SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning ""information security" ;pers:(Awad Ali Ismail)"

Utökad sökning > "information security" > Awad Ali Ismail

  • Resultat 1-10 av 11
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Information Security : Foundations, technologies and applications
  • 2018
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
  •  
2.
  • Iqbal, Sarfraz, et al. (författare)
  • Conceptual Model of Online Pedagogical Information Security Laboratory : Toward an Ensemble Artifact
  • 2015
  • Ingår i: 2015 48th Hawaii International Conference on System Sciences (HICSS 2015). - Piscataway, NJ : IEEE Communications Society. - 9781479973675 ; , s. 43-52
  • Konferensbidrag (refereegranskat)abstract
    • Distance education in information security has unique requirements in comparison to on-campus education. For instance, an online InfoSec lab is required to provide hands-on education to distance students while development and operation of a lab is a non-trivial problem. There is a need to understand the nature of the online InfoSec labs as ensemble artifacts, and just a black-box tool’s view is not enough. This article suggests a conceptual model to explain the ensemble view of the online InfoSec lab. In doing so, the paper makes two specific contributions: First, it conceptualizes the online Information Security (InfoSec) lab as an ensemble artifact so that we can unfold the black-box view of an InfoSec lab and understand the important building blocks (entities of the lab) and their interrelationships. Second, it suggests design principles to implement the conceptual model of an InfoSec lab.
  •  
3.
  • Awad, Ali Ismail (författare)
  • Introduction to Information Security Foundations and Applications
  • 2018
  • Ingår i: Information Security. - : Institution of Engineering and Technology. - 9781849199742 - 9781849199766 ; , s. 3-9
  • Bokkapitel (refereegranskat)abstract
    • Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for protecting almost all information transaction applications. Security is considered as an important science discipline whose many multifaceted complexities deserve the synergy of the computer science and engineering communities.
  •  
4.
  • Iqbal, Sarfraz, et al. (författare)
  • Design Principles for online Information Security laboratory
  • 2014
  • Ingår i: Selected Papers of the Information Systems Research Seminar in Scandinavia. ; , s. 65-79
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we reported an online InfoSec Lab based on initial design principles derived from kernel theories such as Conversational Framework (CF), Constructive Alignment (CA), and Personalized System of Instruction (PSI). The overall research was conducted using the action design research approach. In doing so, the iterative cycles and critical reflections during the process helped to refine a set of existing design principles. The study contributes to the IS community by providing design principles for an online InfoSec Lab that utilizes state-of-the art technology for mixed classrooms.
  •  
5.
  •  
6.
  •  
7.
  • Hassaballah, M., et al. (författare)
  • A Novel Image Steganography Method for Industrial Internet of Things Security
  • 2021
  • Ingår i: IEEE Transactions on Industrial Informatics. - : IEEE. - 1551-3203 .- 1941-0050. ; 17:11, s. 7743-7751
  • Tidskriftsartikel (refereegranskat)abstract
    • The rapid development of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) brings new security threats by exposing secret and private data. Thus, information security has become a major concern in the communication environment of IIoT and AI, where security and privacy must be ensured for the messages between a sender and the intended recipient. To this end, we propose a method called HHO-IWT for covert communication and secure data in the IIoT environment based on digital image steganography. The method embeds secret data in the cover images using a metaheuristic optimization algorithm called Harris hawks optimization (HHO) to efficiently select image pixels that can be used to hide bits of secret data within integer wavelet transforms. The HHO-based pixel selection operation uses an objective function evaluation depending on two phases: exploitation and exploration. The objective function is employed to determine an optimal encoding vector to transform secret data into an encoded form generated by the HHO algorithm. Several experiments are conducted to validate the performance of the proposed method with respect to visual quality, payload capacity, and security against attacks. The obtained results reveal that the HHO-IWT method achieves higher levels of security than the state-of-the-art methods and that it resists various forms of steganalysis. Thus, utilizing this approach can keep unauthorized individuals away from the transmitted information and solve some security challenges in the IIoT.
  •  
8.
  • Shokry, Mostafa, et al. (författare)
  • CORAS Model for Security Risk Assessment in Advanced Metering Infrastructure Systems
  • 2023
  • Ingår i: Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics 2022. - Cham : Springer Nature. ; , s. 449-459
