traceable patient health records while giving patients full control of their own medical records.
Publisher: American Scientific Publishers
Date: 2018
Publisher: MDPI AG
Date: 10-07-2020
DOI: 10.3390/ELECTRONICS9071120
Abstract: With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab–knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.
Publisher: IEEE
Date: 05-2019
Publisher: Deanship of Scientific Research
Date: 31-03-2022
Publisher: Academy of Taiwan Information Systems Research
Date: 12-2019
DOI: 10.7903/IJECS.1732
Publisher: IEEE
Date: 05-2019
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 08-2014
No related grants have been discovered for claus cursiefen.