Skip to main content

Research Repository

Advanced Search

All Outputs (6)

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Conference Proceeding
Mathoosoothenen, V. N., Sundaram, J. S., Palanichamy, R. A., & Brohi, S. N. (2017). An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. . https://doi.org/10.1145/3168390.3168397

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Conference Proceeding
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (222-226). https://doi.org/10.1145/3168390.3168398

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.

PROTECT: Container process isolation using system call interception (2017)
Conference Proceeding
Win, T. Y., Tso, F. P., Mair, Q., & Tianfield, H. (in press). PROTECT: Container process isolation using system call interception. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks \& 2017 11th International Conference on Frontier of Computer Science and Technology \& 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). , (191-196). https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.24

Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been resear... Read More about PROTECT: Container process isolation using system call interception.

An analytical model for reliability evaluation of cloud service provisioning systems (2017)
Conference Proceeding
Alturkistani, F. M., Alaboodi, S. S., & Brohi, S. (2017). An analytical model for reliability evaluation of cloud service provisioning systems. In 2017 IEEE Conference on Dependable and Secure Computing (340-347). https://doi.org/10.1109/DESEC.2017.8073821

With the growing popularity of cloud computing, the reliability of cloud services has become a key concern of cloud service providers and users. Several researchers have studied the problem of cloud service reliability assurance. However, the complex... Read More about An analytical model for reliability evaluation of cloud service provisioning systems.

Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition (2017)
Conference Proceeding
Djenouri, D., Bagaa, M., Chelli, A., & Balasingham, I. (2017). Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition. https://doi.org/10.1109/glocomw.2016.7848891

Survivable wireless sensor networks that take advantage of green energy resources from the environment is considered in this paper. The particular problem of constrained relay nodes (RNs) placement to ensure communication coverage in the single-tiere... Read More about Energy Harvesting Aware Minimum Spanning Tree for Survivable WSN with Minimum Relay Node Addition.