80,573 research outputs found

    BCT-CS : blockchain technology applications for cyber defense and cybersecurity : a survey and solutions

    Get PDF
    Blockchain technology has now emerged as a ground-breaking technology with possible solutions to applications from securing smart cities to e-voting systems. Although it started as a digital currency or cryptocurrency, bitcoin, there is no doubt that blockchain is influencing and will influence business and society more in the near future. We present a comprehensive survey of how blockchain technology is applied to provide security over the web and to counter ongoing threats as well as increasing cybercrimes and cyber-attacks. During the review, we also investigate how blockchain can affect cyber data and information over the web. Our contributions included the following: (i) summarizing the Blockchain architecture and models for cybersecurity (ii) classifying and discussing recent and relevant works for cyber countermeasures using blockchain (iii) analyzing the main challenges and obstacles of blockchain technology in response to cyber defense and cybersecurity and (iv) recommendations for improvement and future research on the integration of blockchain with cyber defense. © 2022,International Journal of Advanced Computer Science and Applications. All Rights Reserved

    Cyber-physical Manufacturing in the Light of Professor Kanji Ueda's Legacy

    Get PDF
    Cyber-physical manufacturing, i.e., the formerly never seen integration of the physical and virtual worlds in the manufacturing domain is considered the substance of the 4th industrial revolution. Much of the changes deemed now revolutionary are originated in a long and converging progress of manufacturing science and technology, as well as of computer science, information and communication technologies. One of the pioneers and influential thinkers of production engineering who paved the way towards cyber-physical manufacturing was unquestionably Professor Kanji Ueda (1946-2015). With this paper the authors would like to pay a tribute to his achievements, by highlighting his main contributions not only to the advancement of production engineering and industrial technology but also to the sustainability of our society

    Using Machine Learning & Data Science to Fight Cyber Crime

    Get PDF
    In the modern world the technology is rising quite rapidly. In order to operate our industries, government,national defense and other vital functions, society is becoming more dependent on data and networks.Nearly every person with computer knowledge has entered into the use of this fast-growing industry. Cyber crime is a criminal act committed via internet and technology. Most cyber crime is an attack on personal, corporate, or government information. Though the attacks do not occur on a physical body, they do occur on the virtual personal or corporate body, which is the set of information attributes that define people and institutions on the Internet. Today, cyber crime has drawn a great deal of attention around the globe because of the recorded dramatic increase rate of case reported. As a matter of fact, a new form of cyber crime case is being recorded every single day. In reality, cyber crime is the most brutal computer crime in the modern world that has caused a great deal of many people to lose their most confidential information. In other words, our virtual identities are essential elements in the digital age Machine learning & Data Science is one of the defense mechanisms to protect our virtual identities. This not only helps to react to cyber crimes by enhancing the cyber protection systems but also is instrumental in formulating defense strategies proactively by predictive analysishttps://ir.library.illinoisstate.edu/ursit/1001/thumbnail.jp

    Development and Delivery of Coursework: The Legal/Regulatory/Policy Environment of Cyberforensics

    Get PDF
    This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce

    Paper Session IV: Development and Delivery of Coursework - The Legal/Regulatory/Policy Environment of Cyberforensics

    Get PDF
    This paper describes a cyber-forensics course that integrates important public policy and legal issues as well as relevant forensic techniques. Cyber-forensics refers to the amalgam of multi-disciplinary activities involved in the identification, gathering, handling, custody, use and security of electronic files and records, involving expertise from the forensic domain, and which produces evidence useful in the proof of facts for both commercial and legal activities. The legal and regulatory environment in which electronic discovery takes place is of critical importance to cyber-forensics experts because the legal process imposes both constraints and opportunities for the effective use of evidence gathered through cyber-forensic techniques. This paper discusses different pedagogies that can be used (including project teams, research and writing assignments, student presentations, case analyses, class activities and participation and examinations), evaluation methods, problem-based learning approaches and critical thinking analysis. A survey and evaluation is provided of the growing body of applicable print and online materials that can be utilized. Target populations for such a course includes students with majors, minors or supporting elective coursework in law, information sciences, information technology, computer science, computer engineering, financial fraud, security and information assurance, forensic aspects of cyber security, privacy, and electronic commerce. Keywords: Cyberforensics; Electronic Data Discovery; Electronic Records Management; Pre-Trial Discovery; Admissibility of Electronic Evidence; Information Assurance, Security and Risk Analysi
    corecore