10 research outputs found

    Malware detection issues, future trends and challenges: a survey

    Get PDF
    This paper focuses on the challenges and issues of detecting malware in to-day's world where cyberattacks continue to grow in number and complexity. The paper reviews current trends and technologies in malware detection and the limitations of existing detection methods such as signature-based detection and heuristic analysis. The emergence of new types of malware, such as file-less malware, is also discussed, along with the need for real-time detection and response. The research methodology used in this paper is presented, which includes a literature review of recent papers on the topic, keyword searches, and analysis and representation methods used in each study. In this paper, the authors aim to address the key issues and challenges in detecting malware today, the current trends and technologies in malware detection, and the limitations of existing methods. They also explore emerging threats and trends in malware attacks and highlight future directions for research and development in the field. To achieve this, the authors use a research methodology that involves a literature review of recent papers related to the topic. They focus on detecting and analyzing methods, as well as representation and extraction methods used in each study. Finally, they classify the literature re-view, and through reading and criticism, highlight future trends and problems in the field of malware detection

    Social engineering in social network: a systematic literature review

    Get PDF
    Social engineering is hacking and manipulating people's minds to obtain access to networks and systems in order to acquire sensitive data. A social engineering attack happens when victims are unaware of the strategies utilised and how to avoid them. Although rapid developments in communication technology made communication between individuals easier and faster, on the other hand, individuals' personal and private information is likely to be available online via social networking or other services without adequate security measures to protect such sensitive data. Hackers can use social engineering to target them no matter the technology they use to protect themselves. The methods differ, and the goal is the same, which is to manipulate and deceive organisations, companies, and individuals to obtain sensitive and private in-formation that attackers can benefit from, perhaps to sell it on the dark web or steal the payment card information of victims. The current research presents the attack techniques used in social engineering, as well as ways for pre-venting social engineering assaults. The major purpose of this study is to systematically and impartially conduct a systematic review of previous research on current social engineering attacks and the methods used to reduce these attacks

    Effect of Principal’s Technology Leadership on Teacher’s Technology Integration

    No full text
    Technology has changed the way people live .The role of school leadership, teaching approaches, and school innovation have also changed in the industrial era 4.0 due to advanced technology such as Artificial Intelligence and the internet. Moreover, the challenges facing school administrators today different than their predecessors, since many factors influence the integration of technology in schools some of these are lack of ICT training, teachers ’competence in ICT, and access to ICT resources. Considering Leadership is the key agent in the effective implementation of technology in schools. This research aimed to investigate the influence of principals' technology leadership and professional development on teacher’s technology integration with gender and experience as moderation variables. In this cross-sectional survey, random sampling was carried out to select 442 principals and 953 teachers from Palestinian public schools. Two different questionnaires were used the first one was based on National Education Technology Standards –Administrator, NETS-A (2014) and Survey of Technology Experiences for school principals while the second instrument is Learning with ICT: Measuring ICT Use in the Curriculum for the teachers. Numerical data were analyzed quantitatively using two software the Statistical Package for the Social Sciences SPSS Version 23.0 and Smart PLS. The finding showed that the levels of Technology Leadership of the five constructs (systemic improvement, visionary leadership, excellence in professional practice, digital age learning culture, and digital citizenship), professional development and teacher’s technology integration were at high levels. Based on the results of the data analyses there is a positive significant relationship between the five constructs of technology leadership and professional development with teacher’s technology integration in the Palestinian public schools in the west bank

    Exploring customer awareness and experience in banks. A case study of UK commercial vs Islamic bank.

    No full text
    This empirical study aims to examine the customer awareness and experience in both commercial and Islamic banks in the UK. It pays attention to the quality of services and the available support given to the customers. Banks pride in their financial services and support for customers. The banks’ mantra is about treating customers as priced assets and providing them with all the necessary support and guidance. Undoubtedly, the customers’ awareness of what the banks offer to them in terms of money safety, transfers, loans and interest rates are very important. The study utilises a questionnaire and focus group of 18 respondents with customers who use both banks to gain an understanding of their experiences. Evidence suggests that there is a general understanding of the banks’ services and commercial banks in particular expose their services more widely using various communication channels. The study found that some customers are aware of the specific charges and the interest rates. However, some were unaware of the services offered by the Islamic banks in relation to mortgage and interest rates and this had impact on customers’ satisfaction and loyalty. The study concludes that both commercial and Islamic banks need to do more to increase their customers services provisions in order to attract and retain existing customers. Offering customers and making them aware of a range of products and services tailored to their needs is way forward to acquire new and to increase customer retention

    Survey of DoS/DDoS attacks in IoT

    Get PDF
    The term internet of things (IoT) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices. IoT devices work to do their desired goals, which is to develop a person's living with his/her minimal involvement. At the same time, IoT devices have many weaknesses, which attackers exploit to affect these devices' security. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are considered the most common attacks that strike IoT security. The main aim of these attacks is to make victim systems down and inaccessible for legitimate users by malicious malware. This paper's objective is to discuss and review security issues related to DoS/DDoS attacks and their countermeasures i.e. prevention based on IoT devices' layers structure

