首页 > 最新文献

Journal of Applied Security Research最新文献

英文 中文
Searchable Encryption Taxonomy: Survey 可搜索的加密分类:调查
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-08-11 DOI: 10.1080/19361610.2022.2103364
M. H. Noorallahzadeh, R. Alimoradi, A. Gholami
Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.
云服务提供商允许企业大幅降低成本。然而,最好知道大多数外包数据都是敏感数据。因此,为了保护该数据集免受云服务器上的潜在攻击,强烈建议您在外包之前对其进行加密。但默认情况下,云服务器无法搜索加密数据。许多研究人员已经发表了工作,提出了有效和安全的方案来克服这个问题。到目前为止,已经发布了许多可搜索的加密方案。可搜索加密有两个主要分支。对称可搜索加密(SSE) 2非对称可搜索加密(ASE)本文以一种新的方式对SE方案进行了研究。我们根据搜索类型、索引类型、结果类型、安全模型、实现类型、用户多样性、加密原语和使用的技术提供了可搜索加密方案的完整分类。对于每种分类,比较了可用的方案。我们提供了一个可用的可搜索的加密解决方案概述。
{"title":"Searchable Encryption Taxonomy: Survey","authors":"M. H. Noorallahzadeh, R. Alimoradi, A. Gholami","doi":"10.1080/19361610.2022.2103364","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103364","url":null,"abstract":"Abstract Cloud service providers allow businesses to drastically reduce their costs. However, it is good to know that most outsourced data is sensitive data. Therefore, to protect this data set from potential attacks on cloud servers, it is strongly recommended that you encrypt it before outsourcing. But cloud servers cannot search encrypted data by default. Many researchers have published work proposing efficient and secure schemes to overcome this problem. So far, many searchable encryption schemes have been published. Searchable Encryption has two main branches. 1-Symmetric searchable encryption (SSE) 2-Asymmetric searchable encryption (ASE). In this article, SE schemes are investigated in a new way. We provide a complete classification of searchable encryption schemes in terms of search type, index type, results type, security models, type of implementation, Multiplicity of users, Cryptographic Primitives, and Technique used. For each classification, the available schemes are compared. We provide an available searchable encryption solutions overview.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"880 - 924"},"PeriodicalIF":1.3,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45885567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts 反恶意软件评估和网络防御影响的巴西方法
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-08-02 DOI: 10.1080/19361610.2022.2104104
Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian
Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.
摘要网络风险深刻影响着所有人。在网络威胁的背景下,恶意软件正在各个生产部门流行。如今,反恶意软件对于对抗网络威胁至关重要;然而,它们的效率经常受到质疑,因为世界上不同地区的恶意软件不同。选择一个高效的反恶意软件解决方案对于保护来自不同机构的信息至关重要。该方法证实了评估不同已知方法的现实,显示了不同测试人员效率的另一种情况。该方法可以可视化一个有趣的全景,因为在巴西互联网上收集的恶意软件中有50%是由巴西商用的反恶意软件检测到的。
{"title":"Brazil Method of Anti-Malware Evaluation and Cyber Defense Impacts","authors":"Rodrigo Ruiz, Rogério Winter, Ferrucio de Franco Rosa, Pancham Shukla, H. Kazemian","doi":"10.1080/19361610.2022.2104104","DOIUrl":"https://doi.org/10.1080/19361610.2022.2104104","url":null,"abstract":"Abstract Cyber risk profoundly affects all. In the context of cyber threats, malware is trending in various productive sectors. Nowadays, anti-malware is essential to combat cyber threats; however, their efficiency is often questioned, because malware is different for different regions in the world. Choosing an efficient anti-malware software solution is crucial to protect information from different institutions. The method confirmed the reality of evaluating the different known methodologies, showing another scenario of the efficiency of the different testers. The method allowed visualizing an interesting panorama because 50% of malware collected on the Brazilian Internet was detected by anti-malware commercially available in Brazil.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"925 - 941"},"PeriodicalIF":1.3,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41806767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board 为津巴布韦寻找最佳的警察监督机制:建立独立的警察投诉委员会的必要性
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-08-01 DOI: 10.1080/19361610.2022.2105283
Ishmael Mugari, A. Olutola
Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.
