Abas H. Lampezhev, V. Kuklin, Leonid Chervyakov, A. Tatarkanov
{"title":"Development of a Method for Determining the List of Key Threats to Information Security of Computer Networks","authors":"Abas H. Lampezhev, V. Kuklin, Leonid Chervyakov, A. Tatarkanov","doi":"10.18280/ijsse.130606","DOIUrl":"https://doi.org/10.18280/ijsse.130606","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"13 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Doma Murli Krishna Reddy, Rajendran Sathya, Veeravatnam V.A.S. Lakshmi
{"title":"Digital Incontrovertible Multi Level Key Set Based Node Authentication Model for Malicious Node Detection for Secure Data Transmission in WSN","authors":"Doma Murli Krishna Reddy, Rajendran Sathya, Veeravatnam V.A.S. Lakshmi","doi":"10.18280/ijsse.130613","DOIUrl":"https://doi.org/10.18280/ijsse.130613","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139158963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sholpan K. Abikenova, Shynar Aitimova, G. Daumova, Andrey Koval, Inara E. Sarybayeva
{"title":"Statistical Monitoring of OSH: Analysis of Deviations and Recommendations for Optimization","authors":"Sholpan K. Abikenova, Shynar Aitimova, G. Daumova, Andrey Koval, Inara E. Sarybayeva","doi":"10.18280/ijsse.130607","DOIUrl":"https://doi.org/10.18280/ijsse.130607","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139160032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Intrusion Detection Based on Multi-Model Federated Learning for Software Defined Network","authors":"Asraa A. Abd Al-Ameer, W. Bhaya","doi":"10.18280/ijsse.130617","DOIUrl":"https://doi.org/10.18280/ijsse.130617","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"27 1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diana Rbeht, Mohammed S. El-Ali Al-Waqfi, Jawdat Al-Jarrah
{"title":"Qualitative Risk Assessment in Water Bottling Production: A Case Study of Maan Nestlé Pure Life Factory","authors":"Diana Rbeht, Mohammed S. El-Ali Al-Waqfi, Jawdat Al-Jarrah","doi":"10.18280/ijsse.130605","DOIUrl":"https://doi.org/10.18280/ijsse.130605","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139159245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fernando Morante-Carballo, Lady Bravo-Montero, Néstor Montalván-Burbano, Paúl Carrión-Mero
ABSTRACT
{"title":"Bibliometric Analysis of Earthquake Research in America: A Comparative Study Using Web of Science and Scopus Databases","authors":"Fernando Morante-Carballo, Lady Bravo-Montero, Néstor Montalván-Burbano, Paúl Carrión-Mero","doi":"10.18280/ijsse.130520","DOIUrl":"https://doi.org/10.18280/ijsse.130520","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"112 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rossi Passarella, Muhammad Dion Iqbal, Muhammad Ali Buchari, Harumi Veny
ABSTRACT
{"title":"Analysis of Commercial Airplane Accidents Worldwide Using K-Means Clustering","authors":"Rossi Passarella, Muhammad Dion Iqbal, Muhammad Ali Buchari, Harumi Veny","doi":"10.18280/ijsse.130505","DOIUrl":"https://doi.org/10.18280/ijsse.130505","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 37","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Romi Fadillah Rahmat, Aina Hubby Aziira, Sarah Purnamawati, Yunita Marito Pane, Sharfina Faza, None Al-Khowarizm, Farhad Nadi
In Indonesia, the process of identifying and categorizing cyberlaw infringements traditionally involves manual procedures administered by experts, lawyers, or law enforcement personnel. This study introduces a method to enhance the analysis and processing of case chronological data through the application of text mining. Using the Support Vector Machine for classification, alongside feature extraction both with and without Mutual Information, the study aims to automate the classification of cybercrime cases. The preprocessing phase encompasses text cleaning, case folding, stop word removal, stemming, and tokenization and weighting with TF-IDF. The model achieved an accuracy rate of 95.45% during evaluation and 91.42% when tested on 35 data points with 1500 selected features. This performance surpasses the classification accuracy obtained in previous research.
{"title":"Classifying Indonesian Cyber Crime Cases under ITE Law Using a Hybrid of Mutual Information and Support Vector Machine","authors":"Romi Fadillah Rahmat, Aina Hubby Aziira, Sarah Purnamawati, Yunita Marito Pane, Sharfina Faza, None Al-Khowarizm, Farhad Nadi","doi":"10.18280/ijsse.130507","DOIUrl":"https://doi.org/10.18280/ijsse.130507","url":null,"abstract":"In Indonesia, the process of identifying and categorizing cyberlaw infringements traditionally involves manual procedures administered by experts, lawyers, or law enforcement personnel. This study introduces a method to enhance the analysis and processing of case chronological data through the application of text mining. Using the Support Vector Machine for classification, alongside feature extraction both with and without Mutual Information, the study aims to automate the classification of cybercrime cases. The preprocessing phase encompasses text cleaning, case folding, stop word removal, stemming, and tokenization and weighting with TF-IDF. The model achieved an accuracy rate of 95.45% during evaluation and 91.42% when tested on 35 data points with 1500 selected features. This performance surpasses the classification accuracy obtained in previous research.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 32","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Mutual Authentication Method for Deep Learning Based Hybrid Cryptography to Secure Data in Cloud Computin","authors":"Anwar Ali Mohd, Sandhya Kummarikunta, Siva Kumar Thumboor Naga, Venkateswara Reddy Buthukuri, Phanikanth Chintamaneni","doi":"10.18280/ijsse.130513","DOIUrl":"https://doi.org/10.18280/ijsse.130513","url":null,"abstract":"","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"91 19","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135091896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}