    Survey of DoS/DDoS attacks in IoT

    Get PDF
    The term internet of things (IoT) has gained much popularity in the last decade, which can be defined as various connected devices over the internet. IoT has rapidly spread to include all aspects of our lives. For instance, smart houses, smart cities, and variant wearable devices. IoT devices work to do their desired goals, which is to develop a person's living with his/her minimal involvement. At the same time, IoT devices have many weaknesses, which attackers exploit to affect these devices' security. Denial of Service (DoS) and Distributed Denial of Service (DDoS) are considered the most common attacks that strike IoT security. The main aim of these attacks is to make victim systems down and inaccessible for legitimate users by malicious malware. This paper's objective is to discuss and review security issues related to DoS/DDoS attacks and their countermeasures i.e. prevention based on IoT devices' layers structure

    Enhancing Software Comments Readability Using Flesch Reading Ease Score

    No full text
    Comments are used to explain the meaning of code and ease communications between programmers themselves, quality assurance auditors, and code reviewers. A tool has been developed to help programmers write readable comments and measure their readability level. It is used to enhance software readability by providing alternatives to both keywords and comment statements from a local database and an online dictionary. It is also a word-finding query engine for developers. Readability level is measured using three different formulas: the fog index, the Flesch reading ease score, and Flesch–Kincaid grade levels. A questionnaire has been distributed to 42 programmers and 35 students to compare the readability aspect between both new comments written by the tool and the original comments written by previous programmers and developers. Programmers stated that the comments from the proposed tool had fewer complex words and took less time to read and understand. Nevertheless, this did not significantly affect the understandability of the text, as programmers normally have quite a high level of English. However, the results from students show that the tool affects the understandability of text and the time taken to read it, while text complexity results show that the tool makes new comment text that is more readable by changing the three studied variables

    Computer Numerical Control-PCB Drilling Machine with Efficient Path Planning – Case Study_2

    Get PDF
    In Printed Circuit Board (PCB) drilling machines, the location of the drill holes are fed into the machine and the PCB will be drilled at the corresponding coordinates. Some machines do not choose the optimal route when completing their tasks. Hence, this paper proposes an approach, which is based on the Algorithm Shortest Path Search Algorithm (SPSA), for finding the optimal route in PCB holes drilling process. In SPSA, when the robotic arm at the initial position, the algorithm calculates the nearest point to the initial position from all points that the wires starts or ends with. If the nearest point is a start-of-wire point, it will use SPS algorithm 1. If the nearest point is an end-of-wire point, it will use SPS algorithm 2. This process is repeated until drilling all the lines. Then, the robotic arm will drill all the holes according to the proposed Simulated Annealing Algorithm (AS) in order to determine the optimal machining parameters for milling operations. The results of the different optimization algorithms Genetic Algorithm (GA) and AS are compared and conclusions are presented. . The proposed Computer Numerical Control (CNC) machine consists of driver, drill, three stepper motors, cables and microcontroller PIC16f877A to control the movement of the machine. The SPSA algorithm optimizes the use of the motors and other mechanical paths involved in the process while reducing total time taken to traverse all the drill holes. This paper also explains the detailed problem of interest and the mathematical formulation of the problem is defined. Experimental result indicates that the proposed SPSA-based approach is capable to efficiently find the optimal route for PCB holes drilling process

    A System Dynamics Approach for Hospital Waste Management in a City in a Developing Country: The Case of Nablus, Palestine

    Get PDF
    Hospitals and health centers provide a variety of healthcare services and normally generate hazardous waste as well as general waste. General waste has a similar nature to that of municipal solid waste and therefore could be disposed of in municipal landfills. However, hazardous waste poses risks to public health, unless it is properly managed. The hospital waste management system encompasses many factors, i.e., number of beds, number of employees, level of service, population, birth rate, fertility rate, and not in my back yard (NIMBY) syndrome. Therefore, this management system requires a comprehensive analysis to determine the role of each factor and its influence on the whole system. In this research, a hospital waste management simulation model is presented based on the system dynamics technique to determine the interaction among these factors in the system using a software package, ithink. This model is used to estimate waste segregation as this is important in the hospital waste management system to minimize risk to public health. Real data has been obtained from a case study of the city of Nablus, Palestine to validate the model. The model exhibits wastes generated from three types of hospitals (private, charitable, and government) by considering the number of both inpatients and outpatients depending on the population of the city under study. The model also offers the facility to compare the total waste generated among these different types of hospitals and anticipate and predict the future generated waste both infectious and non-infectious and the treatment cost incurred

    Project review in the project management: an investigation study on earned value and balanced scorecard

    No full text
    Project review plays an essential role in the project management. Balanced scorecard and earned value are prominent project management techniques, which can be used to perform a project review. Each one of these techniques has its own strength and weaknesses. Each method is not fully equipped to perform in an effective project review. This paper propose analytical framework to investigate these techniques and highlights the weaknesses for each. This framework has proposed a hybrid framework combining the merit of both techniques, a project review processes, project review techniques and project review criteria have been proposed
    corecore