摘要在许多场合,津巴布韦警方不得不应对警察滥用职权的指控,社会各界呼吁建立健全机制,追究警察的责任。这项研究收集了有意抽样的警察监督机构代表的数据,以了解他们对津巴布韦最佳警察监督机制的看法。调查结果显示,由非警务人员组成的独立委员会是处理警察不当行为的最有效机制。调查结果还显示,独立委员会应由退休司法人员、退休高级警官和公民社会代表组成。
{"title":"In Search for the Best Police Oversight Mechanism for Zimbabwe: The Imperative for an Independent Police Complaints Board","authors":"Ishmael Mugari, A. Olutola","doi":"10.1080/19361610.2022.2105283","DOIUrl":"https://doi.org/10.1080/19361610.2022.2105283","url":null,"abstract":"Abstract On numerous occasions, the Zimbabwean police have had to contend with allegations of police abuse of power, with various sectors of the society calling for sound mechanisms for holding the police to account. This study gathered data from purposefully sampled representatives of police oversight institutions to find out their perspectives on the best police oversight mechanism for Zimbabwe. Findings revealed that an independent board consisting of non-police officers is the most effective mechanism for handling police misconduct. Findings also revealed that the independent board should be manned by retired judicial officers, retired senior police officers and representatives from the civic society.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"961 - 978"},"PeriodicalIF":1.3,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43555720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm 一种实时硬件入侵检测系统及分类特征算法
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-28 DOI: 10.1080/19361610.2022.2103363
T. Sobh
Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.
摘要如今,每个人都需要保护自己的活动。现有级别的网络罪犯需要检测恶意活动的技术。本文提出了一种在FPGA上实现的实时硬件入侵检测系统,以及一种通过网络接口卡(NIC)对网络流量特征进行分类的算法。它最大限度地减少了从存储在连接队列中的连接记录中提取统计特征到内存引用的搜索时间。因此,它可以检测大多数内部和外部网络攻击。使用决策树分类器作为推理引擎,给出了99.93%的高检测率。
{"title":"A Real-Time Hardware Intrusion Detection System and a Classifying Features Algorithm","authors":"T. Sobh","doi":"10.1080/19361610.2022.2103363","DOIUrl":"https://doi.org/10.1080/19361610.2022.2103363","url":null,"abstract":"Abstract Nowadays, everybody needs to secure his/her activities. Existing levels of cyber-criminals need technology for detecting malicious activity. This work proposes a real-time Hardware IDS implemented on FPGA and an algorithm for classifying features from network traffic through the network interface card (NIC). It minimizes search time for extracting statistical features from connection records stored in connection queues to memory references. Therefore, it can detect most internal and external network attacks. A decision tree classifier is used as an inference engine and gives a high detection rate of 99.93%.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"845 - 879"},"PeriodicalIF":1.3,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47512014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved KNN Classifier for 3D Face Recognition Based on SURF Descriptors 一种改进的基于SURF描述符的三维人脸识别KNN分类器
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-27 DOI: 10.1080/19361610.2022.2099688
A. Boumedine, Samia Bentaieb, A. Ouamri
Abstract In this article, we propose a three-dimensional (3D) face recognition approach for depth data captured by Kinect based on a combination of speeded up robust features (SURF) and k-nearest neighbor (KNN) algorithms. First, the shape index maps of the preprocessed 3D faces of the training gallery are computed, then the SURF feature vectors are extracted and used to form the dictionary. In the recognition process, we propose an improved KNN classifier to find the best match. The evaluation was performed using CurtinFaces and KinectFaceDB data sets, achieving rank-1 recognition rates of 96.78% and 94.23%, respectively, when using two samples per person for training.
