CINXE.COM
Search results for: socially engineered attacks
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: socially engineered attacks</title> <meta name="description" content="Search results for: socially engineered attacks"> <meta name="keywords" content="socially engineered attacks"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="socially engineered attacks" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="socially engineered attacks"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1306</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: socially engineered attacks</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1306</span> Analysis of Spamming Threats and Some Possible Solutions for Online Social Networking Sites (OSNS) </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dilip%20Singh%20Sisodia">Dilip Singh Sisodia</a>, <a href="https://publications.waset.org/abstracts/search?q=Shrish%20Verma"> Shrish Verma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Spamming is the most common issue seen nowadays in the Internet especially in Online Social Networking Sites (like Facebook, Twitter, and Google+ etc.). Spam messages keep wasting Internet bandwidth and the storage space of servers. On social network sites; spammers often disguise themselves by creating fake accounts and hijacking user’s accounts for personal gains. They behave like normal user and they continue to change their spamming strategy. To prevent this, most modern spam-filtering solutions are deployed on the receiver side; they are good at filtering spam for end users. In this paper we are presenting some spamming techniques their behaviour and possible solutions. We have analyzed how Spammers enters into online social networking sites (OSNSs) and how they target it and the techniques they use for it. The five discussed techniques of spamming techniques which are clickjacking, social engineered attacks, cross site scripting, URL shortening, and drive by download. We have used elgg framework for demonstration of some of spamming threats and respective implementation of solutions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20social%20networking%20sites" title="online social networking sites">online social networking sites</a>, <a href="https://publications.waset.org/abstracts/search?q=spam" title=" spam"> spam</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=internet" title=" internet"> internet</a>, <a href="https://publications.waset.org/abstracts/search?q=clickjacking%20%2F%20likejacking" title=" clickjacking / likejacking"> clickjacking / likejacking</a>, <a href="https://publications.waset.org/abstracts/search?q=drive-by-download" title=" drive-by-download"> drive-by-download</a>, <a href="https://publications.waset.org/abstracts/search?q=URL%20shortening" title=" URL shortening"> URL shortening</a>, <a href="https://publications.waset.org/abstracts/search?q=networking" title=" networking"> networking</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks" title=" socially engineered attacks"> socially engineered attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=elgg%20framework" title=" elgg framework"> elgg framework</a> </p> <a href="https://publications.waset.org/abstracts/27207/analysis-of-spamming-threats-and-some-possible-solutions-for-online-social-networking-sites-osns" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27207.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">348</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1305</span> Seismic Vulnerability Mitigation of Non-Engineered Buildings</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Muhammad%20Tariq%20A.%20Chaudhary">Muhammad Tariq A. Chaudhary</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The tremendous loss of life that resulted in the aftermath of recent earthquakes in developing countries is mostly due to the collapse of non-engineered and semi-engineered building structures. Such structures are used as houses, schools, primary healthcare centres and government offices. These building are classified structurally into two categories viz. non-engineered and semi-engineered. Non-engineered structures include: adobe, Unreinforced Masonry (URM) and wood buildings. Semi-engineered buildings are mostly low-rise (up to 3 story) light concrete frame structures or masonry bearing walls with reinforced concrete slab. This paper presents an overview of the typical damage observed in non-engineered structures and their most likely causes in the past earthquakes with specific emphasis on the performance of such structures in the 2005 Kashmir earthquake. It is demonstrated that seismic performance of these structures can be improved from life-safety viewpoint by adopting simple low-cost modifications to the existing construction practices. Incorporation of some of these practices in the reconstruction efforts after the 2005 Kashmir earthquake are examined in the last section for mitigating seismic risk hazard. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kashmir%20earthquake" title="Kashmir earthquake">Kashmir earthquake</a>, <a href="https://publications.waset.org/abstracts/search?q=non-engineered%20buildings" title=" non-engineered buildings"> non-engineered buildings</a>, <a href="https://publications.waset.org/abstracts/search?q=seismic%20hazard" title=" seismic hazard"> seismic hazard</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20details" title=" structural details"> structural details</a>, <a href="https://publications.waset.org/abstracts/search?q=structural%20strengthening" title=" structural strengthening"> structural strengthening</a> </p> <a href="https://publications.waset.org/abstracts/7382/seismic-vulnerability-mitigation-of-non-engineered-buildings" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7382.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1304</span> DOS and DDOS Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amin%20Hamrahi">Amin Hamrahi</a>, <a href="https://publications.waset.org/abstracts/search?q=Niloofar%20Moghaddam"> Niloofar Moghaddam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=denial%20of%20service" title="denial of service">denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20denial%20of%20service" title=" distributed denial of service"> distributed denial of service</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic" title=" traffic"> traffic</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding" title=" flooding"> flooding</a> </p> <a href="https://publications.waset.org/abstracts/6782/dos-and-ddos-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1303</span> A Survey of Domain Name System Tunneling Attacks: Detection and Prevention</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lawrence%20Williams">Lawrence Williams</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DNS" title="DNS">DNS</a>, <a href="https://publications.waset.org/abstracts/search?q=tunneling" title=" tunneling"> tunneling</a>, <a href="https://publications.waset.org/abstracts/search?q=exfiltration" title=" exfiltration"> exfiltration</a>, <a href="https://publications.waset.org/abstracts/search?q=botnet" title=" botnet"> botnet</a> </p> <a href="https://publications.waset.org/abstracts/159239/a-survey-of-domain-name-system-tunneling-attacks-detection-and-prevention" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1302</span> Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title="cyber-attacks">cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=home%20user" title=" home user"> home user</a>, <a href="https://publications.waset.org/abstracts/search?q=prevention" title=" prevention"> prevention</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=technology" title=" technology"> technology</a> </p> <a href="https://publications.waset.org/abstracts/25329/quick-reference-cyber-attacks-awareness-and-prevention-method-for-home-users" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25329.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1301</span> Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bruno%20Vili%C4%87%20Belina">Bruno Vilić Belina</a>, <a href="https://publications.waset.org/abstracts/search?q=Jadranko%20Matu%C5%A1ko"> Jadranko Matuško</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=control%20systems" title="control systems">control systems</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=resiliency" title=" resiliency"> resiliency</a>, <a href="https://publications.waset.org/abstracts/search?q=robustness" title=" robustness"> robustness</a>, <a href="https://publications.waset.org/abstracts/search?q=tube%20based%20model%20predictive%20control" title=" tube based model predictive control"> tube based model predictive control</a> </p> <a href="https://publications.waset.org/abstracts/169652/robust-control-of-cyber-physical-system-under-cyber-attacks-based-on-invariant-tubes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/169652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1300</span> The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Habib%20Gorine">Habib Gorine</a>, <a href="https://publications.waset.org/abstracts/search?q=Rabia%20Saleh"> Rabia Saleh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=MANET" title="MANET">MANET</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks" title=" wireless networks"> wireless networks</a>, <a href="https://publications.waset.org/abstracts/search?q=routing%20protocols" title=" routing protocols"> routing protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20attacks" title=" malicious attacks"> malicious attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20networks%20simulation" title=" wireless networks simulation"> wireless networks simulation</a> </p> <a href="https://publications.waset.org/abstracts/88341/the-impact-of-malicious-attacks-on-the-performance-of-routing-protocols-in-mobile-ad-hoc-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88341.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">320</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1299</span> The Effects of Separating Inferior Alveolar Neurovascular Bundles on Osteogenesis of Tissue-Engineered Bone and Vascularization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lin%20Feng">Lin Feng</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20Lingling"> E. Lingling</a>, <a href="https://publications.waset.org/abstracts/search?q=Hongchen%20Liu"> Hongchen Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In order to evaluate the effects of autologous blood vessels and nerves on vascularization. A dog model of tissue-engineered bone vascularization was established by constructing inferior alveolar neurovascular bundles through the mandibular canal. Sixteen 12-month-old healthy beagles were randomly divided into two groups (n=8). Group A retained inferior alveolar neurovascular bundles, and Group B retained inferior alveolar nerves. Bone marrow mesenchymal stem cells were injected into β-tricalcium phosphate to prepare internal tissue-engineered bone scaffold. A personalized titanium mesh was then prepared by rapid prototyping and fixed by external titanium scaffold. Two dogs in each group were sacrificed on the 30th, 45th, 60th, and 90th postoperative days respectively. The bone was visually examined, scanned by CT, and subjected to HE staining, immunohistochemical staining, vascular casting and PCR to detect the changes in osteogenesis and vascularization.The two groups had similar outcomes in regard to osteogenesis and vascularization (P>0.05) both showed remarkable regenerative capacities. The model of tissue-engineered bone vascularization is potentially applicable in clinical practice to allow satisfactory osteogenesis and vascularization. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inferior%20alveolar%20neurovascular%20bundle" title="inferior alveolar neurovascular bundle">inferior alveolar neurovascular bundle</a>, <a href="https://publications.waset.org/abstracts/search?q=osteogenesis" title=" osteogenesis"> osteogenesis</a>, <a href="https://publications.waset.org/abstracts/search?q=tissue-engineered%20bone" title=" tissue-engineered bone"> tissue-engineered bone</a>, <a href="https://publications.waset.org/abstracts/search?q=vascularization" title=" vascularization"> vascularization</a> </p> <a href="https://publications.waset.org/abstracts/20257/the-effects-of-separating-inferior-alveolar-neurovascular-bundles-on-osteogenesis-of-tissue-engineered-bone-and-vascularization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20257.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">390</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1298</span> Phishing Attacks Facilitated by Open Source Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urva%20Maryam">Urva Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-mail%20spoofing" title="e-mail spoofing">e-mail spoofing</a>, <a href="https://publications.waset.org/abstracts/search?q=Maltego" title=" Maltego"> Maltego</a>, <a href="https://publications.waset.org/abstracts/search?q=OSINT" title=" OSINT"> OSINT</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=spear%20phishing" title=" spear phishing"> spear phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=theHarvester" title=" theHarvester"> theHarvester</a> </p> <a href="https://publications.waset.org/abstracts/134607/phishing-attacks-facilitated-by-open-source-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/134607.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1297</span> Phishing Attacks Facilitated by Open Source Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Urva%20Maryam">Urva Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=OSINT" title="OSINT">OSINT</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing" title=" phishing"> phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=spear%20phishing" title=" spear phishing"> spear phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=email%20spoofing" title=" email spoofing"> email spoofing</a>, <a href="https://publications.waset.org/abstracts/search?q=the%20harvester" title=" the harvester"> the harvester</a>, <a href="https://publications.waset.org/abstracts/search?q=maltego" title=" maltego"> maltego</a> </p> <a href="https://publications.waset.org/abstracts/159721/phishing-attacks-facilitated-by-open-source-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1296</span> Detection of Intentional Attacks in Images Based on Watermarking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hazem%20Munawer%20Al-Otum">Hazem Munawer Al-Otum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20authentication" title="image authentication">image authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=copyright%20protection" title=" copyright protection"> copyright protection</a>, <a href="https://publications.waset.org/abstracts/search?q=semi-fragile%20watermarking" title=" semi-fragile watermarking"> semi-fragile watermarking</a>, <a href="https://publications.waset.org/abstracts/search?q=tamper%20detection" title=" tamper detection"> tamper detection</a> </p> <a href="https://publications.waset.org/abstracts/44443/detection-of-intentional-attacks-in-images-based-on-watermarking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/44443.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">255</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1295</span> A Tutorial on Network Security: Attacks and Controls</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Belbahi%20Ahlam">Belbahi Ahlam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=network%20security" title="network security">network security</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks%20and%20controls" title=" attacks and controls"> attacks and controls</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20and%20information" title=" computer and information"> computer and information</a>, <a href="https://publications.waset.org/abstracts/search?q=solutions" title=" solutions"> solutions</a> </p> <a href="https://publications.waset.org/abstracts/47725/a-tutorial-on-network-security-attacks-and-controls" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47725.