Social engineering attacks are increasing over the years along with the growth in Internet users. Our study aims to find ways to improve users’ protection against these attacks. Finding a suitable way to enhance users’ detection will have the impact of reducing the number of victims. Our study uses quantitative methods including experiment (role play) and a questionnaire to collect data. The findings suggest that raising users’ intention to validate the authenticity of received messages will increase their ability to make a robust decision about deceptive messages. The detection rate significantly increased when users have been alerted about social engineering attacks.
{"title":"The power of intention in detecting social engineering attacks","authors":"I. Alseadoon","doi":"10.59035/gevc3785","DOIUrl":"https://doi.org/10.59035/gevc3785","url":null,"abstract":"Social engineering attacks are increasing over the years along with the growth in Internet users. Our study aims to find ways to improve users’ protection against these attacks. Finding a suitable way to enhance users’ detection will have the impact of reducing the number of victims. Our study uses quantitative methods including experiment (role play) and a questionnaire to collect data. The findings suggest that raising users’ intention to validate the authenticity of received messages will increase their ability to make a robust decision about deceptive messages. The detection rate significantly increased when users have been alerted about social engineering attacks.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"11 2 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77586828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E-business and its basic component e-commerce are components of the modern digital society. The application of contemporary information and communication technologies allows their establishment in social and economic life. The article presents an overview of the main features, models and approaches in building e-business and e-commerce systems. In addition, specific problems in the processing of personal data in the network environment are structured and basic requirements that must be respected in their e-business and e-commerce communications are summarized.
{"title":"Features of e-business and e-commerce with a reflection on the privacy in the digital age","authors":"I. Noninska, R. Romansky","doi":"10.59035/voty8866","DOIUrl":"https://doi.org/10.59035/voty8866","url":null,"abstract":"E-business and its basic component e-commerce are components of the modern digital society. The application of contemporary information and communication technologies allows their establishment in social and economic life. The article presents an overview of the main features, models and approaches in building e-business and e-commerce systems. In addition, specific problems in the processing of personal data in the network environment are structured and basic requirements that must be respected in their e-business and e-commerce communications are summarized.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"19 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75278628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper presents an approach to a design of formal and informal education services for the system architecture developed within the European Union Erasmus+ eMediator project. An ‘Education as a services’ approach requires a specific design of elements that rely on four components: organization, competence, pedagogy, and technology. Artificial intelligence will serve as a tool that enables performance of all functions from each component. This study concentrates on a specific design of educational services that would correspond to the four components. It relies on use case method that allows for identification, clarification, and organization of elements crucial for the system requirements. In the future, the designs of educational services can be used in other systems that are developed for educational purposes.
{"title":"An approach to the design of formal and informal education services for the system architecture: The lens of organization, competence, pedagogy, and technology","authors":"M. Gawlik-Kobylińska","doi":"10.59035/eyeh2143","DOIUrl":"https://doi.org/10.59035/eyeh2143","url":null,"abstract":"The paper presents an approach to a design of formal and informal education services for the system architecture developed within the European Union Erasmus+ eMediator project. An ‘Education as a services’ approach requires a specific design of elements that rely on four components: organization, competence, pedagogy, and technology. Artificial intelligence will serve as a tool that enables performance of all functions from each component. This study concentrates on a specific design of educational services that would correspond to the four components. It relies on use case method that allows for identification, clarification, and organization of elements crucial for the system requirements. In the future, the designs of educational services can be used in other systems that are developed for educational purposes.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"21 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88447298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Kravets, V. Bolnokin, P. Rahman, I. Atlasov, I. Aksenov, Yu. R. Redkin, A. Zaslavskiy
The article extends the authors' previous research to the case of discrete response functions. A process consisting of sequential operations is considered. For each operation, you can determine the currently available probability of its error-free (high-quality) execution. By the qualitative performance of the operation, we will understand the achievement of a given level of quality in quantitative proportion to the overall level. The purpose of the article is to build a quality management strategy in which a set of probabilities of quality levels not less than a certain threshold value is achieved, with minimal costs for carrying out appropriate measures. The corresponding optimization problem is presented and a heuristic multistep algorithm for its solution is given.
