ENGINEERING RESEARCH PAPERS

cyber security IEEE PAPER 2017




Poster: Flow Inspection Scheduling for Cyber Security on Software-Defined Networks
free download

Abstract Software-defined networking (SDN) is an emerging network technology that decouples the control plane from the data plane. Using SDN, a fine-grained flow-level inspection for cyber security can be performed by capturing suspicious packets on the

Advancing the Micro-CI Testbed for IoT Cyber - Security Research and Education
free download

Abstract Physical testbeds offer the ability to test out cybersecurity practices, which may be dangerous to implement in a real-life scenario. They also provide a means to educate students and researchers on effective cyber -defence practices. However, the majority of

Jail, Hero or Drug Lord? Turning a Cyber Security Course Into an 11 Week Choose Your Own Adventure Story
free download

Abstract In this paper we argue that narrative and story are important elements of gamification, and we describe a framework that we have developed which adds a story to an 11 week cyber security course. The students play the part of a new IT security employee at a

Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cyber Security
free download

In a public service announcement on March 17, 2016, the Federal Bureau of Investigation (FBI) jointly with the Department of Transportation and the National Highway Traffic Safety Administration, released a warning over the increasing vulnerability of motor vehicles to

A Survey on Supply Chain Cyber Security
free download

Abstract Supply chain cyber security refers to efforts to enhance cyber security within the supply chain. It is a subset of supply chain security and is focused on the management of cyber security requirements for information technology systems, software and networks,

Adversarial Reinforcement Learning in a Cyber Security Simulation.
free download

Abstract: This paper focuses on cyber - security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and Critical Infrastructures- Cyber Security Requirements from a Utilitys Perspective
free download

Abstract Increasing digitization requires advanced ICT security in particular in the field of critical infrastructures. Utility companies have to maintain and operate an infrastructure, which shall guarantee security of supplies to people, companies and organizations in their

Role of Data Mining in Cyber Security
free download

Abstract: Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences From this Operations Research, Engineering, and Cyber Security : Trends in Applied Mathematics and Technology brings together a variety of mathematical methods and theories with several applications from a number of disciplines. It discusses new scientific perspectives of an

Smart Grid Cyber Security Challenges: Overview and Classification
free download

4 Protecting Industrial Control Systems. Annex I, ENISA, 2011. technologie w biznesie 56 e mentor nr 1 (68) be classified according to different criteria, for example: accidental or deliberate actions (safety failures, equipment failures, carelessness, natural disasters),

Trade-offs between digital innovation and cyber - security
free download

ABSTRACT With increasing economic pressures and exponential growth in technological innovations, companies are increasingly relying on digital technologies to fulfill their innovation and value creation agendas. At the same time, based on the increasing levels of

Cyber Threat Intelligence for Supporting the ATM Security Management.
free download

The cyber threat intelligence is a prevention tool for ATM security as it can help identify threat patterns and prevent attacks across Internet. The ability to gather cyber threat information from Internet and correlate it with data coming from ATM systems can enhance ATM security , lead Local servers still at risk Cyber Security Malaysia
free download

P Mu - New Sabah Times, 2017 - eprints.ums.edu.my He advised the youth to use tile internet and social media wisely to help undersland the current issues at home and abroad. The Cyber Security Challenge is one of the collaboration between the Faculty of Com-· puting and Informatics VMS and Malaysian

Evolving Cyber Security Challenges to the Smart Grid Landscape
free download

Abstract: Integrating smart solutions into the existing power infrastructure promises to offer attractive capabilities of dynamic monitoring, measuring and even controlling power flows in real time that can help identify losses and trigger appropriate technical and managerial

Every business has duties of care in the field of cyber security . Cyber security guide for businesses
free download

Inadequate cyber security may lead to commercial secrets and personal data being divulged through hacking or human error. Major disruptions may even jeopardise the business continuity of your organisation. Cyber security is the responsibility of your organisations

Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
free download

ABSTRACT An intrusion detection system is software that monitors a single or a network of computers for malicious activities that are aimed at stealing or censoring information or corrupting network protocols. Most technique used in todays intrusion detection system are

A Survey of Approaches Reconciling between Safety and Security Requirements Engineering for Cyber -Physical Systems
free download

Abstract The fields of safety and security use different conceptual standards and methods. As a consequence, these two separate but related research areas utilize different approaches. Addressing the integration between safety and security concerns in this

Methodology of Cyber Security Assessment in the Smart Grid
free download

Abstract The introduction of smart grid, which is an innovative application of digital processing and communications to the power grid, might lead to more and more cyber threats originated from IT systems. In other words, The Energy Management System (EMS)

Exploring Cyber Security Policy Options in Australia
free download

SUMMARYOIn December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security focused 360º Discovery Exercise in Canberra. The exercise used plausible scenarios to explore the challenges Australia

Cyber Security : Nonlinear Stochastic Models for Predicting the Exploitability
free download

Abstract Obtaining complete information regarding discovered vulnerabilities looks extremely difficult. Yet, developing statistical models requires a great deal of such complete information about the vulnerabilities. In our previous studies, we introduced a new concept In spite of the increasing efforts in designing preventive security measures, new attack types arise on a regular basis. The reasons for these include: programming errors, design flaws, insider threats, and the inadequate security tools being used by organizations. Additionally,

Analysis and Assessment of Situational Awareness Models for National Cyber Security Centers.
free download

Abstract: National cyber security centers (NCSCs) are gaining more and more importance to ensure the security and proper operations of critical infrastructures (CIs). As a prerequisite, NCSCs need to collect, analyze, process, assess and share security -relevant information

On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts
free download

ABSTRACT Data mining is well-known for its ability to extract concealed and indistinct patterns in the data, which is a common task in the field of cyber security . However, data mining is not always used to its full potential among cyber security community. In this paper,

A Review of Cyber -Physical Energy System Security Assessment
free download

Abstract Increasing penetration of renewable energy resources (RES) and electrification of services by implementing distributed energy resources (DER) has caused a paradigm shift in the operation of the power system. The controllability of the power system is predicted to

Human behavior from Cyber Security perspective
free download

Opinnäytetyön tavoitteena oli pohtia ihmisen käyttäytymiseen vaikuttavia asioita sekä arvioida, voisiko niitä huomioida aikaisempaa paremmin tietoturvakäytäntöjen teossa. Työ keskittyy ihmisen käyttäytymiseen silloin, kun hän joutuu manipuloinnin kohteeksi. Miksi

Cyber Issues Related to Social and Behavioral Sciences for National Security
free download

and confusion would further serve to reverse their asymmetric advantage. Similarly, the UKs
National Cyber Security Strategy 2016-2021 says that [the] Government will ensure that the
human and behavioural aspects of cyber are given sufficient attention, and that systems Bandi, THE PROBLEMS OF CYBER - SECURITY IN UKRAINE
free download

Information Age creates a knowledge-based society surrounded by a hightech global economy that brings significant benefits for individual, small and large social groups. Advantages of the new information society are obvious. A worldwide Internet network is a CYBER SECURITY IN BUSINESS
free download

Nowadays all spheres of human society depend on new informational technologies. And business is also closely connected with informational technologies. So, human society is confronted with new great challenges due to the developing of high technologies. People

Introduction to Cyber Security
free download

Internet is among the most important inventions of the 21 st century which have affected our life. Today internet have crosses every barrier and have changed the way we use to talk, play games, work, shop, make friends, listen music, see movies, order food, pay bill, greet

ARTINALI: dynamic invariant detection for cyber -physical system security
free download

ABSTRACT Cyber -Physical Systems (CPSes) are being widely deployed in security -critical scenarios such as smart homes and medical devices. Unfortunately, the connectedness of these systems and their relative lack of security measures makes them ripe targets for

An Advanced Security Event Visualization Method for Identifying Real Cyber Attacks
free download

Abstract: Most organizations deploy and operate intrusion detection system (IDS) on their networks in order to defend their vital computer and network resources from malicious cyber attackers. Although IDS has been contributed to the improvement of network security , there

Internet of Things Behavioral-Economic Security Design, Actors Cyber War
free download

Abstract Using security incident history we identify threats to and using the IoT and other ubiquitous devices emerging since 2012, gaining widespread recognition in 2016, and only lightly addressed in either IoT security literature or the press. We show the IoT has likely

Testimony before the US-China Economic and Security Review Commission Hearing on Chinas Information Controls, Global Media Influence, and Cyber
free download

Thank you for the invitation to provide testimony to the US-China Security and Economic Commission on the topic of Chinas global media influence and censorship. Censorship is pervasive in China and affects much of the media that the Chinese public regularly

Towards network coding for cyber -physical systems: Security challenges and applications
free download

Abstract This survey summarizes the research on the applications and security challenges of network coding in wireless networks and Cyber -Physical Systems. Network coding technique generalizes the store-and-forward routing by mixing the received packets at the

How Does Cyber Crime Affect Firms? The Effect of Information Security Breaches on Stock Returns.
free download

Abstract A widely debated issue in recent years is cyber crime. Breaches in security of accessibility, integrity and confidentiality of information involve potentially high explicit and implicit costs for firms. This paper investigates the impact of information security breaches on

On Automatic Cyber Range Instantiation for Facilitating Security Training
free download

Abstract As cyber attacks are happening worldwide nowadays, cybersecurity training and education become highly important. In modern training programs, controlled training environments, so-called cyber ranges, appear as an efficient way for trainees to gain

Cyber Security Analysis Using Policies Procedures
free download

Abstract: Internet provided us unlimited options by enabling us with constant dynamic information that changes every single minute through sharing of information across the globe. Many organizations rely on information coming going out from their network. Intelligent Techniques and Strategies for Effective Critical Information Infrastructures Protection, Privacy and Cyber Security
free download

There are major emerging challenges for critical information Infrastructures protection, cyber security and Homeland Security due to the significant increase and complexity in global cyber infrastructures and malicious activities. These along with subversive and stealth

Application of Cyber Situational Awareness and Cyber Security in Connected Vehicles
free download

University of Central Lancashire (UCLan) Application of Cyber Situational Awareness and Cyber Security in Connected Vehicles Dr Mahmoud Hashem Eiza Tuesday 20/06/2017 CyberSA London 2017 intelligent [5]. ? In April 2017, UK 5*StarS Consortium is established to launch

Cyber security in Kosovo
free download

Abstract Internet cyber space represents one of the most important drivers of innovation, growth and competitiveness of national economies worldwide. This cyber freedom and human values should be protected in the same way as in the offl ine world. Digital

Cyber Crimes Becoming Threat to Cyber Security
free download

ABSTRACT Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the internet, cyber space and the worldwide web. The growing danger from crimes committed against computers, or against information on computers by

A STUDY ON CYBER SECURITY IN E-GOVERNANCE WITH REFERENCE TO AREAS OF THANJAVUR DISTRICT-TAMIL NADU
free download

ABSTRACT This paper discuss on the cyber security in e-governance. The study determines the cause for low participation of people in egovernance. The study also find out, the awareness, acceptance, security of e-governance and attitude towards sustainable

Cyber Security and Policy
free download

The realm of digital communications has fostered unforeseen changes in the expansion of the economy, societal connectivity and even broad political change. A 2011 report issued by McKinsey Global Institute stated that over two billion people are connected to the internet

NEW CYBER SECURITY REGULATIONS PROMULGATED BY NEW YORKS DEPARTMENT OF FINANCIAL SERVICES
free download

Effective 1 January 2017, the New York State Department of Financial Services (DFS) is expected to implement new cyber security requirements which require regulated financial companies doing business in New York to adopt comprehensive written programmes and

Artificial Intelligence in Cyber Security
free download

ABSTRACT Cyber -attackers unit investment automation technology to launch strikes, whereas many organisations unit still victimisation manual efforts to mixture internal security findings and contextualising them with external threat data. Victimisation these ancient ways

International cyber security challenges
free download

Summary-The opportunities provided by the information and communications technology, with a special emphasis on the Internet, have become an integral part of life. However, are we sufficiently aware and prepared as individuals, nations or the international community for

Safety-Driven Cyber Security Engineering Approach Applied to OTA
free download

ABSTRACT Automotive ECUs rely on the convenience of flashing new software updates both during the development and the post production phases, when updates are needed to fix bugs or add functionality. As vehicles become connected to the Internet and to smart CERT-RO International Conference: New Global Challenge in Cyber Security
free download

The event was held under the aegis of the European program European Cyber Security Month and it addressed themes from cybersecurity field like initiatives and best practices for information security , challenges and developments on cybersecurity. International Journal

Cyber Security Understanding the Cyber World
free download

Tip: Every time an employee clicks on an external Website it is like opening a window into your organization. Work with your IT personnel to ensure that the department controls what windows can be opened and who or what is coming through them. Early detection is the key

theory. My primary interests are in cyber security , especially in the context of CPSes and IoTs.
free download

In the early stage of my research, I gained expertise in the security of general computing environments, with the design of computer architecture, virtual machines, and operating systems [2][3]. Then I developed a keen interest in cyber -physical systems as attackers can

Cyber Security Policy Model for Academic Institutions-A Case Study
free download

Abstract Cyber Security is a buzz word in communication and IT world. Our aim is to analyze the present implementation of security policy model in Academic Institutions-Indian Perspective. Also we discussed about the various security models. We found that it is

Teaching Business Systems Analysis to Cyber - Security Managers: a Socio-Technical perspective
free download

Abstract. This paper reports a teaching experience of business systems analysis (BSA) to cyber - security management students. This unit places great emphasis on connecting security function to business requirements from a socio-technical (ST) perspective. Specific

Researching the Applicability of Mathematical Approaches for Modeling Cyber Security Processes
free download

Abstract. As the title implies the article substantiates the applicability of mathematical approaches for modeling cyber security processes. The article gives a detailed analysis of applicability of Markov processes and Game theory approach. In addition, the authors give

Cyber security in nuclear power plants and its portability to other industrial infrastructures
free download

Stromerzeugung ist verstärkt auf dezentrali sierte und vernetzte Rechensysteme angewie sen. Begriffe wie Industrial Internet of Things des Industrial Internet Consortium (IIC) und Industrie 4.0 bahnen sich heute ihren Weg auch in diese bedeutende Industriebranche.

ENHANCING CYBER SECURITY OF ONLINE ACCOUNTS VIA A NOVEL PROTOCOL AND NEW TECHNIQUES
free download

ABSTRACT The financial world has gotten more sophisticated. People need to make informed financial decisions, so they seek out efficient tools to help them manage their finances. Traditionally, money management software has been available for individuals to

Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
free download

Abstract In recent years a wide range of wearable IoT healthcare applications have been developed and deployed. The rapid increase in wearable devices allows the transfer of patient personal information between different devices, at the same time personal health CSCML, the International Symposium on Cyber Security Cryptography and Machine Learning, is an international forum for researchers, entrepreneurs, and practitioners in the theory, design, analysis, implementation, or application of cyber security , cryptography, and

Submission Topic: Cyber Security
free download

Abstract: Recent conflicts and political incidents, such as Operation Orchard, have shown that no future conflict is likely to be fought without a cyber element. However, establishing effective defensive measures against cyber attacks is a difficult and resource-consuming

MITIGATE: An Innovative Cyber - Security Maritime Supply Chain Risk Management System.
free download

Abstract Despite the importance of Critical Information Infrastructures (CIIs) and dynamic ICT based maritime Supply Chains (SCs) for ports operations, state-of-the-art Risk Management (RM) methodologies for maritime environments pay limited attention to cyber - security and do

FAST-CCS: Finding a Solution to Cloud Cyber Security
free download

Abstract Cloud computing has been with us for over a decade now. Cloud based systems present a multiplicity of attack vectors. Cloud users frequently fail to grasp the complexity of cloud ecosystems, and fail to monitor properly what is going on within their cloud ecosystem.

Cyber security enhancing CAN transceivers
free download

This paper focuses on the in-vehicle network (IVN) layer. IVN cybersecurity and the countermeasures are a well-studied topic. Previously, intrusion detection and prevention systems based on either the CAN ID information [3] or on the verification of CMAC value [4]

STUDY OF CYBER SECURITY THROUGH DATA MINING
free download

ABSTRACT In this paper, we primarily focus on using data mining techniques for the purpose of securing the data from unauthorized and external attacks which means having cyber security of data. Cyber security is the area that deals with protecting from cyber

Preparation Sheet for simulation: Simulation model on cyber security attacks. Simulation carried out by Dr. Sameh Aboul Enein, AUC faculty and alumnus for the
free download

Preparation Sheet for Simulation. Topic: Cyber Security Attacks. February 17th 2016, (14:00 15:30 / 15:45 17:15). Simulation Model on Cyber Security Attacks. Three students should
volunteer to chair. Meanwhile, the rest of the students will choose a side they want to support Information technology (IT) is integrated into the fabric of a business, and without business there is no requirement for IT. In fact, there should not be IT processes without mirror business processes; the processes are interwoven to support the solid financial growth and

How Big Data Can Improve Cyber Security
free download

Abstract-The research presented in this paper offers how Big Data can improve cybersecurity. Cybersecurity concerns affect organizations across virtually all industries, including retail, financial, communications and transportation. Big Data and analytics are