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">455</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1294</span> A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yatin%20Wadhawan">Yatin Wadhawan</a>, <a href="https://publications.waset.org/abstracts/search?q=Clifford%20Neuman"> Clifford Neuman</a>, <a href="https://publications.waset.org/abstracts/search?q=Anas%20Al%20Majali"> Anas Al Majali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=smart%20grid" title="smart grid">smart grid</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20pipeline" title=" gas pipeline"> gas pipeline</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-%20physical%20attack" title=" cyber- physical attack"> cyber- physical attack</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a> </p> <a href="https://publications.waset.org/abstracts/90242/a-systematic-approach-for-analyzing-multiple-cyber-physical-attacks-on-the-smart-grid" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90242.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">314</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1293</span> A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tun%20Myat%20Aung">Tun Myat Aung</a>, <a href="https://publications.waset.org/abstracts/search?q=Ni%20Ni%20Hla"> Ni Ni Hla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discrete%20logarithm%20problem" title="discrete logarithm problem">discrete logarithm problem</a>, <a href="https://publications.waset.org/abstracts/search?q=general%20attacks" title=" general attacks"> general attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve" title=" elliptic curve"> elliptic curve</a>, <a href="https://publications.waset.org/abstracts/search?q=prime%20field" title=" prime field"> prime field</a>, <a href="https://publications.waset.org/abstracts/search?q=binary%20field" title=" binary field"> binary field</a> </p> <a href="https://publications.waset.org/abstracts/82212/a-study-of-general-attacks-on-elliptic-curve-discrete-logarithm-problem-over-prime-field-and-binary-field" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/82212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">233</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1292</span> The Impact of Feuerstein Enhancement of Learning Potential to the Integration of Children from Socially Disadvantaged Backgrounds into Society</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Michal%20Kozub%C3%ADk">Michal Kozubík</a>, <a href="https://publications.waset.org/abstracts/search?q=Svetlana%20S%C3%ADthov%C3%A1"> Svetlana Síthová</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Aim: Aim of this study is to introduce the method of instrumental enrichment to people who works in the helping professions, and show further possibilities of its realization with children from socially disadvantaged backgrounds into society. Methods: We focused on Feuerstein’s Instrumental Enrichment method, its theoretical grounds and practical implementation. We carried out questionnaires and directly observed children from the disadvantaged background in Partizánske district. Results: We outlined the issues of children from disadvantaged social environment and their opportunity of social integration using the method. The findings showed the utility of Feuerstein method. Conclusions: We conclude that Feuerstein methods are very suitable for children from socially disadvantaged background and importance of social workers and special educator co-operation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Feuerstein" title="Feuerstein">Feuerstein</a>, <a href="https://publications.waset.org/abstracts/search?q=inclusion" title=" inclusion"> inclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=socially%20disadvantaged%20background" title=" socially disadvantaged background"> socially disadvantaged background</a> </p> <a href="https://publications.waset.org/abstracts/59522/the-impact-of-feuerstein-enhancement-of-learning-potential-to-the-integration-of-children-from-socially-disadvantaged-backgrounds-into-society" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59522.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1291</span> Study on Network-Based Technology for Detecting Potentially Malicious Websites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Byung-Ik%20Kim">Byung-Ik Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hong-Koo%20Kang"> Hong-Koo Kang</a>, <a href="https://publications.waset.org/abstracts/search?q=Tae-Jin%20Lee"> Tae-Jin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Hae-Ryong%20Park"> Hae-Ryong Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Advanced%20Persistent%20Threat%20%28APT%29" title="Advanced Persistent Threat (APT)">Advanced Persistent Threat (APT)</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20packet" title=" network packet"> network packet</a>, <a href="https://publications.waset.org/abstracts/search?q=exploit%20kits" title=" exploit kits"> exploit kits</a> </p> <a href="https://publications.waset.org/abstracts/2429/study-on-network-based-technology-for-detecting-potentially-malicious-websites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2429.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">366</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1290</span> Evaluation on Mechanical Stabilities of Clay-Sand Mixtures Used as Engineered Barrier for Radioactive Waste Disposal</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmet%20E.%20Osmanlioglu">Ahmet E. Osmanlioglu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, natural bentonite was used as natural clay material and samples were taken from the Kalecik district in Ankara. In this research, bentonite is the subject of an analysis from standpoint of assessing the basic properties of engineered barriers with respect to the buffer material. Bentonite and sand mixtures were prepared for tests. Some of clay minerals give relatively higher hydraulic conductivity and lower swelling pressure. Generally, hydraulic conductivity of these type clays is lower than <10-12 m/s. The hydraulic properties of clay-sand mixtures are evaluated to design engineered barrier specifications. Hydraulic conductivities of bentonite-sand mixture were found in the range of 1.2x10-10 to 9.3x10-10 m/s. Optimum B/S mixture ratio was determined as 35% in terms of hydraulic conductivity and mechanical stability. At the second stage of this study, all samples were compacted into cylindrical shape molds (diameter: 50 mm and length: 120 mm). The strength properties of compacted mixtures were better than the compacted bentonite. In addition, the larger content of the quartz sand in the mixture has the greater thermal conductivity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=engineered%20barriers" title="engineered barriers">engineered barriers</a>, <a href="https://publications.waset.org/abstracts/search?q=mechanical%20stability" title=" mechanical stability"> mechanical stability</a>, <a href="https://publications.waset.org/abstracts/search?q=clay" title=" clay"> clay</a>, <a href="https://publications.waset.org/abstracts/search?q=nuclear%20waste%20disposal" title=" nuclear waste disposal"> nuclear waste disposal</a> </p> <a href="https://publications.waset.org/abstracts/43160/evaluation-on-mechanical-stabilities-of-clay-sand-mixtures-used-as-engineered-barrier-for-radioactive-waste-disposal" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43160.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">384</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1289</span> Utilizing the RhlR/RhlI Quorum Sensing System to Express the ß-Galactosidase Reporter Gene by Using the N-Butanoyl Homoserine Lactone and N-Hexanoyl Homoserine Lactone</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ngoc%20Tu%20Truong">Ngoc Tu Truong</a>, <a href="https://publications.waset.org/abstracts/search?q=Nuong%20T.%20Bui"> Nuong T. Bui</a>, <a href="https://publications.waset.org/abstracts/search?q=Ben%20Rao"> Ben Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=Ya%20L.%20Shen"> Ya L. Shen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Quorum sensing is a phenomenon present in many gram-negative bacteria that allows bacterial communication and controlled expression of a large suite of genes through quorum sensing signals - N-acyl homoserine lactones (AHLs). In order to investigate the ability of the rhlR/rhlI quorum sensing system in Pseudomonas aeruginosa to express the ß-Galactosidase reporter gene, an engineered E. coli strain EpHL02, was genetically engineered. This engineered E. coli strain EpHL02 responded to the presence of the N-butanoyl homoserine lactone and N-hexanoyl homoserine lactone to express the ß-Galactosidase reporter gene at a concentration limit of 5x10⁻⁸ M. This was also found to be comparable to AHLs extraction from Serratia marcescens H31. Moreover, we examined this ability of this engineered E. coli strain for respond of AHLs from extractions of Pseudomonas aeruginosa ATCC9027. The results demonstrated that the rhlR/rhlI quorum sensing system can express the ß-Galactosidase reporter gene by using the N-butanoyl homoserine lactone, N-hexanoyl homoserine lactone and AHLs from extractions of Serratia marcescens H31 and Pseudomonas aeruginosa ATCC9027 in the engineered E. coli strain EpHL02. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=N-butanoyl%20homoserine%20lactone" title="N-butanoyl homoserine lactone">N-butanoyl homoserine lactone</a>, <a href="https://publications.waset.org/abstracts/search?q=C4-HSL" title=" C4-HSL"> C4-HSL</a>, <a href="https://publications.waset.org/abstracts/search?q=N-hexanoyl%20homoserine%20lactone" title=" N-hexanoyl homoserine lactone"> N-hexanoyl homoserine lactone</a>, <a href="https://publications.waset.org/abstracts/search?q=C6-HSL" title=" C6-HSL"> C6-HSL</a>, <a href="https://publications.waset.org/abstracts/search?q=Pseudomonas%20aeruginosa" title=" Pseudomonas aeruginosa"> Pseudomonas aeruginosa</a>, <a href="https://publications.waset.org/abstracts/search?q=quorum%20sensing" title=" quorum sensing"> quorum sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=Serratia%20marcescens" title=" Serratia marcescens"> Serratia marcescens</a>, <a href="https://publications.waset.org/abstracts/search?q=%C3%9F-galactosidase%20reporter%20gene" title=" ß-galactosidase reporter gene"> ß-galactosidase reporter gene</a> </p> <a href="https://publications.waset.org/abstracts/90029/utilizing-the-rhlrrhli-quorum-sensing-system-to-express-the-ss-galactosidase-reporter-gene-by-using-the-n-butanoyl-homoserine-lactone-and-n-hexanoyl-homoserine-lactone" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/90029.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">305</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1288</span> WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Abdulla%20Ashlam">Ahmed Abdulla Ashlam</a>, <a href="https://publications.waset.org/abstracts/search?q=Atta%20Badii"> Atta Badii</a>, <a href="https://publications.waset.org/abstracts/search?q=Frederic%20Stahl"> Frederic Stahl</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SQL%20injection" title="SQL injection">SQL injection</a>, <a href="https://publications.waset.org/abstracts/search?q=attacks" title=" attacks"> attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20application" title=" web application"> web application</a>, <a href="https://publications.waset.org/abstracts/search?q=accuracy" title=" accuracy"> accuracy</a>, <a href="https://publications.waset.org/abstracts/search?q=database" title=" database"> database</a> </p> <a href="https://publications.waset.org/abstracts/146559/webappshield-an-approach-exploiting-machine-learning-to-detect-sqli-attacks-in-an-application-layer-in-run-time" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146559.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">151</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1287</span> Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emhemed%20Shaklawoon">Emhemed Shaklawoon</a>, <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20Althomali"> Ibrahim Althomali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attacks" title=" cyber attacks"> cyber attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=defend%20the%20cloud" title=" defend the cloud"> defend the cloud</a> </p> <a href="https://publications.waset.org/abstracts/19135/cloud-computing-deciding-whether-it-is-easier-or-harder-to-defend-against-cyber-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/19135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">422</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1286</span> Control Strategies for a Robot for Interaction with Children with Autism Spectrum Disorder</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vinicius%20Binotte">Vinicius Binotte</a>, <a href="https://publications.waset.org/abstracts/search?q=Guilherme%20Baldo"> Guilherme Baldo</a>, <a href="https://publications.waset.org/abstracts/search?q=Christiane%20Goulart"> Christiane Goulart</a>, <a href="https://publications.waset.org/abstracts/search?q=Carlos%20Valad%C3%A3o"> Carlos Valadão</a>, <a href="https://publications.waset.org/abstracts/search?q=Eliete%20Caldeira"> Eliete Caldeira</a>, <a href="https://publications.waset.org/abstracts/search?q=Teodiano%20Bastos"> Teodiano Bastos</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Socially assistive robotic has become increasingly active and it is present in therapies of people affected for several neurobehavioral conditions, such as Autism Spectrum Disorder (ASD). In fact, robots have played a significant role for positive interaction with children with ASD, by stimulating their social and cognitive skills. This work introduces a mobile socially-assistive robot, which was built for interaction with children with ASD, using non-linear control techniques for this interaction. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=socially%20assistive%20robotics" title="socially assistive robotics">socially assistive robotics</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20robot" title=" mobile robot"> mobile robot</a>, <a href="https://publications.waset.org/abstracts/search?q=autonomous%20control" title=" autonomous control"> autonomous control</a>, <a href="https://publications.waset.org/abstracts/search?q=autism" title=" autism"> autism</a> </p> <a href="https://publications.waset.org/abstracts/63540/control-strategies-for-a-robot-for-interaction-with-children-with-autism-spectrum-disorder" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63540.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">500</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1285</span> Tamper Resistance Evaluation Tests with Noise Resources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masaya%20Yoshikawa">Masaya Yoshikawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Asai"> Toshiya Asai</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryoma%20Matsuhisa"> Ryoma Matsuhisa</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuke%20Nozaki"> Yusuke Nozaki</a>, <a href="https://publications.waset.org/abstracts/search?q=Kensaku%20Asahi"> Kensaku Asahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tamper%20resistance" title="tamper resistance">tamper resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20circuit" title=" cryptographic circuit"> cryptographic circuit</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20security%20evaluation" title=" hardware security evaluation"> hardware security evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=noise%20resources" title=" noise resources "> noise resources </a> </p> <a href="https://publications.waset.org/abstracts/25852/tamper-resistance-evaluation-tests-with-noise-resources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25852.