ردیف | عنوان | نوع |
---|---|---|
1 |
A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020 Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military
investigation and represent a fundamental tool to support cyber-security. Investigators use a variety
of techniques and proprietary software forensics applications to examine the copy of digital
devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is
carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that
involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of
fraudulent activities. In this work, a new methodology is proposed to support investigators during the
analysis process, correlating evidence found through different forensics tools. The methodology was
implemented through a system able to add semantic assertion to data generated by forensics tools
during extraction processes. These assertions enable more effective access to relevant information and
enhanced retrieval and reasoning capabilities. Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity |
مقاله انگلیسی |
2 |
Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments
به سمت امنیت و حفظ حریم خصوصی برای هوش مصنوعی لبه در محیط های بازاریابی دیجیتال مبتنی بر IoT / IoE-2020 Abstract—Edge Artificial Intelligence (Edge AI) is a crucial
aspect of the current and futuristic digital marketing Internet of
Things (IoT) / Internet of Everything (IoE) environment.
Consumers often provide data to marketers which is used to enhance
services and provide a personalized customer experience (CX).
However, use, storage and processing of data has been a key concern.
Edge computing can enhance security and privacy which has been
said to raise the current state of the art in these areas. For example,
when certain processing of data can be done local to where
requested, security and privacy can be enhanced. However, Edge AI
in such an environment can be prone to its own security and privacy
considerations, especially in the digital marketing context where
personal data is involved. An ongoing challenge is maintaining
security in such context and meeting various legal privacy
requirements as they themselves continue to evolve, and many of
which are not entirely clear from the technical perspective. This
paper navigates some key security and privacy issues for Edge AI in
IoT/IoE digital marketing environments along with some possible
mitigations. Keywords: edge security | edge privacy | edge AI | edge intelligence | artificial intelligence | AI | machine learning | ML | IoT | IoE | edge | cybersecurity | legal | law | digital marketing | smart | GDPR | CCPA | security | privacy |
مقاله انگلیسی |
3 |
The theory of innovation and innovative development. AI scenarios in Russia
نظریه نوآوری و توسعه ابتکاری. سناریوهای هوش مصنوعی در روسیه-2020 This article explores different scenarios of implementing artificial intelligence (AI)
in Russia. The relevance of the research and the range of problems addressed in it consist in the
fact that Russia is not fully realizing the potential of innovative economic development. AI can
accelerate the innovative development of Russia’s economy, but it entails the risks of its
destabilization and therefore requires further research. This article contributes to the theory of
innovation, thereby specifying the logic of the optimization of innovative development and the
optimal scale in a strategy of risk management. The effectiveness of the digital modernization of
Russia’s economy based on AI will be remarkably high. The index of global competitiveness
achieves maximum value (7 points), increasing by 1.52 times. The innovation index of the
economy grows 1.15 times. The unemployment level will rise 1.62 times, and the level of
cybersecurity will decrease 6.52 times. Both advantages from the implementation of AI and risks
of digital modernization of the Russian economy are determined. The significance of the
research consists in the application of the offered method for determining the optimal intervals of
AI usage in Russia. The key conclusion that can be drawn from the research is the justification of
the need to promote the modernization of the Russian economy on the basis of AI with a view to
accelerating its innovative development until 2024. The consequences of the research are
involved with the improvement of practices of public regulation of the innovative development
of the Russian economy by promoting the dissemination of AI according to recommendations
proposed by the authors. Keywords: artificial intelligence (AI) | technology | cybersecurity | economic development | risk management | Russia |
مقاله انگلیسی |
4 |
Manufacturing big data ecosystem: A systematic literature review
ساخت اکوسیستم داده های بزرگ: مروری بر ادبیات سیستماتیک-2020 Advanced manufacturing is one of the core national strategies in the US (AMP), Germany (Industry 4.0) and
China (Made-in China 2025). The emergence of the concept of Cyber Physical System (CPS) and big data imperatively
enable manufacturing to become smarter and more competitive among nations. Many researchers
have proposed new solutions with big data enabling tools for manufacturing applications in three directions:
product, production and business. Big data has been a fast-changing research area with many new opportunities
for applications in manufacturing. This paper presents a systematic literature review of the state-of-the-art of big
data in manufacturing. Six key drivers of big data applications in manufacturing have been identified. The key
drivers are system integration, data, prediction, sustainability, resource sharing and hardware. Based on the
requirements of manufacturing, nine essential components of big data ecosystem are captured. They are data
ingestion, storage, computing, analytics, visualization, management, workflow, infrastructure and security.