Smart Grid Cyber Security : Advice to Policy Makers on European
free download

The European power system is undergoing constant evolution since the advent of the smart grids vision, where smart technology is about to become mainstream in the architecture of electricity grids. New functionalities, real-time sensing, and autonomous interventions of the

AN ANALYSIS OF CYBER CRIME AND INTERNET SECURITY
free download

ABSTRACT This objectives study is to be review the issues involved of internet security and cyber crime. Apparently this possessed a paradox since the technological advances made in both of software and hardware to increased internet security measures are also available

The Effects of Cyber - Security on Healthcare Industry
free download

Abstract Cyber -attacks today are targeting healthcare industries as the most preferred attacked industry. This paper introduced a comparative study of the different applications of cyber - security , and the changes in levels of risk for different industries. The study will focus

INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK
free download

ABSTRACT The National Institute of Standards and Technology (NIST) has issued a framework to provide guidance for organizations within critical infrastructure sectors to reduce the risk associated with cyber security . The framework is called NIST Cyber Security reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting,

Analysis of Human Factors in Cyber Security : A Case Study of Anonymous Attack on Hbgary
free download

ABSTRACT Purpose: This paper critically analyses the human factors or behaviours as major threats to cyber security . Focus is placed on the usual roles played by both the attackers and defenders (the targets of the attacker) in cyber threats pervasiveness and the

CYBER SECURITY METRICS
free download

Palo Alto, California, the President of the United States signed an executive order that would enable private firms to share information and access classified information on cyber attacks (Obama, 2015; Superville Mendoza, 2015). The increasing number of cyber attacks that is

Towards a Game-theoretic Framework for Intelligent Cyber - security Alert Allocation?
free download

Abstract. In recent years, there have been a number of successful cyber attacks on enterprise networks by malicious actors. These attacks generate alerts which must be investigated by cyber analysts to determine if they are an attack. Unfortunately, there are

analysis of most popular open source Content Management Systems with focus on WordPress and proposed integration of artificial intelligence cyber security
free download

Abstract: Web sites are major sources of information today and Internet is dominating platform for deployment of various applications built for worldwide audience. Modern Content Management Systems (CMS) play major role in that situation since they enable

Dont Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber - security Alerts
free download

Abstract In recent years, there have been a number of successful cyber attacks on enterprise networks by malicious actors. These attacks generate alerts which must be investigated by cyber analysts to determine if they are an attack. Unfortunately, there are magnitude more

DIGITAL DARK AGES AS A MAJOR CYBER SECURITY THREAT
free download

Summary: Within this paper the notion of the digital dark ages is presented in terms of cyber security . In addition to elaborating on all issues relevant to this newly identified problem, certain new views and solutions not found in technical literature or popular

The cyber security challenge: a comparative analysis
free download

Page 1. Department of Political Sciences Security Studies Chair TITLE The Cyber Security Challenge: A Comparative Analysis TUTOR Prof. Gen. Carlo Magrassi Page 2. 2 Page 3. 3 Table
of Contents Introduction 5 Chapter 110 Critical Infrastructures and Cyber

PROMOTING CYBER SECURITY : ESTONIA AND LATVIA AS NORM-SETTERS
free download

Abstract This article investigates development of efforts to battle cyber security threats. In the recent decades we observed drastic increase in use of cyber capabilities and warfare recent events in the US is a clear example of how hacking can directly influence something

Cyber Security Behaviour among Higher Education Students in Malaysia
free download

Abstract This study explores the current state of cyber security behaviour among higher education students in Malaysia. The respondents cyber security behaviour was assessed in the following aspects: password usage, phishing, social engineering, online scam and

DATABASE SECURITY USING CYBER SECURITY
free download

Abstract A new approach has been shown, implemented for providing security in an organization for the long term goal. Primarily steganography techniques have been used (including email authentication) to enhance the security of data in one organization.

FREE IEEE PAPERS
IEEE PROJECTS
GLASS CLIMBING ROBOT
GPS TRACKING SYSTEM
ROBOTICS ARMY
CLOUD SECURITY
SOLAR ENERGY
SECURITY SYSTEM

BIG DATA
CLOUD COMPUTING
IOT-INTERNET OF THINGS
ROBOTICS
CONTACT US





NEW IEEE PROJECTS