首页 > 最新文献

Journal of Cybersecurity and Information Management最新文献

英文 中文
A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain b区块链上保护隐私的医疗数据共享系统综述
Pub Date : 2021-10-01 DOI: 10.54216/jcim.040203
Mustafa Tanrıverdi
Sharing the electronic health data helps to increase the accuracy of the diagnoses and to improve the quality of health services. This shared data can also be used in medical research and can reduce medical costs. However, health data are fragmented across decentralized hospitals, this prevents data sharing and puts patients’ privacy at risks. In recent years, blockchain has revealed solutions that make life easier in many areas thanks to its distributed, safe and immutable structure. There are many blockchain-based studies in the literature on providing data privacy and sharing in different areas. In some studies, blockchain has been used with technologies such as cloud computing and cryptology. In the field of healthcare blockchain-based solutions are offered for the management and sharing of Electronic health records. In these solutions, private and consortium blockchain types are generally preferred and Public Key Infrastructure (PKI) and encryption are used for data privacy. Within the scope of this study, blockchain-based studies on the privacy preserving data sharing of health data were examined. In this paper, information about the studies in the literature and potential issues that can be studied in the future were discussed. In addition, information about current blockchain technologies such as smart contracts and PKI is also given.
共享电子保健数据有助于提高诊断的准确性和改善保健服务的质量。这种共享数据也可用于医学研究,并可降低医疗成本。然而,健康数据在分散的医院中是碎片化的,这阻碍了数据共享,并使患者的隐私面临风险。近年来,区块链凭借其分布式、安全和不可变的结构,揭示了许多解决方案,使许多领域的生活更轻松。文献中有许多基于区块链的研究,在不同领域提供数据隐私和共享。在一些研究中,区块链已与云计算和密码学等技术一起使用。在医疗保健领域,为管理和共享电子健康记录提供了基于区块链的解决方案。在这些解决方案中,私有和联盟区块链类型通常是首选,公钥基础设施(PKI)和加密用于数据隐私。在本研究的范围内,研究了基于区块链的健康数据隐私保护数据共享研究。在本文中,讨论了文献研究的信息和未来可以研究的潜在问题。此外,还介绍了当前的区块链技术,如智能合约和PKI。
{"title":"A Systematic Review of Privacy Preserving Healthcare Data Sharing on Blockchain","authors":"Mustafa Tanrıverdi","doi":"10.54216/jcim.040203","DOIUrl":"https://doi.org/10.54216/jcim.040203","url":null,"abstract":"Sharing the electronic health data helps to increase the accuracy of the diagnoses and to improve the quality of health services. This shared data can also be used in medical research and can reduce medical costs. However, health data are fragmented across decentralized hospitals, this prevents data sharing and puts patients’ privacy at risks. In recent years, blockchain has revealed solutions that make life easier in many areas thanks to its distributed, safe and immutable structure. There are many blockchain-based studies in the literature on providing data privacy and sharing in different areas. In some studies, blockchain has been used with technologies such as cloud computing and cryptology. In the field of healthcare blockchain-based solutions are offered for the management and sharing of Electronic health records. In these solutions, private and consortium blockchain types are generally preferred and Public Key Infrastructure (PKI) and encryption are used for data privacy. Within the scope of this study, blockchain-based studies on the privacy preserving data sharing of health data were examined. In this paper, information about the studies in the literature and potential issues that can be studied in the future were discussed. In addition, information about current blockchain technologies such as smart contracts and PKI is also given.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121126481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design, development and performance estimation of 110 kW kinetic heating simulation facilities for material studies–Phase I 用于材料研究的110千瓦动态加热模拟设备的设计、开发和性能评估——第一阶段
Pub Date : 2021-10-01 DOI: 10.54216/jcim.050102
Aldin Justin Sundararaj, K. Sagayam, Ahmed A. Elngar, A. Subash, B. Pillai