Several research domains are identified that are driven by available capabilities of big data ecosystem. Five
future directions of big data applications in manufacturing are presented from modelling and simulation to realtime
big data analytics and cybersecurity. Keywords: Smart manufacturing | Big data | Cloud computing | Cloud manufacturing | Internet of things | NoSQL |
مقاله انگلیسی |
5 |
AI Powered THz VLSI Testing Technology
فناوری تست THz VLSI با قدرت هوش مصنوعی-2020 Abstract—Increasing complexity of digital and mixed-signal
systems makes establishing the authenticity of a chip to be a
challenging problem. We present a new terahertz testing technique
for non-destructive identification of genuine integrated circuits, in
package, in-situ and either with no or under bias, by measuring
their response to scanning terahertz and sub-terahertz radiation at
the circuit pins. This novel, patent pending non-invasive nondestructive
technology when merged with Artificial Intelligence
(AI) engine will evolve and self-improve with each test cycle. By
establishing and AI processing of the THz scanning signatures of
reliable devices and circuits and comparing this signatures with
devices under test using AI, this technology could be also used for
reliability and lifetime prediction. Keywords: Terahertz | hardware cybersecurity | reliability | authentication | artificial intelligence |
مقاله انگلیسی |
6 |
AI in Cybersecurity Education: A Systematic Literature Review of Studies on Cybersecurity MOOCs
هوش مصنوعی در آموزش امنیت سایبری: مروری بر ادبیات سیستماتیک مطالعات مربوط به امنیت سایبری MOOC-2020 Machine learning (ML) techniques are changing
both the offensive and defensive aspects of cybersecurity. The
implications are especially strong for privacy, as ML approaches
provide unprecedented opportunities to make use of collected
data. Thus, education on cybersecurity and AI is needed. To investigate
how AI and cybersecurity should be taught together, we
look at previous studies on cybersecurity MOOCs by conducting
a systematic literature review. The initial search resulted in 72
items and after screening for only peer-reviewed publications
on cybersecurity online courses, 15 studies remained. Three of
the studies concerned multiple cybersecurity MOOCs whereas
12 focused on individual courses. The number of published work
evaluating specific cybersecurity MOOCs was found to be small
compared to all available cybersecurity MOOCs. Analysis of
the studies revealed that cybersecurity education is, in almost
all cases, organised based on the topic instead of used tools,
making it difficult for learners to find focused information on
AI applications in cybersecurity. Furthermore, there is a gab
in academic literature on how AI applications in cybersecurity
should be taught in online courses. Index Terms: cybersecurity | MOOC | machine learning | AI | systematic literature review |
مقاله انگلیسی |
7 |
A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020 Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military
investigation and represent a fundamental tool to support cyber-security. Investigators use a variety
of techniques and proprietary software forensics applications to examine the copy of digital
devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is
carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that
involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of
fraudulent activities. In this work, a new methodology is proposed to support investigators during the
analysis process, correlating evidence found through different forensics tools. The methodology was
implemented through a system able to add semantic assertion to data generated by forensics tools
during extraction processes. These assertions enable more effective access to relevant information and
enhanced retrieval and reasoning capabilities. Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity |
مقاله انگلیسی |
8 |
A framework for effective corporate communication after cyber security incidents
چارچوبی برای ارتباط موثر شرکت های بزرگ پس از حوادث امنیت سایبری-2020 A major cyber security incident can represent a cyber crisis for an organisation, in particular because of the associated risk of substantial reputational damage. As the likelihood
of falling victim to a cyberattack has increased over time, so too has the need to understand exactly what is effective corporate communication after an attack, and how best to
engage the concerns of customers, partners and other stakeholders. This research seeks to
tackle this problem through a critical, multi-faceted investigation into the efficacy of crisis
