243 research outputs found

    A structured approach to malware detection and analysis in digital forensics investigation

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirement for the degree of PhDWithin the World Wide Web (WWW), malware is considered one of the most serious threats to system security with complex system issues caused by malware and spam. Networks and systems can be accessed and compromised by various types of malware, such as viruses, worms, Trojans, botnet and rootkits, which compromise systems through coordinated attacks. Malware often uses anti-forensic techniques to avoid detection and investigation. Moreover, the results of investigating such attacks are often ineffective and can create barriers for obtaining clear evidence due to the lack of sufficient tools and the immaturity of forensics methodology. This research addressed various complexities faced by investigators in the detection and analysis of malware. In this thesis, the author identified the need for a new approach towards malware detection that focuses on a robust framework, and proposed a solution based on an extensive literature review and market research analysis. The literature review focussed on the different trials and techniques in malware detection to identify the parameters for developing a solution design, while market research was carried out to understand the precise nature of the current problem. The author termed the new approaches and development of the new framework the triple-tier centralised online real-time environment (tri-CORE) malware analysis (TCMA). The tiers come from three distinctive phases of detection and analysis where the entire research pattern is divided into three different domains. The tiers are the malware acquisition function, detection and analysis, and the database operational function. This framework design will contribute to the field of computer forensics by making the investigative process more effective and efficient. By integrating a hybrid method for malware detection, associated limitations with both static and dynamic methods are eliminated. This aids forensics experts with carrying out quick, investigatory processes to detect the behaviour of the malware and its related elements. The proposed framework will help to ensure system confidentiality, integrity, availability and accountability. The current research also focussed on a prototype (artefact) that was developed in favour of a different approach in digital forensics and malware detection methods. As such, a new Toolkit was designed and implemented, which is based on a simple architectural structure and built from open source software that can help investigators develop the skills to critically respond to current cyber incidents and analyses

    Displaced Population: A Case Study of the Syrian Forced Migrants in Qatar

    Get PDF
    Since the outbreak of the Syrian conflict in 2011, roughly 5.6 million Syrians have fled the country as a result of the ongoing conflict in the region. Many of them have crossed into Gulf nations such as Qatar, even though this nation was not a signatory to the 1951 United Nations Refugee Convention. This study aims to explore the efforts made by the Qatari government to improve the situation of Syrian forced migrants in Qatar as well as refugees elsewhere. Interviews were carried out with Syrians who entered Qatar since 2011, recording narratives of their experiences in the country. The findings revealed that visa status had a strong influence on whether the experiences of Syrian forced migrants were positive or negative, and suggest that the Qatari government should do more to ensure that the human rights of the Syrian forced migrants within its borders are upheld

    Data Analytics Methods in Preventing Smuggling Drugs

    Get PDF
    For the final requirements of (MS) of Data Analytics, we have to work on a capstone project as a graduate student. In the capstone project, we have to implement the data mining techniques we have learned during the program. This capstone project focuses on illicit drugs smuggling, where drugs have a massive negative effect on the countries and individuals. Data mining techniques have been applied to the drug smuggling dataset that has been captured worldwide. The data mining approach used in this capstone project is an unsupervised approach focusing on clustering. Three types of clustering models have been used: k-means, medoid means, hierarchal clustering, and the three models have similar results

    Application of Resource-based View to Project Management Research: Supporters and Opponents

    Get PDF
    AbstractThe Resource-based View (RBV) of the firm is a strategic management theory that is widely used by managers in project management. The RBV has to date been a promising theory that examines how resources can drive competitive advantage, especially project management (PM) capabilities that have been customized to a specific organizational environment and developed over time. However, Despite the advantages offered by the RBV to practitioners and scholars alike, the theory has been under attack by opponents claiming that there is an overenthusiasm for what the theory can deliver, especially concerning a lack of criteria for generalizability and definitional ailments. This position paper will give an overview of the supporters and opponents of the application of the RBV in PM practice and research. The position of the authors of this paper, which is in favour of the continued application of the theory to PM contexts, will be detailed and supported by conceptual and empirical findings from the literature. This paper will end with future research recommendations that will highlight research that can be done to curb criticisms of the theory and enhance and rejuvenate its use in practice

    Semantic Selection of Internet Sources through SWRL Enabled OWL Ontologies

    Get PDF
    This research examines the problem of Information Overload (IO) and give an overview of various attempts to resolve it. Furthermore, argue that instead of fighting IO, it is advisable to start learning how to live with it. It is unlikely that in modern information age, where users are producer and consumer of information, the amount of data and information generated would decrease. Furthermore, when managing IO, users are confined to the algorithms and policies of commercial Search Engines and Recommender Systems (RSs), which create results that also add to IO. this research calls to initiate a change in thinking: this by giving greater power to users when addressing the relevance and accuracy of internet searches, which helps in IO. However powerful search engines are, they do not process enough semantics in the moment when search queries are formulated. This research proposes a semantic selection of internet sources, through SWRL enabled OWL ontologies. the research focuses on SWT and its Stack because they (a)secure the semantic interpretation of the environments where internet searches take place and (b) guarantee reasoning that results in the selection of suitable internet sources in a particular moment of internet searches. Therefore, it is important to model the behaviour of users through OWL concepts and reason upon them in order to address IO when searching the internet. Thus, user behaviour is itemized through user preferences, perceptions and expectations from internet searches. The proposed approach in this research is a Software Engineering (SE) solution which provides computations based on the semantics of the environment stored in the ontological model

    THE INFLUENCE OF YOUTH LEADERS’ COMPETENCIES, EMOTIONAL INTELLIGENCE, AND CLIMATE FOR CREATIVITY ON THE PERFORMANCE OF THE UAE GOVERNMENTAL ORGANIZATIONS

    Get PDF
    Nowadays, leadership is an essential asset in youth society. Thus, this study aims to identify the required capabilities to determine their readiness and openness amongst other qualities to be able to identify those youths who are able to take on federal government leadership positions in the upcoming 4th Industrial Revolution which is important for the future economic success of the country. This research utilized the leadership competencies theory to locate the important competencies that are needed to create strong youth leaders. The research has suggested a model and a positivist research philosophy was used to examine the suggested model. A survey was designed to cover the different research constructs and distributed in the UAE governmental organizations at the top level of management to collect their views regarding to the suggested model. The Structural Equation Model (SEM) and SPSS Software were used to examine the reliabilities and validity of the research constructs. The findings demonstrate change competence and team competence were the strongest drivers of youth leaders’ performance. Furthermore, the findings of this study indicated that ethical competence, across cultural competence, and self-competence have a significant influence on youth leaders’ performance. Contrary to the suggestion of this study, communication competence has no influence on Youth leaders’ performance. The results also indicate that only others’ emotional appraisal has a significant influence on youth leaders\u27 performance. The research results are expected to help the UAE government to create strong youth leaders who will be able to lead the country in the near future. Also, there are a lot of benefits for youth from the development of leadership such as; youth can communicate effectively with others, be responsible and make the right decision, and understand their values profoundly and better

    Analysing the relationship between Bilateral Investment Treaties and FDI Flows and Outflows - Evidence from the UAE

    Get PDF
    This thesis examines the relationship between bilateral investment treaties (BITs) and the attractiveness for FDI into the United Arab Emirates (UAE) and FDI flows from the UAE, and the focus of the thesis rests on whether BITs play an important role in sustaining FDI, were the global interests of most countries have increased to reach a large share of FDI flows and outflow, among many countries UAE adopt policies aims to diversify the economy to create a favorable market environment. Among these policies is signing BITs, however, the BITs effectiveness has not been tested. This study aims to fill this gap uses panel data from a number of different sources including the OECD bilateral FDI data and World Bank data and uses gravity equation modelling to examine the conditions that lead to changes in FDI flows and outflow. The data provide details on inward and outward FDI for each partner country with a total of 792 observations for the time period 2001 to 2012, including the variables GDP, geographical distance, language and colonial relationships. Four gravity models are used at two points of time. The first set of results is based on the announcement date of a BIT with the UAE and the second set of results shows the impact when the BITs are in force. This research finds that the UAE’s BITs are highly significant to outward FDI only for the time the BITs are signed, and host countries have some important characteristics including the level of GDP, distance and common colony relation but, more interestingly, the relationship is not sustained over the long term. In the case when the BITs are in force, this research finds no statistically significant relationship between BITs and inflow FDI. The thesis contributes to the literature by showing that under better economic conditions, well developed government institutions and a stable political system, BITs will not only have a positive impact on FDI outflows but will also contribute towards improving the growth opportunities and welfare in the country and the ability for local companies to compete internationally

    Dual Output Regulating Rectifier for an Implantable Neural Interface

    Get PDF
    This paper presents the design of a power management circuit consisting of a dual output regulating rectifier configuration featuring pulse width modulation (PWM) and pulse frequency modulation (PFM) to control the regulated output of 1.8 V, and 3.3 V from a single input ac voltage. The PFM control feedback consists of feedback-driven regulation to adjust the driving frequency of the power transistors through the buffers in the active rectifier. The PWM mode control provides a feedback loop to accurately adjust the conduction duration. The design also includes an adiabatic charge pump (CP) to power stimulators in an implantable neural interface. The adiabatic CP consists of latch up and power saving topologies to enhance its energy efficiency. Simulation results show that the dual regulating rectifier has 94.3% voltage conversion efficiency with an ac input magnitude of 3.5 Vp. The power transfer efficiency of the regulated 3.3 V output voltage is 82.3%. The dual output regulating rectifier topology is suitable for multi-functional implantable devices. The adiabatic CP has an overall efficiency of 92.9% with an overall on-chip capacitance of 60 pF. The circuit was designed in a 180-nm CMOS technology

    Consumers Attitude towards the Use of Mobile Health Apps: An Empirical Review

    Get PDF
    This study aims to examine the consumers attitude towards new Mobile Health Application (MHA) for health care industry. This paper aims to improve understanding the reasons why patients and medical professionals would use mobile applications. A survey instrument was developed to gather data and an equal number of sample from groups were drawn who completed this study. The results indicate that there is favorable attitude towards new MHA and medical service locator, medical education, patient caring, personal care, imaging, patient monitoring were the significant features for new apps. The results suggest that new functions need to be incorporated into the development of MHA to satisfy the needs and wants of both groups. The paper concludes with a discussion of how to promote this apps with in patients and medical professionals
    • …
    corecore