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">504</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1284</span> SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neda%20Seyyedi">Neda Seyyedi</a>, <a href="https://publications.waset.org/abstracts/search?q=Reza%20Berangi"> Reza Berangi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=VOIP%20networks" title="VOIP networks">VOIP networks</a>, <a href="https://publications.waset.org/abstracts/search?q=flooding%20attacks" title=" flooding attacks"> flooding attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=entropy" title=" entropy"> entropy</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20networks" title=" computer networks"> computer networks</a> </p> <a href="https://publications.waset.org/abstracts/28214/sip-flooding-attacks-detection-and-prevention-using-shannon-renyi-and-tsallis-entropy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/28214.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1283</span> A Review Paper for Detecting Zero-Day Vulnerabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tshegofatso%20Rambau">Tshegofatso Rambau</a>, <a href="https://publications.waset.org/abstracts/search?q=Tonderai%20Muchenje"> Tonderai Muchenje</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Zero-day attacks (ZDA) are increasing day by day; there are many vulnerabilities in systems and software that date back decades. Companies keep discovering vulnerabilities in their systems and software and work to release patches and updates. A zero-day vulnerability is a software fault that is not widely known and is unknown to the vendor; attackers work very quickly to exploit these vulnerabilities. These are major security threats with a high success rate because businesses lack the essential safeguards to detect and prevent them. This study focuses on the factors and techniques that can help us detect zero-day attacks. There are various methods and techniques for detecting vulnerabilities. Various companies like edges can offer penetration testing and smart vulnerability management solutions. We will undertake literature studies on zero-day attacks and detection methods, as well as modeling approaches and simulations, as part of the study process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=zero-day%20attacks" title="zero-day attacks">zero-day attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=exploitation" title=" exploitation"> exploitation</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerabilities" title=" vulnerabilities"> vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/154312/a-review-paper-for-detecting-zero-day-vulnerabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154312.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">102</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1282</span> Deradicalization for Former Terrorists through Entrepreneurship Program</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jamal%20Wiwoho">Jamal Wiwoho</a>, <a href="https://publications.waset.org/abstracts/search?q=Pujiyono"> Pujiyono</a>, <a href="https://publications.waset.org/abstracts/search?q=Triyanto"> Triyanto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deradicalization" title="deradicalization">deradicalization</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorism" title=" terrorism"> terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=terrorists" title=" terrorists"> terrorists</a>, <a href="https://publications.waset.org/abstracts/search?q=entrepreneurship" title=" entrepreneurship"> entrepreneurship</a> </p> <a href="https://publications.waset.org/abstracts/83652/deradicalization-for-former-terrorists-through-entrepreneurship-program" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1281</span> 4P-Model of Information Terrorism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nataliya%20Venelinova">Nataliya Venelinova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20terrorism" title="information terrorism">information terrorism</a>, <a href="https://publications.waset.org/abstracts/search?q=mass%20communication%20cycle" title=" mass communication cycle"> mass communication cycle</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20perception" title=" public perception"> public perception</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/122687/4p-model-of-information-terrorism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/122687.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1280</span> Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Noureddine%20Mohtaram">Noureddine Mohtaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Jeremy%20Patrix"> Jeremy Patrix</a>, <a href="https://publications.waset.org/abstracts/search?q=Jerome%20Verny"> Jerome Verny</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anomaly%20detection" title="anomaly detection">anomaly detection</a>, <a href="https://publications.waset.org/abstracts/search?q=HTTP%20protocol" title=" HTTP protocol"> HTTP protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=logs" title=" logs"> logs</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20attack" title=" cyber attack"> cyber attack</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a> </p> <a href="https://publications.waset.org/abstracts/136582/deep-learning-and-accurate-performance-measure-processes-for-cyber-attack-detection-among-web-logs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136582.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">211</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1279</span> Engineered Biopolymers as Novel Sustainable Resin Binder for Wood Composites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somaieh%20Salehpour">Somaieh Salehpour</a>, <a href="https://publications.waset.org/abstracts/search?q=Douglas%20Ireland"> Douglas Ireland</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20Anderson"> Chris Anderson</a>, <a href="https://publications.waset.org/abstracts/search?q=Charles%20Markessini"> Charles Markessini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Over the last few years, advancements have been made around improving sustainability for wood composite boards. One of the last and most challenging sustainability hurdles is finding a viable alternative to petroleum-based resin binders. In today’s market, no longer is formaldehyde emission control sufficient to meet the requirements of many architects and end-use consumers. Even the use of highly reactive isocyanates is considered by many as not sustainable enough since these chemicals are manufactured from classical fossil fuel sources. The emergence of biopolymers specifically engineered for usage as wood composite binders has been successfully demonstrated in this paper as a viable option towards a truly renewable wood composite board. Recent technology advancements driven by EcoSynthetix and CHIMAR have exploited the advantages of using an engineered biopolymer. The evidence shows that this renewable technology has the potential to be used as a partial up to full replacement of classical formaldehyde technologies. Numerous trials, both in the lab and at industrial scale, have shown that a renewable binder of the proposed technology can produce a commercially viable board in a traditional industrial setting. The ultimate goal of this work is to provide evidence that a sustainable binder alternative can be used to make a commercial board while at the same time improving the total cost of manufacturing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=no%20added%20formaldehyde" title="no added formaldehyde">no added formaldehyde</a>, <a href="https://publications.waset.org/abstracts/search?q=renewable" title=" renewable"> renewable</a>, <a href="https://publications.waset.org/abstracts/search?q=biopolymers" title=" biopolymers"> biopolymers</a>, <a href="https://publications.waset.org/abstracts/search?q=sustainable%20wood%20composites" title=" sustainable wood composites"> sustainable wood composites</a>, <a href="https://publications.waset.org/abstracts/search?q=engineered%20biopolymers" title=" engineered biopolymers"> engineered biopolymers</a> </p> <a href="https://publications.waset.org/abstracts/23015/engineered-biopolymers-as-novel-sustainable-resin-binder-for-wood-composites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23015.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1278</span> Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Godiya%20Atsiya%20Pius">Godiya Atsiya Pius</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=insurgency" title="insurgency">insurgency</a>, <a href="https://publications.waset.org/abstracts/search?q=gender" title=" gender"> gender</a>, <a href="https://publications.waset.org/abstracts/search?q=violence" title=" violence"> violence</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerable%20groups" title=" vulnerable groups"> vulnerable groups</a> </p> <a href="https://publications.waset.org/abstracts/22386/interrogating-the-impact-of-insurgency-attacks-on-vulnerable-groups-in-west-africa-implications-for-global-security" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22386.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">472</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1277</span> To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bhaumik%20Tyagi">Bhaumik Tyagi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mandeep%20Kaur"> Mandeep Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Kanika%20Singla"> Kanika Singla</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=hybrid%20blockchain" title="hybrid blockchain">hybrid blockchain</a>, <a href="https://publications.waset.org/abstracts/search?q=secure%20e-voting%20system" title=" secure e-voting system"> secure e-voting system</a>, <a href="https://publications.waset.org/abstracts/search?q=convolutional%20neural%20networks" title=" convolutional neural networks"> convolutional neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20key%20distribution" title=" quantum key distribution"> quantum key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=one-time%20pad" title=" one-time pad"> one-time pad</a> </p> <a href="https://publications.waset.org/abstracts/160604/to-ensure-maximum-voter-privacy-in-e-voting-using-blockchain-convolutional-neural-network-and-quantum-key-distribution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160604.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=43">43</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=44">44</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=socially%20engineered%20attacks&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>