دانلود و نمایش مقالات مرتبط با Cybersecurity::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی
نتیجه جستجو - Cybersecurity

تعداد مقالات یافته شده: 36
ردیف عنوان نوع
1 A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensics applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of fraudulent activities. In this work, a new methodology is proposed to support investigators during the analysis process, correlating evidence found through different forensics tools. The methodology was implemented through a system able to add semantic assertion to data generated by forensics tools during extraction processes. These assertions enable more effective access to relevant information and enhanced retrieval and reasoning capabilities.
Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity
مقاله انگلیسی
2 Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments
به سمت امنیت و حفظ حریم خصوصی برای هوش مصنوعی لبه در محیط های بازاریابی دیجیتال مبتنی بر IoT / IoE-2020
Abstract—Edge Artificial Intelligence (Edge AI) is a crucial aspect of the current and futuristic digital marketing Internet of Things (IoT) / Internet of Everything (IoE) environment. Consumers often provide data to marketers which is used to enhance services and provide a personalized customer experience (CX). However, use, storage and processing of data has been a key concern. Edge computing can enhance security and privacy which has been said to raise the current state of the art in these areas. For example, when certain processing of data can be done local to where requested, security and privacy can be enhanced. However, Edge AI in such an environment can be prone to its own security and privacy considerations, especially in the digital marketing context where personal data is involved. An ongoing challenge is maintaining security in such context and meeting various legal privacy requirements as they themselves continue to evolve, and many of which are not entirely clear from the technical perspective. This paper navigates some key security and privacy issues for Edge AI in IoT/IoE digital marketing environments along with some possible mitigations.
Keywords: edge security | edge privacy | edge AI | edge intelligence | artificial intelligence | AI | machine learning | ML | IoT | IoE | edge | cybersecurity | legal | law | digital marketing | smart | GDPR | CCPA | security | privacy
مقاله انگلیسی
3 The theory of innovation and innovative development. AI scenarios in Russia
نظریه نوآوری و توسعه ابتکاری. سناریوهای هوش مصنوعی در روسیه-2020
This article explores different scenarios of implementing artificial intelligence (AI) in Russia. The relevance of the research and the range of problems addressed in it consist in the fact that Russia is not fully realizing the potential of innovative economic development. AI can accelerate the innovative development of Russia’s economy, but it entails the risks of its destabilization and therefore requires further research. This article contributes to the theory of innovation, thereby specifying the logic of the optimization of innovative development and the optimal scale in a strategy of risk management. The effectiveness of the digital modernization of Russia’s economy based on AI will be remarkably high. The index of global competitiveness achieves maximum value (7 points), increasing by 1.52 times. The innovation index of the economy grows 1.15 times. The unemployment level will rise 1.62 times, and the level of cybersecurity will decrease 6.52 times. Both advantages from the implementation of AI and risks of digital modernization of the Russian economy are determined. The significance of the research consists in the application of the offered method for determining the optimal intervals of AI usage in Russia. The key conclusion that can be drawn from the research is the justification of the need to promote the modernization of the Russian economy on the basis of AI with a view to accelerating its innovative development until 2024. The consequences of the research are involved with the improvement of practices of public regulation of the innovative development of the Russian economy by promoting the dissemination of AI according to recommendations proposed by the authors.
Keywords: artificial intelligence (AI) | technology | cybersecurity | economic development | risk management | Russia
مقاله انگلیسی
4 Manufacturing big data ecosystem: A systematic literature review
ساخت اکوسیستم داده های بزرگ: مروری بر ادبیات سیستماتیک-2020
Advanced manufacturing is one of the core national strategies in the US (AMP), Germany (Industry 4.0) and China (Made-in China 2025). The emergence of the concept of Cyber Physical System (CPS) and big data imperatively enable manufacturing to become smarter and more competitive among nations. Many researchers have proposed new solutions with big data enabling tools for manufacturing applications in three directions: product, production and business. Big data has been a fast-changing research area with many new opportunities for applications in manufacturing. This paper presents a systematic literature review of the state-of-the-art of big data in manufacturing. Six key drivers of big data applications in manufacturing have been identified. The key drivers are system integration, data, prediction, sustainability, resource sharing and hardware. Based on the requirements of manufacturing, nine essential components of big data ecosystem are captured. They are data ingestion, storage, computing, analytics, visualization, management, workflow, infrastructure and security. Several research domains are identified that are driven by available capabilities of big data ecosystem. Five future directions of big data applications in manufacturing are presented from modelling and simulation to realtime big data analytics and cybersecurity.