  • Konferensbidrag (refereegranskat)abstract
    • The risk assessment process is one of the most important tasks that must be performed on critical infrastructure systems to detect security vulnerabilities and risks. The risk assessment task is used to evaluate the likelihood and the impact of the potential threats on the critical assets of any system by determining the threats, the unwanted incidents, and the mitigation techniques to reduce these risks. The advanced metering infrastructure (AMI) system is considered one of the critical infrastructure systems and part of the smart grid system. AMI collects electricity consumption data from the customer’s residence to the electricity data center through bidirectional communication channels to be analyzed. This paper conducts a risk assessment process on the AMI system using the CORAS risk assessment model and CORAS risk assessment tool v1.4 to identify possible risks. The study applies the eight steps of the CORAS model to the AMI system from determining the critical assets in the AMI system to determining the mitigation techniques that can be applied to overcome the existing security vulnerabilities. In the end, this study provides a better understanding of the AMI security risks toward identifying adequate security perimeters for AMI systems.
  •  
9.
  • Shokry, Mostafa, et al. (författare)
  • Systematic survey of advanced metering infrastructure security: Vulnerabilities, attacks, countermeasures, and future vision
  • 2022
  • Ingår i: Future Generation Computer Systems. - : Elsevier. - 0167-739X .- 1872-7115. ; 136, s. 358-377
  • Forskningsöversikt (refereegranskat)abstract
    • There is a paradigm shift from traditional power distribution systems to smart grids (SGs) due to advances in information and communication technology. An advanced metering infrastructure (AMI) is one of the main components in an SG. Its relevance comes from its ability to collect, process, and transfer data through the internet. Although the advances in AMI and SG techniques have brought new operational benefits, they introduce new security and privacy challenges. Security has emerged as an imperative requirement to protect an AMI from attack. Currently, ensuring security is a major challenge in the design and deployment of an AMI. This study provides a systematic survey of the security of AMI systems from diverse perspectives. It focuses on attacks, mitigation approaches, and future visions. The contributions of this article are fourfold: First, the vulnerabilities that may exist in all components of an AMI are described and analyzed. Second, it considers attacks that exploit these vulnerabilities and the impact they can have on the performance of individual components and the overall AMI system. Third, it discusses various countermeasures that can protect an AMI system. Fourth, it presents the open challenges relating to AMI security as well as future research directions. The uniqueness of this review is its comprehensive coverage of AMI components with respect to their security vulnerabilities, attacks, and countermeasures. The future vision is described at the end.
  •  
10.
  • Okoh, Ebenezer, et al. (författare)
  • Toward online education for fingerprint recognition : A proof-of-concept web platform
  • 2017
  • Ingår i: Information Security Journal. - : Taylor & Francis. - 1939-3555 .- 1939-3547. ; 26:4, s. 186-197
  • Tidskriftsartikel (refereegranskat)abstract
    • Recent advances in information and communication technology (ICT) have pushed education systems into the online paradigm. Although fingerprint recognition has received considerable attention from researchers, the concept of creating online or distance education systems for fingerprint recognition systems is a valid problem that requires further investigation. This article addresses the problem and presents a web platform for online education of a fingerprint recognition system. This study focused on the technical design and implementation of the web platform solely as a proof of concept to illustrate the possibility of creating distance education for fingerprint recognition. The developed platform offers students a way to gain knowledge about the full range of fingerprint recognition system technology. The significance of using a web platform stems from the need to supplement students’ theoretical knowledge with practical hands-on experience with information security in general and with fingerprint recognition in particular. Demonstrations such as fingerprint image enhancement and fingerprint feature extraction are included in the current platform prototype. Plots of fingerprint recognition performance curves such as false match rate (FMR) and false non-match rate (FNMR) as functions of the matching threshold curve, the receiver operating characteristic (ROC) curve, and the detection error trade-off (DET) curve are plotted as part of the platform. From a technical viewpoint, the platform was successfully implemented; however, its educational impact needs further evaluation.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 11

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy