8 research outputs found

    Survey of DoS/DDoS attacks in IoT

    Get PDF
    The term internet of things (IoT) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices. IoT devices work to do their desired goals, which is to develop a person's living with his/her minimal involvement. At the same time, IoT devices have many weaknesses, which attackers exploit to affect these devices' security. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are considered the most common attacks that strike IoT security. The main aim of these attacks is to make victim systems down and inaccessible for legitimate users by malicious malware. This paper's objective is to discuss and review security issues related to DoS/DDoS attacks and their countermeasures i.e. prevention based on IoT devices' layers structure

    Malware detection issues, future trends and challenges: a survey

    Get PDF
    This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current trends and technologies in malware detection and the limitations of existing detection methods such as signature-based detection and heuristic analysis. The emergence of new types of malware, such as file-less malware, is also discussed, along with the need for real-time detection and response. The research methodology used in this paper is presented, which includes a literature review of recent papers on the topic, keyword searches, and analysis and representation methods used in each study. In this paper, the authors aim to address the key issues and challenges in detecting malware today, the current trends and technologies in malware detection, and the limitations of existing methods. They also explore emerging threats and trends in malware attacks and highlight future directions for research and development in the field. To achieve this, the authors use a research methodology that involves a literature review of recent papers related to the topic. They focus on detecting and analyzing methods, as well as representation and extraction methods used in each study. Finally, they classify the literature re-view, and through reading and criticism, highlight future trends and problems in the field of malware detection

    Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning – Case Study_2

    Get PDF
    In Printed Circuit Board (PCB) drilling machines, the location of the drill holes are fed into the machine and the PCB will be drilled at the corresponding coordinates. Some machines do not choose the optimal route when completing their tasks. Hence, this paper proposes an approach, which is based on the Algorithm Shortest Path Search Algorithm (SPSA), for finding the optimal route in PCB holes drilling process. In SPSA, when the robotic arm at the initial position, the algorithm calculates the nearest point to the initial position from all points that the wires starts or ends with. If the nearest point is a start-of-wire point, it will use SPS algorithm 1. If the nearest point is an end-of-wire point, it will use SPS algorithm 2. This process is repeated until drilling all the lines. Then, the robotic arm will drill all the holes according to the proposed Simulated Annealing Algorithm (AS) in order to determine the optimal machining parameters for milling operations. The results of the different optimization algorithms Genetic Algorithm (GA) and AS are compared and conclusions are presented. . The proposed Computer Numerical Control (CNC) machine consists of driver, drill, three stepper motors, cables and microcontroller PIC16f877A to control the movement of the machine. The SPSA algorithm optimizes the use of the motors and other mechanical paths involved in the process while reducing total time taken to traverse all the drill holes. This paper also explains the detailed problem of interest and the mathematical formulation of the problem is defined. Experimental result indicates that the proposed SPSA-based approach is capable to efficiently find the optimal route for PCB holes drilling process

    Enhancing Software Comments Readability Using Flesch Reading Ease Score

    No full text
    Comments are used to explain the meaning of code and ease communications between programmers themselves, quality assurance auditors, and code reviewers. A tool has been developed to help programmers write readable comments and measure their readability level. It is used to enhance software readability by providing alternatives to both keywords and comment statements from a local database and an online dictionary. It is also a word-finding query engine for developers. Readability level is measured using three different formulas: the fog index, the Flesch reading ease score, and Flesch–Kincaid grade levels. A questionnaire has been distributed to 42 programmers and 35 students to compare the readability aspect between both new comments written by the tool and the original comments written by previous programmers and developers. Programmers stated that the comments from the proposed tool had fewer complex words and took less time to read and understand. Nevertheless, this did not significantly affect the understandability of the text, as programmers normally have quite a high level of English. However, the results from students show that the tool affects the understandability of text and the time taken to read it, while text complexity results show that the tool makes new comment text that is more readable by changing the three studied variables

    Survey of DoS/DDoS attacks in IoT

    Get PDF
    The term internet of things (IoT) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices. IoT devices work to do their desired goals, which is to develop a person's living with his/her minimal involvement. At the same time, IoT devices have many weaknesses, which attackers exploit to affect these devices' security. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are considered the most common attacks that strike IoT security. The main aim of these attacks is to make victim systems down and inaccessible for legitimate users by malicious malware. This paper's objective is to discuss and review security issues related to DoS/DDoS attacks and their countermeasures i.e. prevention based on IoT devices' layers structure

    Project review in the project management: an investigation study on earned value and balanced scorecard

    No full text
    Project review plays an essential role in the project management. Balanced scorecard and earned value are prominent project management techniques, which can be used to perform a project review. Each one of these techniques has its own strength and weaknesses. Each method is not fully equipped to perform in an effective project review. This paper propose analytical framework to investigate these techniques and highlights the weaknesses for each. This framework has proposed a hybrid framework combining the merit of both techniques, a project review processes, project review techniques and project review criteria have been proposed

    Exploring customer awareness and experience in banks. A case study of UK commercial vs Islamic bank.

    No full text
    This empirical study aims to examine the customer awareness and experience in both commercial and Islamic banks in the UK. It pays attention to the quality of services and the available support given to the customers. Banks pride in their financial services and support for customers. The banks’ mantra is about treating customers as priced assets and providing them with all the necessary support and guidance. Undoubtedly, the customers’ awareness of what the banks offer to them in terms of money safety, transfers, loans and interest rates are very important. The study utilises a questionnaire and focus group of 18 respondents with customers who use both banks to gain an understanding of their experiences. Evidence suggests that there is a general understanding of the banks’ services and commercial banks in particular expose their services more widely using various communication channels. The study found that some customers are aware of the specific charges and the interest rates. However, some were unaware of the services offered by the Islamic banks in relation to mortgage and interest rates and this had impact on customers’ satisfaction and loyalty. The study concludes that both commercial and Islamic banks need to do more to increase their customers services provisions in order to attract and retain existing customers. Offering customers and making them aware of a range of products and services tailored to their needs is way forward to acquire new and to increase customer retention
    corecore