Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0025
Victor Funmipe Olofinlade, B. K. Alese, A. Thompson, A. O. Adetunmbi
{"title":"Decision-making Scheme Using Prisoner’s Dilemma: Fraud Detection in Financial Transactions","authors":"Victor Funmipe Olofinlade, B. K. Alese, A. Thompson, A. O. Adetunmbi","doi":"10.20533/icitst.2021.0025","DOIUrl":"https://doi.org/10.20533/icitst.2021.0025","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0010
Andre Bordokan
{"title":"Hash Encoding to Safely Transmit Personal Identifiable Information on Unsecured Methods","authors":"Andre Bordokan","doi":"10.20533/icitst.2021.0010","DOIUrl":"https://doi.org/10.20533/icitst.2021.0010","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0019
Joel Samper, Aspen Olmsted
{"title":"End-to-End Call Authorization in Public Telephony","authors":"Joel Samper, Aspen Olmsted","doi":"10.20533/icitst.2021.0019","DOIUrl":"https://doi.org/10.20533/icitst.2021.0019","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115673519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0009
A. J. Gabriel, Oluwatosin Helen Oluwole, O. Ayeni, B. Alese
{"title":"Development of a Security Audit Management System","authors":"A. J. Gabriel, Oluwatosin Helen Oluwole, O. Ayeni, B. Alese","doi":"10.20533/icitst.2021.0009","DOIUrl":"https://doi.org/10.20533/icitst.2021.0009","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122907046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0017
Tanvir Hassan Zoha, Sifat Nur Billah
{"title":"State Sponsored Cyber Attacks in South Asian Countries and its Implications","authors":"Tanvir Hassan Zoha, Sifat Nur Billah","doi":"10.20533/icitst.2021.0017","DOIUrl":"https://doi.org/10.20533/icitst.2021.0017","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126819410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0004
S. Noponen, Juha Parssinen, J. Salonen
{"title":"Review on Cybersecurity Threats Related to Cyber Ranges","authors":"S. Noponen, Juha Parssinen, J. Salonen","doi":"10.20533/icitst.2021.0004","DOIUrl":"https://doi.org/10.20533/icitst.2021.0004","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126910520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0002
Mahendra Pratap Yadav
{"title":"Container Based Virtualization: A Modern Approach To Deliver The Cloud Services","authors":"Mahendra Pratap Yadav","doi":"10.20533/icitst.2021.0002","DOIUrl":"https://doi.org/10.20533/icitst.2021.0002","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0011
H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese
{"title":"A Lightweight NTRU Lattice Cryptography based Cloud Data Security System","authors":"H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.20533/icitst.2021.0011","DOIUrl":"https://doi.org/10.20533/icitst.2021.0011","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126156705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0014
Supriya Yadav, P. Khanna, G. Howells
This paper investigates the use of novel hardware features derived from the physical and behavioral characteristics of electronic devices to identify such devices uniquely. Importantly, the features examined exhibit nonstandard and multimodal distributions which present a significant challenge to model and characterize. Specifically, the potency of four data classification methods is compared whilst employing such characteristics, proposed model Multivariate Gaussian Distribution (MVGD -address multimodality), Logistic Regression (LogR), Linear Discriminant Analysis (LDA), Support Vector Machine (SVM). Performance is measured based on its accuracy, precision, recall and f measure. The experimental results reveal that by addressing multimodal features with proposed model Multivariate Gaussian Distribution classifier, the overall performance is better than the other classifiers. Keywords—Security, ICMetric, Authentication, Classifiers, Key generation, Multidimensional space.
{"title":"Robust Device Authentication Using Non-Standard Classification Features","authors":"Supriya Yadav, P. Khanna, G. Howells","doi":"10.20533/icitst.2021.0014","DOIUrl":"https://doi.org/10.20533/icitst.2021.0014","url":null,"abstract":"This paper investigates the use of novel hardware features derived from the physical and behavioral characteristics of electronic devices to identify such devices uniquely. Importantly, the features examined exhibit nonstandard and multimodal distributions which present a significant challenge to model and characterize. Specifically, the potency of four data classification methods is compared whilst employing such characteristics, proposed model Multivariate Gaussian Distribution (MVGD -address multimodality), Logistic Regression (LogR), Linear Discriminant Analysis (LDA), Support Vector Machine (SVM). Performance is measured based on its accuracy, precision, recall and f measure. The experimental results reveal that by addressing multimodal features with proposed model Multivariate Gaussian Distribution classifier, the overall performance is better than the other classifiers. Keywords—Security, ICMetric, Authentication, Classifiers, Key generation, Multidimensional space.","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125934960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.20533/icitst.2021.0006
Patricia Yetunde Oni, A. J. Gabriel, A. Thompson, B. Alese
{"title":"Monte Carlo Game Theoretic Model for Network Access Control","authors":"Patricia Yetunde Oni, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.20533/icitst.2021.0006","DOIUrl":"https://doi.org/10.20533/icitst.2021.0006","url":null,"abstract":"","PeriodicalId":331375,"journal":{"name":"International Conference for Internet Technology and Secured Transactions (ICITST-2021)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123579973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}