communication and public relations following a data breach. It does so by drawing on academic literature, obtained through a systematic literature review, and real-world case studies. Qualitative data analysis is used to interpret and structure the results, allowing for the
development of a new, comprehensive framework for corporate communication to support
companies in their preparation and response to such events. The validity of this framework
is demonstrated by its evaluation through interviews with senior industry professionals,
as well as a critical assessment against relevant practice and research. The framework is
further refined based on these evaluations, and an updated version defined. This research
represents the first grounded, comprehensive and evaluated proposal for characterising effective corporate communication after cyber security incidents. Keywords: Cybersecurity incident | Data breach | Corporate communication | Public relations | Data breach announcements | Incident response | Cyber crisis | Security management | Resilience |
مقاله انگلیسی |
9 |
Port cybersecurity and threat: A structural model for prevention andpolicy development
امنیت سایبری و تهدید بندر: الگوی ساختاری برای پیشگیری و تدوین سیاست ها-2020 Most port operators have increasingly integrated cybertechnology into port activities to increase theircompetitiveness; unfortunately, this digitalization becomes the major vulnerability for the emergingcyberthreat. To help port policymakers develop cybersecurity measures, this study conceptualized anddeveloped three dimensions of port cybersecurity hygiene (i.e. human, infrastructure, and procedurefactors) and investigated the relationships between port cybersecurity hygiene and cyberthreats (i.e.hacktivism, cyber criminality, cyber espionage, cyber terrorism, and cyber war). A questionnaire surveywas used to collect data from all international container port operators and shipping lines with branchesin Thailand, and the proposed relationships were tested by structural equation modeling. The resultsindicated that container ports tended to encounter hacktivism when their human, infrastructure, andprocedure factors were vulnerable. The weakness of the human factor could also lead to cyber terrorism,while the deficiency of the infrastructure factor could lead to cyber criminality. Moreover, containerports were likely to be harmed by cyber espionage if their procedure factor was poorly implemented.Hence, the provision of training and education to all port workers, including top executives, managers,and supervisors, are necessary to ensure a cyberthreat-awareness culture at all organizational levels.Improving cybersecurity equipment could prevent unauthorized access to port business data and keepimportant information secure, while the ISPS Code-based procedures and other preventive measuresshould be strictly implemented by container ports to reduce the risk of cyberthreats. Keywords: Cyberthreat | Port cybersecurity hygiene | Cybertechnology | Prevention and policy development | Port digitalization | Structural equation modeling |
مقاله انگلیسی |
10 |
“Hello are you available?” Dealing with online frauds and the role of forensic science
"سلام آیا شما در دسترس هستید؟" مقابله با کلاهبرداری آنلاین و نقش علم پزشکی قانونی-2020 On August 6, 2019, the 119 members of the School of criminal justice, forensic science and criminology at
the University of Lausanne were the target of an online scammer. His/her modus operandi consisted of
email masquerading as the Director of the School in an attempt to induce the victims to buy digital gift
cards and to transmit the card usage code to the perpetrator.
The first author of this paper is the Director of the School, and the second is an expert in digital
forensic science and a professor of the School. They worked together in real time to deal with the fraud.
Because the fraud occurred in a School of forensic science and criminology, it raised many questions on a
variety of overlapping dimensions. The objective of this study was, therefore, to draw lessons from this
case from several perspectives ranging from forensic science to cybersecurity, and from practical to
academic.
The response to the incident has been treated in four typical distinguishable phases: (1) fraud
detection; (2) crisis management; (3) post-incident analysis; and (4) reporting to different communities.
We conclude this paper by taking lessons from the case to express the essential role of forensic
knowledge and crime analysis in interpreting the information conveyed by digital traces to develop
innovative cross-disciplinary models for preventing, detecting, analysing, investigating and responding
to online fraud. Keywords: Online scam | Crime analysis | Digital forensics | Routine activities | Digitalization |
مقاله انگلیسی |