ORCID Profile
0000-0002-2591-1949
Current Organisations
Charles Darwin University
,
Universiti Teknologi Malaysia
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: IEEE
Date: 07-2011
Publisher: Wiley
Date: 05-2020
DOI: 10.1002/PLD3.219
Publisher: Elsevier BV
Date: 09-2008
Publisher: Elsevier BV
Date: 09-2008
Publisher: IGI Global
Date: 2014
DOI: 10.4018/978-1-4666-4490-8.CH028
Abstract: The popularity of Social Network Sites (SNSs) has increased recently. Social network sites provide platforms which operate based on exchanging information among users therefore, information propagation is a significant topic in social networking researches. The goal of this chapter is to study the factors that have a significant role in information diffusion, then compare the role of ties in spreading information and evaluating the strength of ties. The result shows that, although strong ties have an important role, the likelihood of information diffusion by weak ties is higher.
Publisher: Elsevier BV
Date: 2008
DOI: 10.2139/SSRN.1222304
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Wiley
Date: 27-04-2020
Publisher: Elsevier BV
Date: 06-2004
Publisher: MDPI AG
Date: 28-09-2022
DOI: 10.3390/JSAN11040062
Abstract: In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity on the internet of medical things (IoMT) and building cyber resiliency against crime-as-a-service (CaaS) in the healthcare ecosystem are challenging due to various attacks, including spectrum-level threats at the physical layer. Therefore, we conducted a systematic literature review to identify the research gaps and propose potential solutions to spectrum threats on IoMT devices. The purpose of this study is to provide an overview of the literature on wireless spectrum attacks. The papers we reviewed covered cyber impacts, layered attacks, attacks on protocols, sniffing attacks, field experimentation with cybersecurity testbeds, radiofrequency machine learning, and data collection. In the final section, we discuss future directions, including the sniffing attack mitigation framework in IoMT devices operating under a machine implantable communication system (MICS). To analyze the research papers about physical attacks against IoT in health care, we followed the Preferred Reporting Items for Systematic Reviews (PRISMA) guidelines. Scopus, PubMed, and Web of Science were searched for peer-reviewed articles, and we conducted a thorough search using these resources. The search on Scopus containing the terms “jamming attack” and “health” yielded 330 rows, and the investigation on WoS yielded 17 rows. The search terms “replay attack” and “health” yielded 372 rows in Scopus, while PubMed yielded 23 rows, and WoS yielded 50 articles. The search terms “side-channel attack” and “health” yielded 447 rows in Scopus, WoS yielded 30 articles, and the search terms “sniffing attack” and “health” yielded 18 rows in Scopus, while PubMed yielded 1 row, and WoS yielded 0 articles. The terms “spoofing attack” and “health” yielded 316 rows in Scopus, while PubMed yielded 5 rows, and WoS yielded 23 articles. Finally, the search terms “t ering attack” and “health” yielded 25 rows in Scopus, PubMed yielded 14 rows, and WoS yielded 46 rows. The search time frame was from 2003 to June 2022. The findings show a research gap in sniffing, t ering, and replay attacks on the IoMT. We have listed the items that were included and excluded and provided a detailed summary of SLR. A thorough analysis of potential gaps has been identified, and the results are visualized for ease of understanding.
Publisher: MDPI AG
Date: 14-02-2023
DOI: 10.3390/TECHNOLOGIES11010031
Abstract: The adaptation of the Internet of Medical Things (IoMT) has provided efficient and timely services and has transformed the healthcare industry to a great extent. Monitoring patients remotely and managing hospital records and data have become effortless with the advent of IoMT. However, security and privacy have become a significant concern with the growing number of threats in the cyber world, primarily for personal and sensitive user data. In terms of IoMT devices, risks appearing from them cannot easily fit into an existing risk assessment framework, and while research has been done on this topic, little attention has been paid to the methodologies used for the risk assessment of heterogeneous IoMT devices. This paper elucidates IoT, its applications with reference to in-demand sectors, and risks in terms of their types. By the same token, IoMT and its application area and architecture are explained. We have also discussed the common attacks on IoMT. Existing papers on IoT, IoMT, risk assessment, and frameworks are reviewed. Finally, the paper analyzes the available risk assessment frameworks such as NIST, ISO 27001, TARA, and the IEEE213-2019 (P2413) standard and highlights the need for new approaches to address the heterogeneity of the risks. In our study, we have decided to follow the functions of the NIST and ISO 270001 frameworks. The complete framework is anticipated to deliver a risk-free approach for the risk assessment of heterogeneous IoMT devices benefiting its users.
