Skip to main content

Research Repository

Advanced Search

Outputs (303)

A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware (2017)
Conference Proceeding
Han, J. W., Hoe, O. J., Wing, J. S., & Brohi, S. (2017). A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (222-226). https://doi.org/10.1145/3168390.3168398

Undeterred by numerous efforts deployed by antivirus software that shields users from various security threats, ransomware is constantly evolving as technology advances. The impact includes hackers hindering the user’s accessibility to their data, an... Read More about A conceptual security approach with awareness strategy and implementation policy to eliminate ransomware.

An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform (2017)
Conference Proceeding
Mathoosoothenen, V. N., Sundaram, J. S., Palanichamy, R. A., & Brohi, S. N. (2017). An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform. . https://doi.org/10.1145/3168390.3168397

There has been an alarming rise in the number of cyber crimes occurring lately and stealthier methodologies used by attackers, which has directly contributed to the rise of online victims. With the development of advanced persistent threats, current... Read More about An integrated real-time simulated ethical hacking toolkit with interactive gamification capabilities and cyber security educational platform.

Negation of ransomware via gamification and enforcement of standards (2017)
Conference Proceeding
Dion, Y. L., Joshua, A. A., & Brohi, S. N. (2017). Negation of ransomware via gamification and enforcement of standards. In CSAI 2017: Proceedings of the 2017 International Conference on Computer Science and Artificial Intelligence (203-208). https://doi.org/10.1145/3168390.3168399

With the continued advancement of the internet and relevant programs, the number of exploitable loopholes in security systems increases. One such exploit that is plaguing the software scene is ransomware, a type of malware that weaves its way through... Read More about Negation of ransomware via gamification and enforcement of standards.

Chair’s welcome: SCCTSA workshop (2017)
Conference Proceeding
Khan, Z. (2017). Chair’s welcome: SCCTSA workshop. In UCC '17 Companion: Companion Proceedings of the 10th International Conference on Utility and Cloud Computing. , (163–164). https://doi.org/10.1145/3147234.3148605

Welcome note for the 4th International workshop - Smart City Clouds: Technologies Systems and Applications co-located with 10 IEEE/ACM Utility and Cloud Computing Conference, Austin, Texas, USA, 5-8 December 2017.

PROTECT: Container process isolation using system call interception (2017)
Conference Proceeding
Win, T. Y., Tso, F. P., Mair, Q., & Tianfield, H. (in press). PROTECT: Container process isolation using system call interception. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks \& 2017 11th International Conference on Frontier of Computer Science and Technology \& 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). , (191-196). https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.24

Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been resear... Read More about PROTECT: Container process isolation using system call interception.

Towards a classification of non-interactive computational assumptions in cyclic groups (2017)
Conference Proceeding
Ghadafi, E., & Groth, J. (2017). Towards a classification of non-interactive computational assumptions in cyclic groups. In Advances in Cryptology – ASIACRYPT 2017 (66-96). https://doi.org/10.1007/978-3-319-70697-9_3

We study non-interactive computational intractability assumptions in prime-order cyclic groups. We focus on the broad class of computational assumptions, which we call target assumptions, where the adversary's goal is to compute a concrete group elem... Read More about Towards a classification of non-interactive computational assumptions in cyclic groups.

Linear-time zero-knowledge proofs for arithmetic circuit satisfiability (2017)
Conference Proceeding
Bootle, J., Cerulli, A., Ghadafi, E., Groth, J., Hajiabadi, M., & Jakobsen, S. K. (2017). Linear-time zero-knowledge proofs for arithmetic circuit satisfiability. In Lecture Notes in Computer Science (336-365). https://doi.org/10.1007/978-3-319-70700-6_12

We give computationally efficient zero-knowledge proofs of knowledge for arithmetic circuit satisfiability over a large field. For a circuit with N addition and multiplication gates, the prover only uses O(N) multiplications and the verifier only use... Read More about Linear-time zero-knowledge proofs for arithmetic circuit satisfiability.

An analytical model for reliability evaluation of cloud service provisioning systems (2017)
Conference Proceeding
Alturkistani, F. M., Alaboodi, S. S., & Brohi, S. (2017). An analytical model for reliability evaluation of cloud service provisioning systems. In 2017 IEEE Conference on Dependable and Secure Computing (340-347). https://doi.org/10.1109/DESEC.2017.8073821

With the growing popularity of cloud computing, the reliability of cloud services has become a key concern of cloud service providers and users. Several researchers have studied the problem of cloud service reliability assurance. However, the complex... Read More about An analytical model for reliability evaluation of cloud service provisioning systems.

The time machine: A multiscreen generative video artwork (2017)
Conference Proceeding
Buzzo, D. (2017). The time machine: A multiscreen generative video artwork. . https://doi.org/10.1145/3106548.3106617

© 2017 Copyright is held by the owner/author(s). 'The Time Machine' is a multi-screen, high-performance, generative video art installation based around multiple low cost computer platforms. Using algorithmic selection of palindromic loops of timelaps... Read More about The time machine: A multiscreen generative video artwork.

More efficient structure-preserving signatures - or: Bypassing the type-III lower bounds (2017)
Conference Proceeding
Ghadafi, E. (2017). More efficient structure-preserving signatures - or: Bypassing the type-III lower bounds. In S. Foley, D. Gollmann, & E. Snekkenes (Eds.), . https://doi.org/10.1007/978-3-319-66399-9_3

© 2017, Springer International Publishing AG. Structure-Preserving Signatures (SPSs) are an important cryptographic primitive that is useful for the design of modular cryptographic protocols. It has be shown that in the most efficient Type-III biline... Read More about More efficient structure-preserving signatures - or: Bypassing the type-III lower bounds.