Keywords: Smart manufacturing | Big data | Cloud computing | Cloud manufacturing | Internet of things | NoSQL
مقاله انگلیسی
5 AI Powered THz VLSI Testing Technology
فناوری تست THz VLSI با قدرت هوش مصنوعی-2020
Abstract—Increasing complexity of digital and mixed-signal systems makes establishing the authenticity of a chip to be a challenging problem. We present a new terahertz testing technique for non-destructive identification of genuine integrated circuits, in package, in-situ and either with no or under bias, by measuring their response to scanning terahertz and sub-terahertz radiation at the circuit pins. This novel, patent pending non-invasive nondestructive technology when merged with Artificial Intelligence (AI) engine will evolve and self-improve with each test cycle. By establishing and AI processing of the THz scanning signatures of reliable devices and circuits and comparing this signatures with devices under test using AI, this technology could be also used for reliability and lifetime prediction.
Keywords: Terahertz | hardware cybersecurity | reliability | authentication | artificial intelligence
مقاله انگلیسی
6 AI in Cybersecurity Education: A Systematic Literature Review of Studies on Cybersecurity MOOCs
هوش مصنوعی در آموزش امنیت سایبری: مروری بر ادبیات سیستماتیک مطالعات مربوط به امنیت سایبری MOOC-2020
Machine learning (ML) techniques are changing both the offensive and defensive aspects of cybersecurity. The implications are especially strong for privacy, as ML approaches provide unprecedented opportunities to make use of collected data. Thus, education on cybersecurity and AI is needed. To investigate how AI and cybersecurity should be taught together, we look at previous studies on cybersecurity MOOCs by conducting a systematic literature review. The initial search resulted in 72 items and after screening for only peer-reviewed publications on cybersecurity online courses, 15 studies remained. Three of the studies concerned multiple cybersecurity MOOCs whereas 12 focused on individual courses. The number of published work evaluating specific cybersecurity MOOCs was found to be small compared to all available cybersecurity MOOCs. Analysis of the studies revealed that cybersecurity education is, in almost all cases, organised based on the topic instead of used tools, making it difficult for learners to find focused information on AI applications in cybersecurity. Furthermore, there is a gab in academic literature on how AI applications in cybersecurity should be taught in online courses.
Index Terms: cybersecurity | MOOC | machine learning | AI | systematic literature review
مقاله انگلیسی
7 A semantic-based methodology for digital forensics analysis
یک روش مبتنی بر معنایی برای تجزیه و تحلیل پزشکی قانونی دیجیتال-2020
Nowadays, more than ever, digital forensics activities are involved in any criminal, civil or military investigation and represent a fundamental tool to support cyber-security. Investigators use a variety of techniques and proprietary software forensics applications to examine the copy of digital devices, searching hidden, deleted, encrypted, or damaged files or folders. Any evidence found is carefully analysed and documented in a ‘‘finding report’’ in preparation for legal proceedings that involve discovery, depositions, or actual litigation. The aim is to discover and analyse patterns of fraudulent activities. In this work, a new methodology is proposed to support investigators during the analysis process, correlating evidence found through different forensics tools. The methodology was implemented through a system able to add semantic assertion to data generated by forensics tools during extraction processes. These assertions enable more effective access to relevant information and enhanced retrieval and reasoning capabilities.
Keywords: Digital forensics | Text analysis | Log analysis | Correlation | Cybersecurity
مقاله انگلیسی
8 Port cybersecurity and threat: A structural model for prevention andpolicy development
امنیت سایبری و تهدید بندر: الگوی ساختاری برای پیشگیری و تدوین سیاست ها-2020
Most port operators have increasingly integrated cybertechnology into port activities to increase theircompetitiveness; unfortunately, this digitalization becomes the major vulnerability for the emergingcyberthreat. To help port policymakers develop cybersecurity measures, this study conceptualized anddeveloped three dimensions of port cybersecurity hygiene (i.e. human, infrastructure, and procedurefactors) and investigated the relationships between port cybersecurity hygiene and cyberthreats (i.e.hacktivism, cyber criminality, cyber espionage, cyber terrorism, and cyber war). A questionnaire surveywas used to collect data from all international container port operators and shipping lines with branchesin Thailand, and the proposed relationships were tested by structural equation modeling. The resultsindicated that container ports tended to encounter hacktivism when their human, infrastructure, andprocedure factors were vulnerable. The weakness of the human factor could also lead to cyber terrorism,while the deficiency of the infrastructure factor could lead to cyber criminality. Moreover, containerports were likely to be harmed by cyber espionage if their procedure factor was poorly implemented.Hence, the provision of training and education to all port workers, including top executives, managers,and supervisors, are necessary to ensure a cyberthreat-awareness culture at all organizational levels.Improving cybersecurity equipment could prevent unauthorized access to port business data and keepimportant information secure, while the ISPS Code-based procedures and other preventive measuresshould be strictly implemented by container ports to reduce the risk of cyberthreats.
Keywords: Cyberthreat | Port cybersecurity hygiene | Cybertechnology | Prevention and policy development | Port digitalization | Structural equation modeling
مقاله انگلیسی
9 “Hello are you available?” Dealing with online frauds and the role of forensic science
"سلام آیا شما در دسترس هستید؟" مقابله با کلاهبرداری آنلاین و نقش علم پزشکی قانونی-2020
On August 6, 2019, the 119 members of the School of criminal justice, forensic science and criminology at the University of Lausanne were the target of an online scammer. His/her modus operandi consisted of email masquerading as the Director of the School in an attempt to induce the victims to buy digital gift cards and to transmit the card usage code to the perpetrator. The first author of this paper is the Director of the School, and the second is an expert in digital forensic science and a professor of the School. They worked together in real time to deal with the fraud. Because the fraud occurred in a School of forensic science and criminology, it raised many questions on a variety of overlapping dimensions. The objective of this study was, therefore, to draw lessons from this case from several perspectives ranging from forensic science to cybersecurity, and from practical to academic. The response to the incident has been treated in four typical distinguishable phases: (1) fraud detection; (2) crisis management; (3) post-incident analysis; and (4) reporting to different communities. We conclude this paper by taking lessons from the case to express the essential role of forensic knowledge and crime analysis in interpreting the information conveyed by digital traces to develop innovative cross-disciplinary models for preventing, detecting, analysing, investigating and responding to online fraud.
Keywords: Online scam | Crime analysis | Digital forensics | Routine activities | Digitalization
مقاله انگلیسی
10 Machine Learning Cyberattack and Defense Strategies
استراتژی های دفاعی سایبری و یادگیری ماشینی-2020
Cybersecurity is an increasingly important challenge for computer systems. In this work, cyberattacks were modeled using an extension of the well-known Petri net formalism. That formalism, designated Petri nets with players, strategies, and costs, models the states of the cyberattack and events during the attack as markings and transition firings in the net respectively. The formalism models the attacker and defender as competing players who may observe the marking of a subset of the net and based on the observed marking act by changing the stochastic firing rates of a subset of the transitions in order to achieve their competing goals. Rate changes by the players incur a cost. Using the formalism, nets were constructed to model specific cyberattack patterns (cross-site scripting and spear phishing) documented in the Common Attack Pattern Enumeration and Classification database. The models were validated by a panel of cybersecurity experts in a structured face validation process. Given those validated nets, a reinforcement learning algorithm using an -Greedy policy was implemented and set to the task of learning which actions to take, i.e., which transition rates to change for the dif- ferent observable markings, so as to accomplish the goals of the attacker or defender. Experiments were conducted with a dynamic (learning) attacker against a static (fixed) defender, a static attacker against a dynamic defender, and a dynamic attacker against a dynamic defender. In all cases, the reinforcement learning algorithm was able to improve its performance, in terms of achieving the player’s objective and reducing the cost of doing so, over time. These results demonstrate the potential of formally modeling cyberattacks and of applying reinforcement learning to improving cybersecurity.
Keywords: Cybersecurity | Modeling | Petri Net | Machine Learning | CAPEC | Reinforcement Learning
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi