دانلود و نمایش مقالات مرتبط با Cybersecurity::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2
نتیجه جستجو - Cybersecurity

تعداد مقالات یافته شده: 32
ردیف عنوان نوع
1 A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensics applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of fraudulent activities. In this work, a new methodology is proposed to support investigators during the analysis process, correlating evidence found through different forensics tools. The methodology was implemented through a system able to add semantic assertion to data generated by forensics tools during extraction processes. These assertions enable more effective access to relevant information and enhanced retrieval and reasoning capabilities.
Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity
مقاله انگلیسی
2 The theory of innovation and innovative development. AI scenarios in Russia
نظریه نوآوری و توسعه ابتکاری. سناریوهای هوش مصنوعی در روسیه-2020
This article explores different scenarios of implementing artificial intelligence (AI) in Russia. The relevance of the research and the range of problems addressed in it consist in the fact that Russia is not fully realizing the potential of innovative economic development. AI can accelerate the innovative development of Russia’s economy, but it entails the risks of its destabilization and therefore requires further research. This article contributes to the theory of innovation, thereby specifying the logic of the optimization of innovative development and the optimal scale in a strategy of risk management. The effectiveness of the digital modernization of Russia’s economy based on AI will be remarkably high. The index of global competitiveness achieves maximum value (7 points), increasing by 1.52 times. The innovation index of the economy grows 1.15 times. The unemployment level will rise 1.62 times, and the level of cybersecurity will decrease 6.52 times. Both advantages from the implementation of AI and risks of digital modernization of the Russian economy are determined. The significance of the research consists in the application of the offered method for determining the optimal intervals of AI usage in Russia. The key conclusion that can be drawn from the research is the justification of the need to promote the modernization of the Russian economy on the basis of AI with a view to accelerating its innovative development until 2024. The consequences of the research are involved with the improvement of practices of public regulation of the innovative development of the Russian economy by promoting the dissemination of AI according to recommendations proposed by the authors.
Keywords: artificial intelligence (AI) | technology | cybersecurity | economic development | risk management | Russia
مقاله انگلیسی
3 Manufacturing big data ecosystem: A systematic literature review
ساخت اکوسیستم داده های بزرگ: مروری بر ادبیات سیستماتیک-2020
Advanced manufacturing is one of the core national strategies in the US (AMP), Germany (Industry 4.0) and China (Made-in China 2025). The emergence of the concept of Cyber Physical System (CPS) and big data imperatively enable manufacturing to become smarter and more competitive among nations. Many researchers have proposed new solutions with big data enabling tools for manufacturing applications in three directions: product, production and business. Big data has been a fast-changing research area with many new opportunities for applications in manufacturing. This paper presents a systematic literature review of the state-of-the-art of big data in manufacturing. Six key drivers of big data applications in manufacturing have been identified. The key drivers are system integration, data, prediction, sustainability, resource sharing and hardware. Based on the requirements of manufacturing, nine essential components of big data ecosystem are captured. They are data ingestion, storage, computing, analytics, visualization, management, workflow, infrastructure and security. Several research domains are identified that are driven by available capabilities of big data ecosystem. Five future directions of big data applications in manufacturing are presented from modelling and simulation to realtime big data analytics and cybersecurity.
Keywords: Smart manufacturing | Big data | Cloud computing | Cloud manufacturing | Internet of things | NoSQL
مقاله انگلیسی
4 A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensics applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of fraudulent activities. In this work, a new methodology is proposed to support investigators during the analysis process, correlating evidence found through different forensics tools. The methodology was implemented through a system able to add semantic assertion to data generated by forensics tools during extraction processes. These assertions enable more effective access to relevant information and enhanced retrieval and reasoning capabilities.
Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity
مقاله انگلیسی
5 Port cybersecurity and threat: A structural model for prevention andpolicy development
امنیت سایبری و تهدید بندر: الگوی ساختاری برای پیشگیری و تدوین سیاست ها-2020
Most port operators have increasingly integrated cybertechnology into port activities to increase theircompetitiveness; unfortunately, this digitalization becomes the major vulnerability for the emergingcyberthreat. To help port policymakers develop cybersecurity measures, this study conceptualized anddeveloped three dimensions of port cybersecurity hygiene (i.e. human, infrastructure, and procedurefactors) and investigated the relationships between port cybersecurity hygiene and cyberthreats (i.e.hacktivism, cyber criminality, cyber espionage, cyber terrorism, and cyber war). A questionnaire surveywas used to collect data from all international container port operators and shipping lines with branchesin Thailand, and the proposed relationships were tested by structural equation modeling. The resultsindicated that container ports tended to encounter hacktivism when their human, infrastructure, andprocedure factors were vulnerable. The weakness of the human factor could also lead to cyber terrorism,while the deficiency of the infrastructure factor could lead to cyber criminality. Moreover, containerports were likely to be harmed by cyber espionage if their procedure factor was poorly implemented.Hence, the provision of training and education to all port workers, including top executives, managers,and supervisors, are necessary to ensure a cyberthreat-awareness culture at all organizational levels.Improving cybersecurity equipment could prevent unauthorized access to port business data and keepimportant information secure, while the ISPS Code-based procedures and other preventive measuresshould be strictly implemented by container ports to reduce the risk of cyberthreats.