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21377
Abstract: The growth of cyberspace world has uprising government agencies in a new way to serve citizen in a proactive, efficient and productive manner. To have an open, stable and vibrant cyberspace, governments should be more resilient to cyber-attacks and able to protect all government agency’s interest in cyberspace. Therefore, the government needs a transformative cyber governance security model to protect valuable government agencies’ information. The model should be able to detect, defend and deter the vulnerabilities, threats and risks that will emerge in the day to day government administration operation. This paper has introduced a study for some existing cyber governance security models. Thus, it helps in determining the main features of the required model.
Publisher: IEEE
Date: 2018
Publisher: IEEE
Date: 2018
Publisher: Foundation of Computer Science
Date: 25-09-2012
DOI: 10.5120/8618-2480
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Springer International Publishing
Date: 2017
Publisher: World Scientific Pub Co Pte Lt
Date: 06-2007
DOI: 10.1142/S0219198907001424
Abstract: I study the robustness of Rubinstein's (1989) E-Mail Game results by varying the information that players can utilize. The article follows one of Morris' (2002) reactions to the E-Mail game "that one should try to come up with a model of boundedly rational behavior that delivers predictions that are insensitive to whether there is common knowledge or a large number of levels of knowledge". Players in my model are presumed to use 'rough inductive reasoning' because they cannot utilize exact information. The information structure in the E-Mail game is generalized and the conditions are characterized under which Rubinstein's results hold. I find that rough inductive reasoning generates a payoff dominant equilibrium where the expected payoffs change continuously (instead of discretely) in the probability of "faulty" communication.
Publisher: Elsevier BV
Date: 03-2008
Publisher: American Economic Association
Date: 02-2006
DOI: 10.1257/002205106776162717
Abstract: Most of us need the services of an expert when our apartment's heating or our washing machine breaks down, or when our car starts to make strange noises. And for most of us, commissioning an expert to solve the problem causes concern. This concern does not disappear even after repair and payment of the bill. On the contrary, one worries about paying for a service that was not provided or receiving some unnecessary treatment. This article studies the economics underlying these worries. Under which conditions do experts have an incentive to exploit the informational problems associated with markets for diagnosis and treatment? What types of fraud exist? What are the methods and institutions for dealing with these informational problems? Under which conditions does the market provide incentives to deter fraudulent behavior? And what happens if all or some of those conditions are violated?
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21361
Abstract: One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability on-demand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.
Publisher: Informa UK Limited
Date: 06-2005
Publisher: American Scientific Publishers
Date: 2018
Publisher: IEEE
Date: 2017
Publisher: IEEE
Date: 2017
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21366
Abstract: It is a known fact that Android mobile phones’ security has room for improvement. Many malicious app developers have targeted android mobile phones, mainly because android as an open operating system provides great flexibility to developers and there are many android phones which do not have the latest security updates. With the update of marshmallow in android, applications request permission only during runtime, but not all users have this update. This is important because user permission is required to perform certain actions. The permissions may be irrelevant to the features provided by an application. The purpose of this research is to investigate the use and security risk of seeming irrelevant permissions in applications available from Google store. Two different applications which seem to ask irrelevant permissions during installation were selected from Google store. To test these applications, static analysis, dynamic analysis and reverse engineering tools were used. Findings show potentially malicious behavior, demonstrating that downloading apps from Google play store do not guarantee security.
Publisher: IEEE
Date: 2019
Publisher: American Scientific Publishers
Date: 10-2016
Publisher: Wiley
Date: 2005
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: IEEE
Date: 09-2013
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer International Publishing
Date: 2018
Publisher: Cold Spring Harbor Laboratory
Date: 18-01-2020
DOI: 10.1101/2020.01.17.910877
Abstract: Strigolactones (SLs) regulate important aspects of plant growth and stress responses. Many erse types of SL occur in plants, but a complete picture of biosynthesis remains unclear. In Arabidopsis thaliana , we have demonstrated that MAX1, a cytochrome P450 monooxygenase, converts carlactone (CL) into carlactonoic acid (CLA), and that LBO, a 2-oxoglutarate-dependent dioxygenase, converts methyl carlactonoate (MeCLA) into a metabolite called [MeCLA+16] Da. In the present study, feeding experiments with deuterated MeCLAs revealed that [MeCLA+16] Da is hydroxymethyl carlactonoate (1’-HO-MeCLA). Importantly, this LBO metabolite was detected in plants. Interestingly, other related compounds, methyl 4-hydroxycarlactonoate (4-HO-MeCLA) and methyl 16-hydroxycarlactonoate (16-HO-MeCLA) were also found to accumulate in lbo mutants. 3-HO-, 4-HO- and 16-HO-CL were detected in plants, but their expected corresponding metabolites, HO-CLAs, were absent in max1 mutants. These results suggest that HO-CL derivatives are predominant SLs in Arabidopsis , produced through MAX1 and LBO.
Publisher: Wiley
Date: 03-2019
DOI: 10.1111/AJAG.12583
Publisher: Elsevier BV
Date: 2001
DOI: 10.2139/SSRN.256694
Publisher: Science Publishing Corporation
Date: 07-10-2018
DOI: 10.14419/IJET.V7I4.15.21434
Abstract: Today’s contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL.
Publisher: InTech
Date: 22-03-2011
DOI: 10.5772/14130
Publisher: IEEE
Date: 2017
Publisher: IEEE
Date: 2017
Publisher: Springer International Publishing
Date: 27-05-2017
Publisher: IEEE
Date: 09-2017
Publisher: Informa UK Limited
Date: 06-01-2019
Publisher: Springer Science and Business Media LLC
Date: 12-2004
Publisher: MDPI AG
Date: 13-04-2023
DOI: 10.3390/JSAN12020036
Abstract: Privacy in Electronic Health Records (EHR) has become a significant concern in today’s rapidly changing world, particularly for personal and sensitive user data. The sheer volume and sensitive nature of patient records require healthcare providers to exercise an intense quantity of caution during EHR implementation. In recent years, various healthcare providers have been hit by ransomware and distributed denial of service attacks, halting many emergency services during COVID-19. Personal data breaches are becoming more common day by day, and privacy concerns are often raised when sharing data across a network, mainly due to transparency and security issues. To tackle this problem, various researchers have proposed privacy-preserving solutions for EHR. However, most solutions do not extensively use Privacy by Design (PbD) mechanisms, distributed data storage and sharing when designing their frameworks, which is the emphasis of this study. To design a framework for Privacy by Design in Electronic Health Records (PbDinEHR) that can preserve the privacy of patients during data collection, storage, access and sharing, we have analysed the fundamental principles of privacy by design and privacy design strategies, and the compatibility of our proposed healthcare principles with Privacy Impact Assessment (PIA), Australian Privacy Principles (APPs) and General Data Protection Regulation (GDPR). To demonstrate the proposed framework, ‘PbDinEHR’, we have implemented a Patient Record Management System (PRMS) to create interfaces for patients and healthcare providers. In addition, to provide transparency and security for sharing patients’ medical files with various healthcare providers, we have implemented a distributed file system and two permission blockchain networks using the InterPlanetary File System (IPFS) and Ethereum blockchain. This allows us to expand the proposed privacy by design mechanisms in the future to enable healthcare providers, patients, imaging labs and others to share patient-centric data in a transparent manner. The developed framework has been tested and evaluated to ensure user performance, effectiveness, and security. The complete solution is expected to provide progressive resistance in the face of continuous data breaches in the patient information domain.
Publisher: Wiley
Date: 07-2006
Publisher: IEEE
Date: 12-2016
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Springer International Publishing
Date: 09-09-2018
Publisher: Wiley
Date: 14-04-2008
Publisher: IEEE
Date: 2019
Publisher: IEEE
Date: 2018
Publisher: Elsevier BV
Date: 09-1997
Publisher: IACSIT Press
Date: 2013
Publisher: IEEE
Date: 2019
Publisher: MDPI AG
Date: 29-05-2023
DOI: 10.3390/S23115174
Abstract: The privacy and security of patients’ health records have been an ongoing issue, and researchers are in a race against technology to design a system that can help stop the compromising of patient data. Many researchers have proposed solutions however, most solutions have not incorporated potential parameters that can ensure private and secure personal health records management, which is the focus of this study. To design and develop a solution, this research thoroughly investigated existing solutions and identified potential key contexts. These include IOTA Tangle, Distributed Ledger Technology (DLT), IPFS protocols, Application Programming Interface (API), Proxy Re-encryption (PRE), and access control, which are analysed and integrated to secure patient medical records, and Internet of Things (IoT) medical devices, to develop a patient-based access management system that gives patients full control of their health records. This research developed four prototype applications to demonstrate the proposed solution: the web appointment application, the patient application, the doctor application, and the remote medical IoT device application. The results indicate that the proposed framework can improve healthcare services by providing immutable, secure, scalable, trusted, self-managed, and traceable patient health records while giving patients full control of their own medical records.
Publisher: American Scientific Publishers
Date: 2018
Publisher: Academy of Taiwan Information Systems Research
Date: 12-2019
DOI: 10.7903/IJECS.1732
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Wiley
Date: 23-08-2018
Publisher: IEEE
Date: 08-2014
No related grants have been discovered for Bharanidharan Shanmugam.