Authenticity as a mechanism for an effective meso assessment and feedback strategy
(2022)
Presentation / Conference
Arabo, A. (2022, November). Authenticity as a mechanism for an effective meso assessment and feedback strategy. Presented at Assessment and Feedback Symposium 2022: Further Frontiers: Assessment and Feedback Policy and Practice at the Programme Level, Online
Browse
Authenticity in delivering contextual pedagogy and materials in cyber security (2022)
Presentation / Conference
Arabo, A. (2022, October). Authenticity in delivering contextual pedagogy and materials in cyber security. Presented at Developing Expertise for Teaching in Higher Education: The Artistry of Teaching, Hosted online by the University of Warwick
NTFS 2022: Authenticity in teaching and assessment (2022)
Report
Arabo, A. (2022). NTFS 2022: Authenticity in teaching and assessment. https://www.advance-he.ac.uk: AdvanceHE BlogThe world of education is constantly evolving and so it needs to provide context to what is being delivered at each session. This is more so for complex topics within the cyber science domain that evolves and changes every second.
Authenticity in delivering contextual pedagogy and materials in cyber security (2022)
Presentation / Conference
Arabo, A. (2022, July). Authenticity in delivering contextual pedagogy and materials in cyber security. Presented at Digitally Enhanced Education Webinar: How Best to Engage Our Students, Online
COVID-19 Pandemic cybersecurity Issues (2020)
Journal Article
Pranggono, B., & Arabo, A. (2021). COVID-19 Pandemic cybersecurity Issues. Internet Technology Letters, 4(2), Article e247. https://doi.org/10.1002/itl2.247This paper studies the cybersecurity issues that have occurred during the coronavirus (COVID-19) pandemic. During the pandemic, cyber criminals and Advanced Persistent Threat (APT) groups have taken advantage of targeting vulnerable people and system... Read More about COVID-19 Pandemic cybersecurity Issues.
Detecting ransomware using process behavior analysis (2020)
Journal Article
Arabo, A., Dijoux, R., Poulain, T., & Chevalier, G. (2020). Detecting ransomware using process behavior analysis. Procedia Computer Science, 168, 289-296. https://doi.org/10.1016/j.procs.2020.02.249Ransomware attacks are one of the biggest and attractive threats in cyber security today. Anti-virus software's are often inefficient against zero-day malware and ransomware attacks, important network infections could result in a large amount of data... Read More about Detecting ransomware using process behavior analysis.
Pedagogical Approach to Effective Cybersecurity Teaching (2019)
Book Chapter
Arabo, A., & Serpell, M. (in press). Pedagogical Approach to Effective Cybersecurity Teaching. In Z. Pan, A. D. Cheok, & W. Mueller (Eds.), Transactions on Edutainment XV (129-140). Springer. https://doi.org/10.1007/978-3-662-59351-6_11© 2019, Springer-Verlag GmbH Germany, part of Springer Nature. Initial research ruled out many factors that were thought may correlate to student academic performance. Finally, a strong correlation was found between their academic performance and the... Read More about Pedagogical Approach to Effective Cybersecurity Teaching.
MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.
CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system (2017)
Presentation / Conference
Arabo, A. (2017, March). CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system. Paper presented at 12th International Conference on Cyber Warfare and SecurityCybersecurity is a prerequisite to ongoing developments concerning the interaction of a myriad of networked components ranging from PCs and portable devices through to households white goods. The resulting ecosystem in many ways resembles the human i... Read More about CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system.
Mobile App Collusions and Its Cyber Security Implications (2016)
Conference Proceeding
Arabo, A. (2016). Mobile App Collusions and Its Cyber Security Implications. In J. Niu, L. Tao, & M. Qiu (Eds.), 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), (178-183). https://doi.org/10.1109/CSCloud.2016.9© 2016 IEEE. The key focus in securing mobile software systems is substantiality intended in detecting and mitigating vulnerabilities in a single app or apps developed by the same individual. It fails to identify vulnerabilities that arise as a resul... Read More about Mobile App Collusions and Its Cyber Security Implications.
Cyber Security Challenges within the Connected Home Ecosystem Futures (2015)
Presentation / Conference
Arabo, A. (2015, November). Cyber Security Challenges within the Connected Home Ecosystem Futures. Paper presented at Procedia Computer Science, San Jose, California, USA© 2015 The Authors. Published by Elsevier B.V. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures that ever been expected. Most of the research effort is focused on the defense mechanisms of cooperate and nat... Read More about Cyber Security Challenges within the Connected Home Ecosystem Futures.
Cybersecurity in the IoT (2015)
Presentation / Conference
Arabo, A. (2015, March). Cybersecurity in the IoT. Presented at Internet of Things SummitIoT is a nightmare for security and privacy issues and a honeypot for cyber criminals. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures because of the increase adaptability of IoT than ever been expected. M... Read More about Cybersecurity in the IoT.
Privacy-aware IoT cloud survivability for future connected home ecosystem (2014)
Presentation / Conference
Arabo, A. (2014, November). Privacy-aware IoT cloud survivability for future connected home ecosystem. Paper presented at 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)Cloud services can greatly enhance the capabilities of mobile and smart devices, particularly within the ecosystem of connected home futures. A single device now performs multiple functions: organizing contacts and calendars, playing games, storing s... Read More about Privacy-aware IoT cloud survivability for future connected home ecosystem.
User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks (2013)
Book
Arabo, A. (2013). User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks. Cambridge Scholars PublishingThe emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc N... Read More about User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks.
Processing device and method of operation thereof
Patent
Arabo, A. Processing device and method of operation thereof. 20150358356A processing device (10) includes a policy evaluation module (131) for evaluating policies associated with an item of data or an application and a dynamic context determination module (133) for determining contextual information associated with the c... Read More about Processing device and method of operation thereof.