In this work, a kinetic heating simulation (KHS) facility has been designed, developed and the performance estimation is carried out in Propulsion and High enthalpy lab held at Karunya Institute of Technology and Sciences. The main objective of developing a KHS facility is to study the material characteristics high temperature paints at elevated temperatures. The Kinetic heating simulation facility is developed for 110 kW power rating. The current facility is designed to hold maximum of 105 Infrared lamps with each lamp having a power rating of 1kW. Ceramic lamps are used for heating the specimen. 15 lamps are placed in a bank and each bank can be controlled individually with the help of controlling unit. A total of 7 banks are used in operation of the kinetic heating simulation facility. To estimate the performance of the KHS facility K-type thermocouple are used for feedback as well as to measure temperature. The KHS also has provision for heat flux measurement. Preliminary studies are carried out to estimate the performance of KHS facility for various ranges
在这项工作中,设计、开发了一个动力学加热模拟(KHS)设备,并在Karunya理工学院的推进和高焓实验室进行了性能评估。开发KHS设备的主要目的是研究高温涂料在高温下的材料特性。动态加热模拟设备的额定功率为110千瓦。目前的设施最多可容纳105个红外灯,每个灯的额定功率为1kW。陶瓷灯用于加热试样。15盏灯放置在一组灯中,每个灯组可以通过控制单元单独控制。在动力学加热模拟设施的运行中,总共使用了7个热源。为了估计KHS设备的性能,k型热电偶用于反馈以及测量温度。KHS也提供热通量测量。我们进行了初步研究,以估计KHS设施在不同范围内的性能
{"title":"Design, development and performance estimation of 110 kW kinetic heating simulation facilities for material studies–Phase I","authors":"Aldin Justin Sundararaj, K. Sagayam, Ahmed A. Elngar, A. Subash, B. Pillai","doi":"10.54216/jcim.050102","DOIUrl":"https://doi.org/10.54216/jcim.050102","url":null,"abstract":"In this work, a kinetic heating simulation (KHS) facility has been designed, developed and the performance estimation is carried out in Propulsion and High enthalpy lab held at Karunya Institute of Technology and Sciences. The main objective of developing a KHS facility is to study the material characteristics high temperature paints at elevated temperatures. The Kinetic heating simulation facility is developed for 110 kW power rating. The current facility is designed to hold maximum of 105 Infrared lamps with each lamp having a power rating of 1kW. Ceramic lamps are used for heating the specimen. 15 lamps are placed in a bank and each bank can be controlled individually with the help of controlling unit. A total of 7 banks are used in operation of the kinetic heating simulation facility. To estimate the performance of the KHS facility K-type thermocouple are used for feedback as well as to measure temperature. The KHS also has provision for heat flux measurement. Preliminary studies are carried out to estimate the performance of KHS facility for various ranges","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Cyber Attack on Saudi Aramco 网络攻击对沙特阿美公司的影响
Pub Date : 2021-09-15 DOI: 10.5281/ZENODO.5172091
Mohammed. I I.alghamdi
Saudi Aramco is the world’s leading oil producer based in Saudi Arabia. Around 1/10th of oil is exported from this organization to the world. Oil production is the major source of revenue for Saudi Arabia and its economy relies completely on it. The Shamoon virus attacked Saudi Aramco in August 2012. The country receives over 80% to 90% of total revenues from the exports of oil and contributes over 40% of the GDP [8]. Shamoon spread from the company's network and removed all of the hard drives. The company was limited only to office workstations and the software was not affected by the virus, due to which all technical operations could have been affected. It was the most disastrous cyber attack in the history of Saudi Arabia. Around 30,000 workstations had been infected by the virus. This paper also discusses the effects of Ransomware which recently attacked Aramco. Apart from that, we will also discuss some suggestions and security measures to prevent those attacks.
沙特阿美公司是世界领先的石油生产商,总部设在沙特阿拉伯。大约十分之一的石油从该组织出口到世界各地。石油生产是沙特阿拉伯的主要收入来源,其经济完全依赖于石油。Shamoon病毒于2012年8月袭击了沙特阿美公司。石油出口占该国总收入的80%至90%以上,占GDP的40%以上[8]。Shamoon从公司的网络中传播开来并移除了所有的硬盘驱动器。该公司仅限于办公工作站,软件没有受到病毒的影响,因此所有技术操作都可能受到影响。这是沙特阿拉伯历史上最具灾难性的网络攻击。大约有3万个工作站被病毒感染。本文还讨论了最近袭击沙特阿美公司的勒索软件的影响。除此之外,我们还将讨论一些建议和安全措施,以防止这些攻击。
{"title":"Impact of Cyber Attack on Saudi Aramco","authors":"Mohammed. I I.alghamdi","doi":"10.5281/ZENODO.5172091","DOIUrl":"https://doi.org/10.5281/ZENODO.5172091","url":null,"abstract":"Saudi Aramco is the world’s leading oil producer based in Saudi Arabia. Around 1/10th of oil is exported from this organization to the world. Oil production is the major source of revenue for Saudi Arabia and its economy relies completely on it. The Shamoon virus attacked Saudi Aramco in August 2012. The country receives over 80% to 90% of total revenues from the exports of oil and contributes over 40% of the GDP [8]. Shamoon spread from the company's network and removed all of the hard drives. The company was limited only to office workstations and the software was not affected by the virus, due to which all technical operations could have been affected. It was the most disastrous cyber attack in the history of Saudi Arabia. Around 30,000 workstations had been infected by the virus. This paper also discusses the effects of Ransomware which recently attacked Aramco. Apart from that, we will also discuss some suggestions and security measures to prevent those attacks.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123039240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification Based On CNN: A Survey 基于CNN的图像分类研究
Pub Date : 2021-07-22 DOI: 10.54216/jcim.060102
Ahmed A. Elngar, Artificial Intelligenc, Mohamed Arafa, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban, Nehal Fawzy
Computer vision is one of the fields of computer science that is one of the most powerful and persuasive types of artificial intelligence. It is similar to the human vision system, as it enables computers to recognize and process objects in pictures and videos in the same way as humans do. Computer vision technology has rapidly evolved in many fields and contributed to solving many problems, as computer vision contributed to self-driving cars, and cars were able to understand their surroundings. The cameras record video from different angles around the car, then a computer vision system gets images from the video, and then processes the images in real-time to find roadside ends, detect other cars, and read traffic lights, pedestrians, and objects. Computer vision also contributed to facial recognition; this technology enables computers to match images of people’s faces to their identities. which these algorithms detect facial features in images and then compare them with databases. Computer vision also play important role in Healthcare, in which algorithms can help automate tasks such as detecting Breast cancer, finding symptoms in x-ray, cancerous moles in skin images, and MRI scans. Computer vision also contributed to many fields such as image classification, object discovery, motion recognition, subject tracking, and medicine. The rapid development of artificial intelligence is making machine learning more important in his field of research. Use algorithms to find out every bit of data and predict the outcome. This has become an important key to unlocking the door to AI. If we had looked to deep learning concept, we find deep learning is a subset of machine learning, algorithms inspired by structure and function of the human brain called artificial neural networks, learn from large amounts of data. Deep learning algorithm perform a task repeatedly, each time tweak it a little to improve the outcome. So, the development of computer vision was due to deep learning. Now we'll take a tour around the convolution neural networks, let us say that convolutional neural networks are one of the most powerful supervised deep learning models (abbreviated as CNN or ConvNet). This name ;convolutional ; is a token from a mathematical linear operation between matrixes called convolution. CNN structure can be used in a variety of real-world problems including, computer vision, image recognition, natural language processing (NLP), anomaly detection, video analysis, drug discovery, recommender systems, health risk assessment, and time-series forecasting. If we look at convolutional neural networks, we see that CNN are similar to normal neural networks, the only difference between CNN and ANN is that CNNs are used in the field of pattern recognition within images mainly. This allows us to encode the features of an image into the structure, making the network more suitable for image-focused tasks, with reducing the parameters required to set-up the model. One of th
计算机视觉是计算机科学的一个领域,是最强大和最有说服力的人工智能类型之一。它类似于人类的视觉系统,因为它使计算机能够以与人类相同的方式识别和处理图片和视频中的物体。计算机视觉技术在许多领域迅速发展,并为解决许多问题做出了贡献,例如计算机视觉为自动驾驶汽车做出了贡献,汽车能够理解周围环境。摄像头从汽车周围的不同角度录制视频,然后计算机视觉系统从视频中获取图像,然后对图像进行实时处理,以找到路边的尽头,检测其他车辆,并读取交通灯、行人和物体。计算机视觉也有助于面部识别;这项技术使计算机能够将人脸图像与其身份相匹配。这些算法检测图像中的面部特征,然后与数据库进行比较。计算机视觉在医疗保健中也发挥着重要作用,其中算法可以帮助自动执行检测乳腺癌、查找x射线中的症状、皮肤图像中的癌性痣和MRI扫描等任务。计算机视觉也对许多领域做出了贡献,如图像分类、物体发现、运动识别、主题跟踪和医学。人工智能的快速发展使得机器学习在他的研究领域变得更加重要。使用算法找出每一点数据并预测结果。这已经成为打开AI大门的重要钥匙。如果我们看一下深度学习的概念,我们会发现深度学习是机器学习的一个子集,算法的灵感来自于人类大脑的结构和功能,称为人工神经网络,从大量数据中学习。深度学习算法反复执行一项任务,每次都稍微调整一下以改善结果。所以,计算机视觉的发展源于深度学习。现在我们来看看卷积神经网络,我们说卷积神经网络是最强大的监督深度学习模型之一(缩写为CNN或ConvNet)。这个名字,卷积的;是一个记号,从数学线性运算之间的矩阵称为卷积。CNN结构可用于各种现实问题,包括计算机视觉、图像识别、自然语言处理(NLP)、异常检测、视频分析、药物发现、推荐系统、健康风险评估和时间序列预测。如果我们看卷积神经网络,我们看到CNN和普通的神经网络是相似的,CNN和ANN唯一的区别是CNN主要用于图像内的模式识别领域。这允许我们将图像的特征编码到结构中,使网络更适合于以图像为中心的任务,同时减少了建立模型所需的参数。CNN的优势之一是它在机器学习问题上有很好的表现。因此,我们将使用CNN作为图像分类器。因此,本文的目的是我们将在接下来的章节中详细讨论图像分类。
{"title":"Image Classification Based On CNN: A Survey","authors":"Ahmed A. Elngar, Artificial Intelligenc, Mohamed Arafa, Amar Fathy, Basma Moustafa, Omar Mahmoud, M. Shaban, Nehal Fawzy","doi":"10.54216/jcim.060102","DOIUrl":"https://doi.org/10.54216/jcim.060102","url":null,"abstract":"Computer vision is one of the fields of computer science that is one of the most powerful and persuasive types of artificial intelligence. It is similar to the human vision system, as it enables computers to recognize and process objects in pictures and videos in the same way as humans do. Computer vision technology has rapidly evolved in many fields and contributed to solving many problems, as computer vision contributed to self-driving cars, and cars were able to understand their surroundings. The cameras record video from different angles around the car, then a computer vision system gets images from the video, and then processes the images in real-time to find roadside ends, detect other cars, and read traffic lights, pedestrians, and objects. Computer vision also contributed to facial recognition; this technology enables computers to match images of people’s faces to their identities. which these algorithms detect facial features in images and then compare them with databases. Computer vision also play important role in Healthcare, in which algorithms can help automate tasks such as detecting Breast cancer, finding symptoms in x-ray, cancerous moles in skin images, and MRI scans. Computer vision also contributed to many fields such as image classification, object discovery, motion recognition, subject tracking, and medicine. The rapid development of artificial intelligence is making machine learning more important in his field of research. Use algorithms to find out every bit of data and predict the outcome. This has become an important key to unlocking the door to AI. If we had looked to deep learning concept, we find deep learning is a subset of machine learning, algorithms inspired by structure and function of the human brain called artificial neural networks, learn from large amounts of data. Deep learning algorithm perform a task repeatedly, each time tweak it a little to improve the outcome. So, the development of computer vision was due to deep learning. Now we'll take a tour around the convolution neural networks, let us say that convolutional neural networks are one of the most powerful supervised deep learning models (abbreviated as CNN or ConvNet). This name ;convolutional ; is a token from a mathematical linear operation between matrixes called convolution. CNN structure can be used in a variety of real-world problems including, computer vision, image recognition, natural language processing (NLP), anomaly detection, video analysis, drug discovery, recommender systems, health risk assessment, and time-series forecasting. If we look at convolutional neural networks, we see that CNN are similar to normal neural networks, the only difference between CNN and ANN is that CNNs are used in the field of pattern recognition within images mainly. This allows us to encode the features of an image into the structure, making the network more suitable for image-focused tasks, with reducing the parameters required to set-up the model. One of th","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
An Artificial Intelligence-based Intrusion Detection System 基于人工智能的入侵检测系统
Pub Date : 2021-04-01 DOI: 10.54216/jcim.07.02.04
Thani A. Almuhairi, Ahmad Almarri, Khalid Hokal
