Skip to main content

Research Repository

See what's under the surface


Detecting Ransomware Using Process Behavior Analysis (2019)
Conference Proceeding
Arabo, A., Dijoux, R., Poulain, T., & Chevalier, G. (in press). Detecting Ransomware Using Process Behavior Analysis

Ransomware attacks are one of the biggest and attractive threats in cyber security today. Anti-virus software's are often inefficient against zero-day malware and ransomware attacks, important network infections could result in a large amount of data... Read More about Detecting Ransomware Using Process Behavior Analysis.

Pedagogical Approach to Effective Cybersecurity Teaching (2019)
Book Chapter
Arabo, A., & Serpell, M. (in press). Pedagogical Approach to Effective Cybersecurity Teaching. In A. D. Cheok, W. Mueller, & Z. Pan (Eds.), Transactions on Edutainment XV, (129-140). Springer. https://doi.org/10.1007/978-3-662-59351-6_11

© 2019, Springer-Verlag GmbH Germany, part of Springer Nature. Initial research ruled out many factors that were thought may correlate to student academic performance. Finally, a strong correlation was found between their academic performance and the... Read More about Pedagogical Approach to Effective Cybersecurity Teaching.

CyberSDnL: A roadmap to Cyber Security Device nutrition Label (2018)
Conference Proceeding
Abdullahi, A. (2018). CyberSDnL: A roadmap to Cyber Security Device nutrition Label. In CYBER 2018, The Third International Conference on Cyber-Technologies and Cyber-Systems

Security issues mainly evolve from attacking the weakest link within the chain of the ecosystem. One of such weakest links with poor security posture is the smart devices used within a smart space and as Bring Your Own Device (BOYD) for the corporate... Read More about CyberSDnL: A roadmap to Cyber Security Device nutrition Label.

MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755

© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.

CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system (2017)
Presentation / Conference
Arabo, A. (2017, March). CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system. Paper presented at 12th International Conference on Cyber Warfare and Security

Cybersecurity is a prerequisite to ongoing developments concerning the interaction of a myriad of networked components ranging from PCs and portable devices through to households white goods. The resulting ecosystem in many ways resembles the human i... Read More about CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system.

Mobile App Collusions and Its Cyber Security Implications (2016)
Conference Proceeding
Arabo, A. (2016). Mobile App Collusions and Its Cyber Security Implications. In J. Niu, L. Tao, & M. Qiu (Eds.), 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), 178-183. https://doi.org/10.1109/CSCloud.2016.9

© 2016 IEEE. The key focus in securing mobile software systems is substantiality intended in detecting and mitigating vulnerabilities in a single app or apps developed by the same individual. It fails to identify vulnerabilities that arise as a resul... Read More about Mobile App Collusions and Its Cyber Security Implications.

Cyber Security Challenges within the Connected Home Ecosystem Futures (2015)
Presentation / Conference
Arabo, A. (2015, November). Cyber Security Challenges within the Connected Home Ecosystem Futures. Paper presented at Procedia Computer Science, San Jose, California, USA

© 2015 The Authors. Published by Elsevier B.V. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures that ever been expected. Most of the research effort is focused on the defense mechanisms of cooperate and nat... Read More about Cyber Security Challenges within the Connected Home Ecosystem Futures.

Cybersecurity in the IoT (2015)
Presentation / Conference
Arabo, A. (2015, March). Cybersecurity in the IoT. Presented at Internet of Things Summit

IoT is a nightmare for security and privacy issues and a honeypot for cyber criminals. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures because of the increase adaptability of IoT than ever been expected. M... Read More about Cybersecurity in the IoT.

Privacy-aware IoT cloud survivability for future connected home ecosystem (2014)
Presentation / Conference
Arabo, A. (2014, November). Privacy-aware IoT cloud survivability for future connected home ecosystem. Paper presented at 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA)

Cloud services can greatly enhance the capabilities of mobile and smart devices, particularly within the ecosystem of connected home futures. A single device now performs multiple functions: organizing contacts and calendars, playing games, storing s... Read More about Privacy-aware IoT cloud survivability for future connected home ecosystem.

User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks (2013)
Book
Arabo, A. (2013). User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks. Cambridge Scholars Publishing

The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc N... Read More about User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks.