Category: Publications

Security aspects of Internet of Things aided smart grids: A bibliometric survey

Security aspects of Internet of Things aided smart grids: A bibliometric survey Abstract: The integration of sensors and communication technology in power systems, known as the smart grid, is an emerging topic in science and technology. One of the critical issues in the smart grid is its increased vulnerability to cyber-threats. As such, various types […]

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments

Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments Abstract: Current authentication protocols seek to establish authenticated sessions over insecure channels while maintaining a small footprint considering the energy consumption and computational overheads. Traditional authentication schemes must store a form of authentication data on the devices, putting this data at […]

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids Abstract: Smart grid technology increases reliability, security, and efficiency of the electrical grids. However, its strong dependencies on digital communication technology bring up new vulnerabilities that need to be considered for efficient and reliable power distribution. In this paper, an […]

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking Abstract: Security is one of the most challenging issues in software defined networking (SDN), and causes include the inability to detect the contents of the packets. In addition, file transferring to SDN is a potential attack vector that can be exploited at the network level. […]

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment Abstract: Vulnerability assessment (e.g., vulnerability identification and exploitation; also referred to as penetration testing) is a relatively mature industry, although attempting to keep pace with the diversity of computing and digital devices that need to be examined is challenging. Hence, […]

Fuzzy pattern tree for edge malware detection and categorization in IoT

Fuzzy pattern tree for edge malware detection and categorization in IoT Abstract: The surging pace of Internet of Things (IoT) development and its applications has resulted in significantly large amounts of data (commonly known as big data) being communicated and processed across IoT networks. While cloud computing has led to several possibilities in regard to […]

A systematic literature review of blockchain cyber security

A systematic literature review of blockchain cyber security Abstract: Since the publication of Satoshi Nakamoto’s white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber […]

An opcode‐based technique for polymorphic Internet of Things malware detection

An opcode‐based technique for polymorphic Internet of Things malware detection Abstract: The increasing popularity of Internet of Things (IoT) devices makes them an attractive target for malware authors. In this paper, we use sequential pattern mining technique to detect most frequent opcode sequences of malicious IoT applications. Detected maximal frequent patterns (MFP) of opcode sequences […]

Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study

Forensic investigation of cross platform massively multiplayer online games: Minecraft as a case study Abstract: Minecraft, a Massively Multiplayer Online Game (MMOG), has reportedly millions of players from different age groups worldwide. With Minecraft being so popular, particularly with younger audiences, it is no surprise that the interactive nature of Minecraft has facilitated the commission […]

An analysis of anti-forensic capabilities of B-tree file system (Btrfs)

An analysis of anti-forensic capabilities of B-tree file system (Btrfs) Abstract: Anti-forensic techniques aim to prevent, hinder or corrupt the forensic process of evidence acquisition, its analysis, and/or its admissibility. File systems are at the spotlight of almost every forensic investigation. The Linux B-tree file system (Btrfs) offers a paradigm shift in file system design […]