{"title":"Quality assessment in a multi-level control system with discrete response functions","authors":"O. Kravets, V. Bolnokin, P. Rahman, I. Atlasov, I. Aksenov, Yu. R. Redkin, A. Zaslavskiy","doi":"10.59035/acwn8481","DOIUrl":"https://doi.org/10.59035/acwn8481","url":null,"abstract":"The article extends the authors' previous research to the case of discrete response functions. A process consisting of sequential operations is considered. For each operation, you can determine the currently available probability of its error-free (high-quality) execution. By the qualitative performance of the operation, we will understand the achievement of a given level of quality in quantitative proportion to the overall level. The purpose of the article is to build a quality management strategy in which a set of probabilities of quality levels not less than a certain threshold value is achieved, with minimal costs for carrying out appropriate measures. The corresponding optimization problem is presented and a heuristic multistep algorithm for its solution is given.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"105 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74268862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays smart Internet of Things (IoT) devices are used briskly, and these devices communicate with each other via wireless medium. However, this increase in IoT devices has resulted in a rise of security issues associated with the IoT system. Therefore, an intrusion detection and prevention system (IDPS) is used to locate and report any malicious activity. The IDPS's feature selection (FS) task is necessary to improve the data quality and decrease the data used for classifying intrusive traffic. Therefore, this paper proposes a novel FS method that hybridizes improved salp swarm algorithm and harris hawk optimization algorithm. The XGBoost classifier is used for classifying reduced network traffic. Proposed system demonstrates high accuracy and low computation time, surpassing other related approaches used for the IDPS feature selection task.
{"title":"Feature selection using bio-inspired optimization for IoT intrusion detection and prevention system","authors":"Richa Singh, R. Ujjwal","doi":"10.59035/oexi6498","DOIUrl":"https://doi.org/10.59035/oexi6498","url":null,"abstract":"Nowadays smart Internet of Things (IoT) devices are used briskly, and these devices communicate with each other via wireless medium. However, this increase in IoT devices has resulted in a rise of security issues associated with the IoT system. Therefore, an intrusion detection and prevention system (IDPS) is used to locate and report any malicious activity. The IDPS's feature selection (FS) task is necessary to improve the data quality and decrease the data used for classifying intrusive traffic. Therefore, this paper proposes a novel FS method that hybridizes improved salp swarm algorithm and harris hawk optimization algorithm. The XGBoost classifier is used for classifying reduced network traffic. Proposed system demonstrates high accuracy and low computation time, surpassing other related approaches used for the IDPS feature selection task.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"41 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80663554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The LaTeX programming language considered in this article is used to represent mathematical and other texts in scientific research. Many LaTeX packages provide advanced code-formatting features. Expanding the LaTeX programming language with macros automates the performance of a large number of tasks. In this research, the author programs in the LaTeX system when creating new macros. New macros created by the author improve adding references to everything that can be numbered and improve adding different types of footnotes in texts. Source codes of these new macros are given in this article. These macros can be embodied in a LaTeX style file, and they expand the capabilities of LaTeX.
{"title":"Improvement of references and footnotes in mathematical and other texts by creating macros in the LaTeX programming language","authors":"Halina Hubal","doi":"10.59035/fbcy3490","DOIUrl":"https://doi.org/10.59035/fbcy3490","url":null,"abstract":"The LaTeX programming language considered in this article is used to represent mathematical and other texts in scientific research. Many LaTeX packages provide advanced code-formatting features. Expanding the LaTeX programming language with macros automates the performance of a large number of tasks. In this research, the author programs in the LaTeX system when creating new macros. New macros created by the author improve adding references to everything that can be numbered and improve adding different types of footnotes in texts. Source codes of these new macros are given in this article. These macros can be embodied in a LaTeX style file, and they expand the capabilities of LaTeX.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"57 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86876558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Efficient energy management is greatly facilitated by accurately predicting energy consumption in a smart home, benefiting both consumers and utilities alike. The conventional forecasting techniques rely on pre-trained statistical models built upon extensive historical data, which may experience performance degradation due to the dynamic nature of power load demands. To address this limitation, this study proposes a novel approach employing Window-based Support Vector Regression (WSVR) to accurately estimate energy requirements from a smart grid within a smart home. The dataset utilized for this research is sourced from Pecan Street in Texas, USA. To assess the efficacy of the proposed model, it is compared to several other time series data prediction models, including ARIMA, Holt Winter's, Linear Regression, Support Vector Machine, and Support Vector Regression. The performance of each model is evaluated, and the results are thoroughly examined and discussed.
{"title":"Enhancing energy efficiency in a smart home through window-based support vector regression for energy consumption prediction","authors":"B. Zoraida, J. Jasmine, Christina Magdalene","doi":"10.59035/enqo9045","DOIUrl":"https://doi.org/10.59035/enqo9045","url":null,"abstract":"Efficient energy management is greatly facilitated by accurately predicting energy consumption in a smart home, benefiting both consumers and utilities alike. The conventional forecasting techniques rely on pre-trained statistical models built upon extensive historical data, which may experience performance degradation due to the dynamic nature of power load demands. To address this limitation, this study proposes a novel approach employing Window-based Support Vector Regression (WSVR) to accurately estimate energy requirements from a smart grid within a smart home. The dataset utilized for this research is sourced from Pecan Street in Texas, USA. To assess the efficacy of the proposed model, it is compared to several other time series data prediction models, including ARIMA, Holt Winter's, Linear Regression, Support Vector Machine, and Support Vector Regression. The performance of each model is evaluated, and the results are thoroughly examined and discussed.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"30 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85858415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modernization and liberalization of power system in North Macedonia offers an opportunity to supervise and regulate the power consumption and power grid. This paper proposes models for short-term load forecasting using artificial neural network in order to balance the demand and load requirements and to determine electricity price. Neural network approach has the advantage of learning directly from the historical data. This method uses multiple data points. Results from the research show that the quality of the short-term prediction depends on the size of the data set and the data transformation.
{"title":"Short-Term Load Forecasting using Artificial Neural Networks techniques: A case study for Republic of North Macedonia","authors":"A. Kotevska, N. Rogleva","doi":"10.59035/mysq1937","DOIUrl":"https://doi.org/10.59035/mysq1937","url":null,"abstract":"Modernization and liberalization of power system in North Macedonia offers an opportunity to supervise and regulate the power consumption and power grid. This paper proposes models for short-term load forecasting using artificial neural network in order to balance the demand and load requirements and to determine electricity price. Neural network approach has the advantage of learning directly from the historical data. This method uses multiple data points. Results from the research show that the quality of the short-term prediction depends on the size of the data set and the data transformation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"34 13 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77237440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The aim of this experimental research is to present the advantages of advanced methods for digital transformation of objects in order to create accurate engineering models of aerospace objects and radio engineering devices. One of the scientifically applied contributions is expressed in the proposed algorithm for engineering design of a pyramidal horn antenna based on simulation data, realized by 3D modelling techniques for digitalization. The generated results illustrate the correct selection of software products due to their compatibility and capabilities.
{"title":"Applications of digital transformations and simulation modelling in aerospace engineering and security","authors":"Yoana A. Ivanova","doi":"10.59035/ygps9527","DOIUrl":"https://doi.org/10.59035/ygps9527","url":null,"abstract":"The aim of this experimental research is to present the advantages of advanced methods for digital transformation of objects in order to create accurate engineering models of aerospace objects and radio engineering devices. One of the scientifically applied contributions is expressed in the proposed algorithm for engineering design of a pyramidal horn antenna based on simulation data, realized by 3D modelling techniques for digitalization. The generated results illustrate the correct selection of software products due to their compatibility and capabilities.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"162 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79989545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Software Defined Network (SDN) is an emerging concept in network engineering that entails the decoupling of the control plane and data plane. The data plane is executed on discrete nodes, while a centralised control plane is accountable for overseeing network-wide functionalities. In conventional networks, the integrated planes are incorporated into the network suite, and the transmission is determined by the route. In this work, the traditional way of routing using a communication plane is compared with routing using an SDN controller. The present study employs the NS2 simulator to evaluate the quality of service performance under high background traffic conditions. In the event of network congestion, it is imperative to utilize the available bandwidth to its fullest extent in order to increase the rate of bit transmission per second. The results of the traditional network and SDN network based on various parameters like Ambiguous collision, Delay, Jitter, Availability and Latency are compared in this paper. The results show that the SDN network's performance is better with concerning time.
{"title":"Comparison of software defined networking with traditional networking using NS2 simulator","authors":"B. Zoraida, G. Indumathi","doi":"10.59035/tbww1651","DOIUrl":"https://doi.org/10.59035/tbww1651","url":null,"abstract":"The Software Defined Network (SDN) is an emerging concept in network engineering that entails the decoupling of the control plane and data plane. The data plane is executed on discrete nodes, while a centralised control plane is accountable for overseeing network-wide functionalities. In conventional networks, the integrated planes are incorporated into the network suite, and the transmission is determined by the route. In this work, the traditional way of routing using a communication plane is compared with routing using an SDN controller. The present study employs the NS2 simulator to evaluate the quality of service performance under high background traffic conditions. In the event of network congestion, it is imperative to utilize the available bandwidth to its fullest extent in order to increase the rate of bit transmission per second. The results of the traditional network and SDN network based on various parameters like Ambiguous collision, Delay, Jitter, Availability and Latency are compared in this paper. The results show that the SDN network's performance is better with concerning time.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":"161 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78943540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}