Intrusion detection systems have been used in many systems to avoid malicious attacks. Traditionally, these intrusion detection systems use signature-based classification to detect predefined attacks and monitor the network's overall traffic. These intrusion detection systems often fail when an unseen attack occurs, which does not match with predefined attack signatures, leaving the system hopeless and vulnerable. In addition, as new attacks emerge, we need to update the database of attack signatures, which contains the attack information. This raises concerns because it is almost impossible to define every attack in the database and make the process costly also. Recently, research in conjunction with artificial intelligence and network security has evolved. As a result, it created many possibilities to enable machine learning approaches to detect the new attacks in network traffic. Machine learning has already shown successful results in the domain of recommendation systems, speech recognition, and medical systems. So, in this paper, we utilize machine learning approaches to detect attacks and classify them. This paper uses the CSE-CIC-IDS dataset, which contains normal and malicious attacks samples. Multiple steps are performed to train the network traffic classifier. Finally, the model is deployed for testing on sample data.
入侵检测系统在许多系统中被用来避免恶意攻击。传统上,这些入侵检测系统使用基于签名的分类来检测预定义的攻击并监控网络的整体流量。这些入侵检测系统经常在不可见的攻击发生时失败,这些攻击与预定义的攻击签名不匹配,使系统变得绝望和脆弱。此外,当新的攻击出现时,我们需要更新包含攻击信息的攻击签名库。这引起了人们的关注,因为几乎不可能定义数据库中的每一次攻击,并且使该过程代价高昂。最近,与人工智能和网络安全相结合的研究得到了发展。因此,它创造了许多可能性,使机器学习方法能够检测网络流量中的新攻击。机器学习已经在推荐系统、语音识别和医疗系统领域显示出成功的结果。因此,在本文中,我们利用机器学习方法来检测攻击并对其进行分类。本文使用CSE-CIC-IDS数据集,包含正常攻击和恶意攻击样本。执行多个步骤来训练网络流量分类器。最后,将模型部署到样本数据上进行测试。
{"title":"An Artificial Intelligence-based Intrusion Detection System","authors":"Thani A. Almuhairi, Ahmad Almarri, Khalid Hokal","doi":"10.54216/jcim.07.02.04","DOIUrl":"https://doi.org/10.54216/jcim.07.02.04","url":null,"abstract":"Intrusion detection systems have been used in many systems to avoid malicious attacks. Traditionally, these intrusion detection systems use signature-based classification to detect predefined attacks and monitor the network's overall traffic. These intrusion detection systems often fail when an unseen attack occurs, which does not match with predefined attack signatures, leaving the system hopeless and vulnerable. In addition, as new attacks emerge, we need to update the database of attack signatures, which contains the attack information. This raises concerns because it is almost impossible to define every attack in the database and make the process costly also. Recently, research in conjunction with artificial intelligence and network security has evolved. As a result, it created many possibilities to enable machine learning approaches to detect the new attacks in network traffic. Machine learning has already shown successful results in the domain of recommendation systems, speech recognition, and medical systems. So, in this paper, we utilize machine learning approaches to detect attacks and classify them. This paper uses the CSE-CIC-IDS dataset, which contains normal and malicious attacks samples. Multiple steps are performed to train the network traffic classifier. Finally, the model is deployed for testing on sample data.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130725116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review into the evolution of HIPAA in response to evolving technological environments 回顾HIPAA在技术环境演变中的演变
Pub Date : 2020-12-10 DOI: 10.5281/ZENODO.4014219
Abhishek P. Patil, Neelika Chakrabarti
The Health Insurance Portability and Accountability Act of 1996 was brought in to serve as a legislation that could essentially assist in reorganizing the flow of healthcare information, prescribing how sensitive medical data stored with healthcare/insurance firms should be protected from stealing and tampering. It has served as a pioneer in the world of privacy in healthcare and set one of the earliest benchmarks for any legal instruments regarding the storing and dissemination of medical information in the form of electronic health records. The HITECH act of 2009 and the HIPAA omnibus rule of 2013 further cemented the use of standardized frameworks which can help control, reduce and track any possible breaches of confidentiality and integrity of such personal information. This paper explores the content, reasoning, and timeline of the HIPAA act and the impact it creates on the health information technology sector. It also explains the challenges that are faced in the implementation of the policy and gives a holistic perspective of the rights and responsibilities of each stakeholder involved.
1996年的《健康保险流通与责任法案》(Health Insurance Portability and Accountability Act)是一项可以从根本上帮助重组医疗保健信息流的立法,规定了如何保护存储在医疗保健/保险公司的敏感医疗数据不被窃取和篡改。它是保健领域隐私领域的先驱,并为以电子健康记录形式存储和传播医疗信息的任何法律文书设定了最早的基准之一。2009年的HITECH法案和2013年的HIPAA综合规则进一步巩固了标准化框架的使用,这些框架可以帮助控制、减少和跟踪任何可能违反此类个人信息机密性和完整性的行为。本文探讨了HIPAA法案的内容、推理和时间表,以及它对卫生信息技术部门的影响。它还解释了在政策实施过程中所面临的挑战,并对所涉及的每个利益相关者的权利和责任进行了全面的分析。
{"title":"A review into the evolution of HIPAA in response to evolving technological environments","authors":"Abhishek P. Patil, Neelika Chakrabarti","doi":"10.5281/ZENODO.4014219","DOIUrl":"https://doi.org/10.5281/ZENODO.4014219","url":null,"abstract":"The Health Insurance Portability and Accountability Act of 1996 was brought in to serve as a legislation that could essentially assist in reorganizing the flow of healthcare information, prescribing how sensitive medical data stored with healthcare/insurance firms should be protected from stealing and tampering. It has served as a pioneer in the world of privacy in healthcare and set one of the earliest benchmarks for any legal instruments regarding the storing and dissemination of medical information in the form of electronic health records. The HITECH act of 2009 and the HIPAA omnibus rule of 2013 further cemented the use of standardized frameworks which can help control, reduce and track any possible breaches of confidentiality and integrity of such personal information. This paper explores the content, reasoning, and timeline of the HIPAA act and the impact it creates on the health information technology sector. It also explains the challenges that are faced in the implementation of the policy and gives a holistic perspective of the rights and responsibilities of each stakeholder involved.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115161768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Various Credit Card Fraud Detection Techniques 各种信用卡欺诈检测技术分析
Pub Date : 1900-01-01 DOI: 10.54216/jcim.050202
A. Admin
Data mining is a technique that is applied to mine valuable information from the rough data. A prediction analysis is an approach that has the potential for forecasting future possibilities based on the recent data. The CCFD is the challenge of prediction in which fraudulent transactions are predicted based on certain rules. There are several stages included in the detection of fraud in credit cards. Various classification algorithms are reviewed with respect to the performance analysis in order to detect fraud in the credit card. The performance is measured with regard to precision.
数据挖掘是一种从粗糙数据中挖掘有价值信息的技术。预测分析是一种有可能根据最近的数据预测未来可能性的方法。CCFD是一种预测挑战,它根据一定的规则预测欺诈交易。信用卡欺诈的侦查分为几个阶段。为了检测信用卡中的欺诈行为,在性能分析方面回顾了各种分类算法。性能是根据精度来衡量的。
{"title":"Analysis of Various Credit Card Fraud Detection Techniques","authors":"A. Admin","doi":"10.54216/jcim.050202","DOIUrl":"https://doi.org/10.54216/jcim.050202","url":null,"abstract":"Data mining is a technique that is applied to mine valuable information from the rough data. A prediction analysis is an approach that has the potential for forecasting future possibilities based on the recent data. The CCFD is the challenge of prediction in which fraudulent transactions are predicted based on certain rules. There are several stages included in the detection of fraud in credit cards. Various classification algorithms are reviewed with respect to the performance analysis in order to detect fraud in the credit card. The performance is measured with regard to precision.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"875 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123026444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Security Management Framework for Cloud Computing Environments 面向云计算环境的信息安全管理框架
Pub Date : 1900-01-01 DOI: 10.54216/jcim.110102
Manal M. .., S. M. Hebrisha
Cloud computing has become a popular paradigm for delivering computing resources and services over the internet. However, the adoption of cloud computing also brings new security challenges and risks, including data breaches, insider attacks, and unauthorized access. Therefore, it is critical to have a comprehensive information security management framework to address these challenges and ensure the security and privacy of cloud computing environments. This paper proposes a machine learning (ML) based information security management (ISM) framework for cloud computing environments that integrates best practices and standards from various domains, including cloud computing, information security, and risk management. The proposed framework includes residual recurrent network to effectively discriminate different patterns of cloud security attacks. The proposed framework emphasizes the importance of threat detection, security controls, and continuous monitoring and improvement. The framework is designed to be flexible and scalable, allowing organizations to tailor it to their specific needs and requirements.
云计算已经成为在互联网上提供计算资源和服务的流行范例。然而,云计算的采用也带来了新的安全挑战和风险,包括数据泄露、内部攻击和未经授权的访问。因此,有一个全面的信息安全管理框架来应对这些挑战,确保云计算环境的安全和隐私是至关重要的。本文提出了一个基于机器学习(ML)的云计算环境信息安全管理(ISM)框架,该框架集成了来自各个领域的最佳实践和标准,包括云计算、信息安全和风险管理。该框架包含残差循环网络,能够有效区分不同的云安全攻击模式。该框架强调了威胁检测、安全控制以及持续监测和改进的重要性。该框架被设计为灵活和可伸缩的,允许组织根据其特定的需要和需求对其进行定制。
{"title":"Information Security Management Framework for Cloud Computing Environments","authors":"Manal M. .., S. M. Hebrisha","doi":"10.54216/jcim.110102","DOIUrl":"https://doi.org/10.54216/jcim.110102","url":null,"abstract":"Cloud computing has become a popular paradigm for delivering computing resources and services over the internet. However, the adoption of cloud computing also brings new security challenges and risks, including data breaches, insider attacks, and unauthorized access. Therefore, it is critical to have a comprehensive information security management framework to address these challenges and ensure the security and privacy of cloud computing environments. This paper proposes a machine learning (ML) based information security management (ISM) framework for cloud computing environments that integrates best practices and standards from various domains, including cloud computing, information security, and risk management. The proposed framework includes residual recurrent network to effectively discriminate different patterns of cloud security attacks. The proposed framework emphasizes the importance of threat detection, security controls, and continuous monitoring and improvement. The framework is designed to be flexible and scalable, allowing organizations to tailor it to their specific needs and requirements.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129729405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-based Information Security Model for Botnet Detection 基于机器学习的僵尸网络检测信息安全模型
Pub Date : 1900-01-01 DOI: 10.54216/jcim.090106
H. Fadhil, Noor Q. Makhool, Muna M. Hummady, Z. O. Dawood
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet detection for information security. For effectual recognition of botnets, the proposed model involves data pre-processing at the initial stage. Besides, the model is utilized for the identification and classification of botnets that exist in the network. In order to optimally adjust the SVM parameters, the DFA is utilized and consequently resulting in enhanced outcomes. The presented model has the ability in accomplishing improved botnet detection performance. A wide-ranging experimental analysis is performed and the results are inspected under several aspects. The experimental results indicated the efficiency of our model over existing methods.
僵尸网络检测在秩序、网络安全、法律、金融、医疗保健等众多领域都是一个具有挑战性的问题。僵尸网络是指由网络犯罪分子控制的一组相互协作的互联网连接设备,进行协同攻击并应用各种恶意事件。虽然僵尸网络是无缝动态的,并且基于网络和基于主机的检测技术预测了发展中的对策,但传统的技术无法获得足够的安全性来应对僵尸网络威胁。因此,建立了用于检测和分类僵尸网络的机器学习方法。本文提出了一种基于多类支持向量机的僵尸网络检测蜻蜓算法。为了有效识别僵尸网络,该模型在初始阶段对数据进行预处理。此外,该模型还用于对网络中存在的僵尸网络进行识别和分类。为了最优地调整支持向量机参数,使用了DFA,从而提高了结果。该模型能够提高僵尸网络的检测性能。进行了广泛的实验分析,并从几个方面对结果进行了检查。实验结果表明,该模型比现有方法更有效。
{"title":"Machine Learning-based Information Security Model for Botnet Detection","authors":"H. Fadhil, Noor Q. Makhool, Muna M. Hummady, Z. O. Dawood","doi":"10.54216/jcim.090106","DOIUrl":"https://doi.org/10.54216/jcim.090106","url":null,"abstract":"Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet detection for information security. For effectual recognition of botnets, the proposed model involves data pre-processing at the initial stage. Besides, the model is utilized for the identification and classification of botnets that exist in the network. In order to optimally adjust the SVM parameters, the DFA is utilized and consequently resulting in enhanced outcomes. The presented model has the ability in accomplishing improved botnet detection performance. A wide-ranging experimental analysis is performed and the results are inspected under several aspects. The experimental results indicated the efficiency of our model over existing methods.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129171641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment 物联网环境下基于深度学习的入侵检测系统建模
Pub Date : 1900-01-01 DOI: 10.54216/jcim.080102
M. Hammoudeh, Saeed M. Aljaberi
The Internet of Things (IoT) has become a hot popular topic for building a smart environment. At the same time, security and privacy are treated as significant problems in the real-time IoT platform. Therefore, it is highly needed to design intrusion detection techniques for accomplishing security in IoT. With this motivation, this study designs a novel flower pollination algorithm (FPA) based feature selection with a gated recurrent unit (GRU) model, named FPAFS-GRU technique for intrusion detection in the IoT platform. The proposed FPAFS-GRU technique is mainly designed to determine the presence of intrusions in the network. The FPAFS-GRU technique involves the design of the FPAFS technique to choose an optimal subset of features from the networking data. Besides, a deep learning based GRU model is applied as a classification tool to identify the network intrusions. An extensive experimental analysis takes place on KDDCup 1999 dataset, and the results are investigated under different dimensions. The resultant simulation values demonstrated the betterment of the FPAFS-GRU technique with a higher detection rate of 0.9976.
物联网(IoT)已成为构建智能环境的热门话题。同时,在实时物联网平台中,安全和隐私被视为重要问题。因此,为实现物联网安全,需要设计入侵检测技术。基于此动机,本研究设计了一种基于特征选择的基于门控循环单元(GRU)模型的花卉授粉算法(FPA),命名为FPAFS-GRU技术,用于物联网平台的入侵检测。提出的FPAFS-GRU技术主要用于确定网络中是否存在入侵。FPAFS- gru技术涉及FPAFS技术从网络数据中选择最优特征子集的设计。此外,采用基于深度学习的GRU模型作为分类工具对网络入侵进行识别。对KDDCup 1999数据集进行了广泛的实验分析,并在不同维度下对结果进行了研究。仿真结果表明,FPAFS-GRU技术具有较高的检出率(0.9976)。
{"title":"Modeling of Deep Learning based Intrusion Detection System in Internet of Things Environment","authors":"M. Hammoudeh, Saeed M. Aljaberi","doi":"10.54216/jcim.080102","DOIUrl":"https://doi.org/10.54216/jcim.080102","url":null,"abstract":"The Internet of Things (IoT) has become a hot popular topic for building a smart environment. At the same time, security and privacy are treated as significant problems in the real-time IoT platform. Therefore, it is highly needed to design intrusion detection techniques for accomplishing security in IoT. With this motivation, this study designs a novel flower pollination algorithm (FPA) based feature selection with a gated recurrent unit (GRU) model, named FPAFS-GRU technique for intrusion detection in the IoT platform. The proposed FPAFS-GRU technique is mainly designed to determine the presence of intrusions in the network. The FPAFS-GRU technique involves the design of the FPAFS technique to choose an optimal subset of features from the networking data. Besides, a deep learning based GRU model is applied as a classification tool to identify the network intrusions. An extensive experimental analysis takes place on KDDCup 1999 dataset, and the results are investigated under different dimensions. The resultant simulation values demonstrated the betterment of the FPAFS-GRU technique with a higher detection rate of 0.9976.","PeriodicalId":169383,"journal":{"name":"Journal of Cybersecurity and Information Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Cybersecurity and Information Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1