RH Logo
Hubs
About
Live
Leaderboard

Most Reputable Users

Author Profile Avatar
Anton Popov
2045
Author Profile Avatar
ayotune adebayo
2083
Author Profile Avatar
Emeka A. Ezewudo
2760
Author Profile Avatar
Colin Moser
1191
Author Profile Avatar
Dmitry Chernyshov
214
Author Profile Avatar
Samet özkan
129
Author Profile Avatar
Hits Divulga Funk
128
Author Profile Avatar
Lijo jose
103
Author Profile Avatar
Hassan
117
Author Profile Avatar
Ernest Petrov
200

Trending Papers in information security

Trending
Today
309
From Paper: D4I - Digital forensics framework for reviewing and investigating cyber attacks
Published: Mar 2020
From Paper: D4I - Digital forensics framework for reviewing and investigating cyber attacks
Published: Mar 2020
Author Profile Avatar
Emeka A. Ezewudo
5
Authors: Xia, Pengcheng, et al
Published: Nov 2020
Authors: Xia, Pengcheng, et al
Published: Nov 2020
As the indispensable trading platforms of the ecosystem, hundreds of cryptocurrency exchanges are emerging to facilitate the trading of digital assets. While, it also attracts the attention of attackers. A number of scam attacks were reported targeting cryptocurrency exchanges, leading to a huge amount of financial loss. However, no previous work in the research community has systematically studied this problem. This paper makes the first effort to identify and characterize the cryptocurrency exchange scams. First, over 1500 scam domains and over 300 fake apps are identified, by collecting existing reports and using typosquatting generation techniques. Then, by investigating the relationship between the scam domains and fake apps, this paper identifies 94 scam domain families and 30 fake app families. By further characterizing the impacts of such scams, it is revealed that these scams have incurred financial loss of 520k US dollars at least. It is further observed that the fake apps have been sneaked to major app markets (including Google Play) to infect unsuspicious users. The findings in this paper demonstrate the urgency to identify and prevent cryptocurrency exchange scams. To facilitate future research, all the identified scam domains and fake apps have been publicly released to the research community.
Author Profile Avatar
Colin Moser
2
Authors: George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis
Published: Sep 2020
Authors: George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis
Published: Sep 2020
In the 4th industrial revolution era, security of multiple interconnected devices has become a critical issue. A rapidly increasing number of cybersecurity incidents emerge due to complex interconnected sensors, devices, and systems used in the Internet of Things. In this paper, we tackle the need for automation in security risk analysis and restructuring of such networks. The presented framework models the connections of assets and devices so as to depict their interdependencies on a company's business processes and effectively reduces their overall risk against cybersecurity threats. It achieves this by (1) identifying critical components and dependency structural risks, (2) prioritizing assets based on their influence on business processes and (3) proposing network restructures and asset clusters. To do that, the proposed algorithm utilizes (i) dependency risk graphs for modeling and analyzing networks dependencies, (ii) graph minimum spanning trees, and (iii) network centrality metrics. We test the implementation on a real-world company and demonstrate its effectiveness. Results show that the framework can automatically identify critical components and dependency structural risks and propose different network topologies by creating the optimum number of asset subnets, while retaining business operations. Tests show that the closeness centrality metric combined with the midpoint on extreme values calculation type works best for network asset grouping and subnetting.
Author Profile Avatar
Colin Moser
205
From Paper: Information security of Internet things
Published: Jan 2020
From Paper: Information security of Internet things
Published: Jan 2020
  • The development of the Internet of things is the final process of mass integration of computer technologies, communication technologies and various sectors of the industrial industry. In addition to threats from traditional communication networks (threats of information distortion, repetition, eavesdropping, disclosure), IOT applications face additional security problems at the application level: the use of cloud computing, intellectual property rights, data processing, protection of confidential information, etc.
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
Author Profile Avatar
ayotune adebayo
103
From Paper: Testing and Evaluation System for Cloud Computing Information Security Products
Published: Mar 2020
From Paper: Testing and Evaluation System for Cloud Computing Information Security Products
Published: Mar 2020
  • Due to the lack of professional testing and evaluation system for cloud computing information security products, the basic security of cloud computing information security products cannot be guaranteed. The establishment of a test and evaluation system of cloud computing information security products is provided, and the system is used in the actual product testing, to further promote the development of cloud computing and information security.
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
Author Profile Avatar
ayotune adebayo
103
From Paper: GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking
Published: Sep 2020
From Paper: GoSafe: On the practical characterization of the overall security posture of an organization information system using smart auditing and ranking
Published: Sep 2020
  • The digital revolution has dramatically changed governance, communication, commerce, and industry worldwide. Digital information advent has given the rise of the ability of being accessed without the need for physical presence
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
Author Profile Avatar
ayotune adebayo
102
From Paper: Requirements for computerized tools to design information security policies
Published: Sep 2020
From Paper: Requirements for computerized tools to design information security policies
Published: Sep 2020
  • Over the last few decades, information systems have become an increasingly integral aspect of organizations. However, when these information systems are compromised, it can be extremely damaging to business.
Author Profile Avatar
ayotune adebayo
Slide 1 of 1
  • Paper Preview Page 1
Author Profile Avatar
ayotune adebayo
111
From Paper: The playfulness of Facebook – Shaped by underlying psychological drivers and gender differences
Published: Dec 2018
From Paper: The playfulness of Facebook – Shaped by underlying psychological drivers and gender differences
Published: Dec 2018
This paper investigates how e-governance diffuses in population. Specifically, the cumulative and peak adoption rates of e-governance, the usage patterns of duration (number of days services were used) and depth (number of services used) of usage were analyzed. The data comprised 2.1 billion rows of anonymized service call log data of the entire Estonian e-governance ecosystem, the X-Road, from 2003 to 2015. The results showed that e-governance diffusion was linear, not sigmoid-shape, as literature suggests. In general, cumulative adoption rate grows faster and peak adoption rate increases as user age decreases, and is higher among women. E-service usage duration does not increase faster than usage depth. Usage depth and duration increased with age, though not linearly, and were higher in women. This is the first study to use the behavioral data logs of the entire population across more than 10 years to study technology diffusion on the example of e-governance. The results complement the contemporary technology adoption and discussion theories, and this study could be of practical relevance to other nations implementing their own e-services for governance.
Author Profile Avatar
Emeka A. Ezewudo
Author Profile Avatar
Emeka A. Ezewudo
139
From Paper: BIg_network_v5_page
From Paper: BIg_network_v5_page
  • Connect chains together to make one single network. It thus allows transactions to go through from one chain to another.
  • Governed by anyone who owns DOTs.
Author Profile Avatar
Anton Popov
Slide 1 of 1
  • Paper Preview Page 1
2
Authors: Cronin, Bruce, et al
Published: Nov 2020
Authors: Cronin, Bruce, et al
Published: Nov 2020
Reflecting on the compilation and analysis of a range of network datasets drawn from our own work and some prominent examples, we consider the ethical challenges in dealing with network data in business and management settings. We argue that the managerial processes that characterize such settings introduce particular ethical sensitivities in the stages of commissioning and research design, and when collecting, analyzing and reporting network data. These sensitivities arise from the imperatives of business, motivations for commissioning network analyses and the legal authority that managers have over employees. We argue that ethical considerations are much more pervasive in business and management network research than in many other fields. In this contribution, we present a range of ethical challenges in network research in business and management settings that arise at several stages of the research process. For each issue identified, we describe the ethical problem and propose mitigation remedies. From this reflection, we suggest guidelines for other researchers to consider when designing research projects in this application area.
Author Profile Avatar
Colin Moser
Load More Papers