39 research outputs found
Eurolanguages-2011: Innovations and Development
Збірник наукових студентських робіт призначено для широкого кола читачів, які цікавляться проблемами вивчення іноземних мов та перекладу в Україн
Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development
The protection and maintenance of environmental resources for future generations require responsible interaction between humans and the environment in order to avoid wasting natural resources. According to an ancient Native American proverb, “We do not inherit the Earth from our ancestors; we borrow it from our children.” This indigenous wisdom has the potential to play a significant role in defining environmental sustainability. Recent technological advances could sustain humankind and allow for comfortable living. However, not all of these advancements have the potential to protect the environment for future generations. Developing societies and maintaining the sustainability of the ecosystem require appropriate wisdom, technology, and management collaboration. This book is a collection of 19 important articles (15 research articles, 3 review papers, and 1 editorial) that were published in the Special Issue of the journal Sustainability entitled “Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development” during 2021-2022.addresses the policymakers and decision-makers who are willing to develop societies that practice environmental sustainability, by collecting the most recent contributions on the appropriate wisdom, technology, and management regarding the different aspects of a community that can retain environmental sustainability
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics
Recommended from our members
Proceedings of the West Africa Built Environment Research (WABER) Conference 2021
FOREWORD: I would like to welcome each participant to the WABER 2021 Conference. Since its inception in 2009, the WABER Conference series has done a great deal to nurture and support researchers, initially in West Africa, also, in other parts of Africa and elsewhere. I would like to thank all delegates for your participation which enables us to keep this Conference going. The WABER Conference enjoys a positive international reputation and has continued to grow from strength to strength over the past 13 years. For this, I would like to thank our team, keynote speakers and participants over the years for every contribution you have made to the success of this Conference. This year's Conference has an excellent programme, line up of speakers and authors.
I would like to thank and commend the authors of all 72 papers in this Conference proceedings. If the research paper writing process was compared to a marathon, the authors of the 72 papers in this publication would be adjudged as the ones who have endured and finished the race. We opened the call for papers for this Conference in December 2020 and over 100 abstracts were submitted by authors. However, it is one thing to propose to write a paper, and it is quite another thing to actually write the paper. Therefore, I would like to thank and congratulate all authors who succeeded in completing the process of getting published in this conference proceedings. It is befitting that we have an excellent range of interesting topics in the 72 papers to be discussed at this conference. We are honoured to welcome Professor Charles Egbu, Vice Chancellor of Leeds Trinity University, to give us a special opening address. In the three days of this conference, we will have various plenary presentations by experienced international academics and I would like to thank and welcome each of them below. Professor Albert Chan Richard Lorch Professor Taibat Lawanson Professor Dato’ Sri Ar Dr Asiah Abdul Rahim Professor George Ofori.
In addition to these speakers, we have other interesting sessions on the programme including a special session for doctoral students and supervisors several other experienced speakers addressing various topics that should be of interest to many of us.
I would like to thank all members of the organising team particularly Associate Professor Emmanuel Essah, Dr Yakubu Aminu Dodo and Dr Sam Moveh for their efforts which has helped to organise this Conference successfully. I would also like to thank all of our reviewers particularly Associate Professor Emmanuel Essah and Dr Haruna Moda for the considerable time and effort spent reviewing and checking all papers to ensure a high standard of quality.
The WABER Conference Team always plays an excellent role in the success of our events and I would like to thank and appreciate the contributions of Florence, Sam Boakye, Victor Ayitey and his team, Kwesi Kwofie and Issah Abdul Rahman to the success of this Conference.
I hope you enjoy our first hybrid conference and engage with our exciting speakers on the diverse topics that will be covered over the three days of this Conference
Shortest Route at Dynamic Location with Node Combination-Dijkstra Algorithm
Abstract— Online transportation has become a basic
requirement of the general public in support of all activities to go
to work, school or vacation to the sights. Public transportation
services compete to provide the best service so that consumers
feel comfortable using the services offered, so that all activities
are noticed, one of them is the search for the shortest route in
picking the buyer or delivering to the destination. Node
Combination method can minimize memory usage and this
methode is more optimal when compared to A* and Ant Colony
in the shortest route search like Dijkstra algorithm, but can’t
store the history node that has been passed. Therefore, using
node combination algorithm is very good in searching the
shortest distance is not the shortest route. This paper is
structured to modify the node combination algorithm to solve the
problem of finding the shortest route at the dynamic location
obtained from the transport fleet by displaying the nodes that
have the shortest distance and will be implemented in the
geographic information system in the form of map to facilitate
the use of the system.
Keywords— Shortest Path, Algorithm Dijkstra, Node
Combination, Dynamic Location (key words
AN ENHANCEMENT ON TARGETED PHISHING ATTACKS IN THE STATE OF QATAR
The latest report by Kaspersky on Spam and Phishing, listed Qatar as one of the top 10 countries by percentage of email phishing and targeted phishing attacks. Since the Qatari economy has grown exponentially and become increasingly global in nature, email phishing and targeted phishing attacks have the capacity to be devastating to the Qatari economy, yet there are no adequate measures put in place such as awareness training programmes to minimise these threats to the state of Qatar. Therefore, this research aims to explore targeted attacks in specific organisations in the state of Qatar by presenting a new technique to prevent targeted attacks. This novel enterprise-wide email phishing detection system has been used by organisations and individuals not only in the state of Qatar but also in organisations in the UK. This detection system is based on domain names by which attackers carefully register domain names which victims trust. The results show that this detection system has proven its ability to reduce email phishing attacks. Moreover, it aims to develop email phishing awareness training techniques specifically designed for the state of Qatar to complement the presented technique in order to increase email phishing awareness, focused on targeted attacks and the content, and reduce the impact of phishing email attacks. This research was carried out by developing an interactive email phishing awareness training website that has been tested by organisations in the state of Qatar. The results of this training programme proved to get effective results by training users on how to spot email phishing and targeted attacks