在本文中,我们提出了一种基于加速鲁棒特征(SURF)和k-最近邻(KNN)算法的Kinect深度数据三维人脸识别方法。首先计算训练库中经过预处理的三维人脸的形状索引图,然后提取SURF特征向量并用于字典的构建。在识别过程中,我们提出了一种改进的KNN分类器来寻找最佳匹配。使用CurtinFaces和KinectFaceDB数据集进行评估,当每人使用两个样本进行训练时,rank-1识别率分别为96.78%和94.23%。
{"title":"An Improved KNN Classifier for 3D Face Recognition Based on SURF Descriptors","authors":"A. Boumedine, Samia Bentaieb, A. Ouamri","doi":"10.1080/19361610.2022.2099688","DOIUrl":"https://doi.org/10.1080/19361610.2022.2099688","url":null,"abstract":"Abstract In this article, we propose a three-dimensional (3D) face recognition approach for depth data captured by Kinect based on a combination of speeded up robust features (SURF) and k-nearest neighbor (KNN) algorithms. First, the shape index maps of the preprocessed 3D faces of the training gallery are computed, then the SURF feature vectors are extracted and used to form the dictionary. In the recognition process, we propose an improved KNN classifier to find the best match. The evaluation was performed using CurtinFaces and KinectFaceDB data sets, achieving rank-1 recognition rates of 96.78% and 94.23%, respectively, when using two samples per person for training.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"808 - 826"},"PeriodicalIF":1.3,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42929214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Criminological and Victimological Support of World and National Security during Quarantine Measures Related to the Spread of Acute Respiratory Disease COVID-19 Caused by Coronavirus Sars-Cov-2 与Sars-Cov-2引起的急性呼吸道疾病COVID-19传播有关的隔离措施期间对世界和国家安全的犯罪学和受害者学支持
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-26 DOI: 10.1080/19361610.2022.2104106
R. Veresha, Alexander Dzhuzha, D. Tychyna, Anastasiya Dzhuzha
Abstract The study examines current challenges faced by Ukrainian legal system in matters of criminological and victimological security of society during quarantine measures related to COVID-19. Using methods of system analysis and scientific design, current legal framework of Ukraine in regulation of public relations was analyzed. The study draws attention to the fact that, Ukraine has improved its legislation on the control of medical purchases and the provision of necessary materials to medical institutions. At the same time, the authorities will have to further improve the framework for patient monitoring and the epidemiological surveillance system in the medical sector.
摘要本研究探讨了在与新冠肺炎有关的隔离措施期间,乌克兰法律系统在社会的犯罪学和受害者安全问题上面临的当前挑战。运用系统分析和科学设计的方法,对乌克兰现行公共关系监管法律框架进行了分析。该研究报告提请注意这样一个事实,即乌克兰已经改进了关于控制医疗采购和向医疗机构提供必要材料的立法。与此同时,当局必须进一步改进医疗部门的患者监测框架和流行病学监测系统。
{"title":"Criminological and Victimological Support of World and National Security during Quarantine Measures Related to the Spread of Acute Respiratory Disease COVID-19 Caused by Coronavirus Sars-Cov-2","authors":"R. Veresha, Alexander Dzhuzha, D. Tychyna, Anastasiya Dzhuzha","doi":"10.1080/19361610.2022.2104106","DOIUrl":"https://doi.org/10.1080/19361610.2022.2104106","url":null,"abstract":"Abstract The study examines current challenges faced by Ukrainian legal system in matters of criminological and victimological security of society during quarantine measures related to COVID-19. Using methods of system analysis and scientific design, current legal framework of Ukraine in regulation of public relations was analyzed. The study draws attention to the fact that, Ukraine has improved its legislation on the control of medical purchases and the provision of necessary materials to medical institutions. At the same time, the authorities will have to further improve the framework for patient monitoring and the epidemiological surveillance system in the medical sector.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"942 - 960"},"PeriodicalIF":1.3,"publicationDate":"2022-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44698487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BCPIS: Blockchain-based Counterfeit Product Identification System BCPIS:基于区块链的假冒产品识别系统
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-13 DOI: 10.1080/19361610.2022.2086784
M. Mhatre, Harshvivek Kashid, Tanisha Jain, P. Chavan
Abstract A key aspect of sustainable business development involves protecting a company’s products from counterfeiting. Since this can impact brand’s image and often, product counterfeits are of a minor quality which can be dangerous and even pose health hazards. Counterfeiters gain profits by manufacturing products using lesser quality materials and production methods. Many counterfeit products in the market are difficult to identify for a normal customer and require to be examined by a trained professional which is time-consuming and costly. In this paper, we propose a method for identifying counterfeit by a simple scan of the quick response code on the product. Since these codes are unique and are implemented by unique algorithms, it is almost impossible to forge them. Also, implementing an encrypted peer-to-peer system for the database makes it impossible for attackers to tamper with the database. The proposed method collectively not only helps laypersons to identify the authenticity of products but also an ownership tracking system where products are linked to the owners’ account which will allow them to produce proof of purchase and authenticity when reselling products and when claiming the warranty of the product. This will help in reducing manufacturing and materials costs used from traditional methods against counterfeiting such as Radio-Frequency Identification and the Hologram technique.
摘要可持续商业发展的一个关键方面是保护公司的产品不受假冒。由于这会影响品牌形象,而且通常情况下,假冒产品的质量很低,可能很危险,甚至会对健康造成危害。造假者通过使用质量较差的材料和生产方法制造产品来获取利润。市场上的许多假冒产品很难为普通客户识别,需要由训练有素的专业人员进行检查,这既耗时又昂贵。在本文中,我们提出了一种通过简单扫描产品上的快速响应码来识别假冒产品的方法。由于这些代码是唯一的,并且是由唯一的算法实现的,因此几乎不可能伪造它们。此外,为数据库实现加密的对等系统使攻击者不可能篡改数据库。所提出的方法不仅有助于外行识别产品的真实性,而且还有一个所有权跟踪系统,在该系统中,产品与所有者的账户相连,这将使他们能够在转售产品和申请产品保修时出示购买和真实性证明。这将有助于降低传统防伪方法(如射频识别和全息技术)的制造和材料成本。
{"title":"BCPIS: Blockchain-based Counterfeit Product Identification System","authors":"M. Mhatre, Harshvivek Kashid, Tanisha Jain, P. Chavan","doi":"10.1080/19361610.2022.2086784","DOIUrl":"https://doi.org/10.1080/19361610.2022.2086784","url":null,"abstract":"Abstract A key aspect of sustainable business development involves protecting a company’s products from counterfeiting. Since this can impact brand’s image and often, product counterfeits are of a minor quality which can be dangerous and even pose health hazards. Counterfeiters gain profits by manufacturing products using lesser quality materials and production methods. Many counterfeit products in the market are difficult to identify for a normal customer and require to be examined by a trained professional which is time-consuming and costly. In this paper, we propose a method for identifying counterfeit by a simple scan of the quick response code on the product. Since these codes are unique and are implemented by unique algorithms, it is almost impossible to forge them. Also, implementing an encrypted peer-to-peer system for the database makes it impossible for attackers to tamper with the database. The proposed method collectively not only helps laypersons to identify the authenticity of products but also an ownership tracking system where products are linked to the owners’ account which will allow them to produce proof of purchase and authenticity when reselling products and when claiming the warranty of the product. This will help in reducing manufacturing and materials costs used from traditional methods against counterfeiting such as Radio-Frequency Identification and the Hologram technique.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"740 - 765"},"PeriodicalIF":1.3,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49290719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications 增强Burp套件的机器学习扩展,用于Web应用程序的漏洞评估
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-10 DOI: 10.1080/19361610.2022.2096387
Rrezearta Thaqi, Kamer Vishi, Blerim Rexha
Abstract Today’s web represents the most extensive engineered system ever created by humankind. Web security is critical to web application providers and end-users. Burp Suite is established as a state-of-the-art and fully featured set of tools for web vulnerability scanners. This paper presents a novel approach using state of the art Machine Learning algorithms applied to the Burp Suite extension. These algorithms were used to scan for: SQL injection, Cross-Site Request Forgery, and XML External Entity vulnerabilities in university web applications. The results show that the best algorithm is Long Short-Term Memory and that the targeted website is safe to use.
摘要今天的网络代表了人类有史以来最广泛的工程系统。网络安全对网络应用程序提供商和最终用户至关重要。Burp Suite是一套最先进、功能齐全的网络漏洞扫描工具。本文提出了一种将最先进的机器学习算法应用于Burp Suite扩展的新方法。这些算法用于扫描大学网络应用程序中的SQL注入、跨站点请求伪造和XML外部实体漏洞。结果表明,最佳算法是长短期记忆,目标网站使用安全。
{"title":"Enhancing Burp Suite with Machine Learning Extension for Vulnerability Assessment of Web Applications","authors":"Rrezearta Thaqi, Kamer Vishi, Blerim Rexha","doi":"10.1080/19361610.2022.2096387","DOIUrl":"https://doi.org/10.1080/19361610.2022.2096387","url":null,"abstract":"Abstract Today’s web represents the most extensive engineered system ever created by humankind. Web security is critical to web application providers and end-users. Burp Suite is established as a state-of-the-art and fully featured set of tools for web vulnerability scanners. This paper presents a novel approach using state of the art Machine Learning algorithms applied to the Burp Suite extension. These algorithms were used to scan for: SQL injection, Cross-Site Request Forgery, and XML External Entity vulnerabilities in university web applications. The results show that the best algorithm is Long Short-Term Memory and that the targeted website is safe to use.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"789 - 807"},"PeriodicalIF":1.3,"publicationDate":"2022-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42328192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
One-Chance Transit Crime and Commuters’ Victimization Experiences in Ibadan City, Nigeria 尼日利亚伊巴丹市一次性交通犯罪与通勤者受害经历
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-07-07 DOI: 10.1080/19361610.2022.2094209
Olusegun I. Olaniyan, U. Ojedokun, A. Aderinto
Abstract One-chance transit crime is a prevalent yet under-researched form of transit crime in Nigeria. Thus, this study investigated the crime and the victimization experiences of commuters in Ibadan city. Routine activity theory was employed as theoretical framework. Data were generated from victims of the crime, police personnel and motor-park officials through in-depth interviews and focus group discussion methods. Findings revealed that one-chance transit crime is commonly perpetrated by criminals making use of taxis for commercial transportation. Money and mobile phones of commuters were the major targets of this category of criminals. One-chance transit criminals are luring their victims through different strategies.
摘要一次性过境犯罪是尼日利亚一种普遍但研究不足的过境犯罪形式。因此,本研究调查了伊巴丹市通勤者的犯罪和受害经历。以日常活动理论为理论框架。通过深入访谈和焦点小组讨论的方法,从犯罪受害者、警察和停车场官员那里获得了数据。调查结果显示,利用出租车进行商业运输的犯罪分子通常会犯下一次性过境犯罪。通勤者的金钱和手机是这类罪犯的主要目标。过境罪犯通过不同的策略引诱受害者的机会只有一次。
{"title":"One-Chance Transit Crime and Commuters’ Victimization Experiences in Ibadan City, Nigeria","authors":"Olusegun I. Olaniyan, U. Ojedokun, A. Aderinto","doi":"10.1080/19361610.2022.2094209","DOIUrl":"https://doi.org/10.1080/19361610.2022.2094209","url":null,"abstract":"Abstract One-chance transit crime is a prevalent yet under-researched form of transit crime in Nigeria. Thus, this study investigated the crime and the victimization experiences of commuters in Ibadan city. Routine activity theory was employed as theoretical framework. Data were generated from victims of the crime, police personnel and motor-park officials through in-depth interviews and focus group discussion methods. Findings revealed that one-chance transit crime is commonly perpetrated by criminals making use of taxis for commercial transportation. Money and mobile phones of commuters were the major targets of this category of criminals. One-chance transit criminals are luring their victims through different strategies.","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"18 1","pages":"774 - 788"},"PeriodicalIF":1.3,"publicationDate":"2022-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44865231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Where One Door Shuts, Another Opens: Honesty Is the Best Virtue 一扇门关上,另一扇门就会打开:诚实是最好的美德
IF 1.3 Q3 CRIMINOLOGY & PENOLOGY Pub Date : 2022-06-21 DOI: 10.1080/19361610.2022.2084497
Hyeyoung Lim
{"title":"Where One Door Shuts, Another Opens: Honesty Is the Best Virtue","authors":"Hyeyoung Lim","doi":"10.1080/19361610.2022.2084497","DOIUrl":"https://doi.org/10.1080/19361610.2022.2084497","url":null,"abstract":"","PeriodicalId":44585,"journal":{"name":"Journal of Applied Security Research","volume":"17 1","pages":"275 - 281"},"PeriodicalIF":1.3,"publicationDate":"2022-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43374798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Applied Security Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1