Keywords: Cyberthreat | Port cybersecurity hygiene | Cybertechnology | Prevention and policy development | Port digitalization | Structural equation modeling
مقاله انگلیسی
6 “Hello are you available?” Dealing with online frauds and the role of forensic science
"سلام آیا شما در دسترس هستید؟" مقابله با کلاهبرداری آنلاین و نقش علم پزشکی قانونی-2020
On August 6, 2019, the 119 members of the School of criminal justice, forensic science and criminology at the University of Lausanne were the target of an online scammer. His/her modus operandi consisted of email masquerading as the Director of the School in an attempt to induce the victims to buy digital gift cards and to transmit the card usage code to the perpetrator. The first author of this paper is the Director of the School, and the second is an expert in digital forensic science and a professor of the School. They worked together in real time to deal with the fraud. Because the fraud occurred in a School of forensic science and criminology, it raised many questions on a variety of overlapping dimensions. The objective of this study was, therefore, to draw lessons from this case from several perspectives ranging from forensic science to cybersecurity, and from practical to academic. The response to the incident has been treated in four typical distinguishable phases: (1) fraud detection; (2) crisis management; (3) post-incident analysis; and (4) reporting to different communities. We conclude this paper by taking lessons from the case to express the essential role of forensic knowledge and crime analysis in interpreting the information conveyed by digital traces to develop innovative cross-disciplinary models for preventing, detecting, analysing, investigating and responding to online fraud.
Keywords: Online scam | Crime analysis | Digital forensics | Routine activities | Digitalization
مقاله انگلیسی
7 A multi-layered blockchain framework for smart mobility datamarkets
یک چارچوب بلاکچین چند لایه برای بانک اطلاعاتی تحرک هوشمند-2019
Blockchain has the potential to render the transaction of information more secure and transparent. Nowadays, transportation data are shared across multiple entities using heterogeneous mediums, from paper collected data to smartphone. Most of this data are stored in central servers that are susceptible to hacks. In some cases shady actors who may have access to such sources, share the mobility data with unwanted third parties. A multi-layered Blockchain framework for Smart Mobility Data-market (BSMD) is presented for addressing the associated privacy, security, management, and scalability challenges. Each participant shares their encrypted data to the blockchain network and can transact information with other participants as long as both parties agree to the transaction rules issued by the owner of the data. Data ownership, transparency, auditability and access control are the core principles of the proposed blockchain for smart mobility data-market. In a case study of real-time mobility data sharing, we demonstrate the performance of BSMD on a 370 nodes blockchain running on heterogeneous and geographicallyseparated devices communicating on a physical network. We also demonstrate how BSMD ensures the cybersecurity and privacy of individual by safeguarding against spoofing and message interception attacks and providing information access management control.
Keywords: Blockchain | Privacy | Cybersecurity | Mobility | Big Data
مقاله انگلیسی
8 Snatched secrets: Cybercrime and trade secrets modelling a firms decision to report a theft of trade secrets
اسرار ربوده شده: جرایم سایبری و اسرار تجاری مدل سازی تصمیم یک شرکت برای گزارش سرقت اسرار تجاری-2019
Cybercrime and economic espionage are increasing problems for firms. We build on US FBI policy to frame the interaction between a cybercrime victim firm and a government security agency. We bring together several strands in the literature to model the strategies of the firm, which has suffered a cy- ber breach and theft of trade secrets, and the government security agency, which must investigate and prosecute crimes. We investigate the interactions between these two players, in which the firm has pri- vate information about its cybersecurity investment. This investment level is unknown to the security agency, which must nonetheless decide how to prioritize reported crime. We model this asymmetric in- formation problem within a game theoretic signaling framework derived from Becker’s work in crime and punishment. We suggest that such a framework can inform policy to encourage security investments by firms and more efficient resource utilization by security agencies. We particularly focus on an illustrative stylized example to highlight how our modelling approach can be helpful. In this example we compare two worlds; one where all security breaches become public knowledge and another where only reported breaches become public knowledge. We then formulate two potentially testable Hypotheses and several implications of these Hypotheses. Case studies and a policy analysis further highlight how our framework plays out in reality
Keywords: Cyber security | Cybercrime | Trade secrets | Economic espionage | Cyber breaches
مقاله انگلیسی
9 Policy specification and verification for blockchain and smart contracts in 5G networks
مشخصات و تأیید خط مشی قراردادهای بلاکچین و هوشمند در شبکه های 5G-2019
Blockchain offers unprecedented opportunities for innovation in financial transactions. A whole new world of opportunities for banking, lending, insurance, money transfer, investments, and stock markets awaits. However, the potential for wide-scale adoption of blockchain is hindered with cybersecurity and privacy issues. We provide an overview of the risks and security requirements and give an outlook for future research that could be helpful in solving some of the challenges. We also present an approach for policy specification and verification of financial transactions based on smart contracts.
Keywords: Blockchain | Security policy | Smart contract | 5G networks
مقاله انگلیسی
10 Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches
حمله و تشخیص ناهنجاری در سنسورهای IoT در سایت های IoT با استفاده از روشهای یادگیری ماشین-2019
Attack and anomaly detection in the Internet of Things (IoT) infrastructure is a rising concern in the domain of IoT. With the increased use of IoT infrastructure in every do- main, threats and attacks in these infrastructures are also growing commensurately. De- nial of Service, Data Type Probing, Malicious Control, Malicious Operation, Scan, Spying and Wrong Setup are such attacks and anomalies which can cause an IoT system failure. In this paper, performances of several machine learning models have been compared to predict attacks and anomalies on the IoT systems accurately. The machine learning (ML) algorithms that have been used here are Logistic Regression (LR), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), and Artificial Neural Network (ANN). The evaluation metrics used in the comparison of performance are accuracy, precision, recall, f1 score, and area under the Receiver Operating Characteristic Curve. The system obtained 99.4% test accuracy for Decision Tree, Random Forest, and ANN. Though these techniques have the same accuracy, other metrics prove that Random Forest performs comparatively better.
Keywords: Internet of Things (IoT) | Machine Learning | Cybersecurity | Anomaly detection
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi