Skip to main content

Research Repository

Advanced Search

All Outputs (16)

The use AI (ChatGPT) for offensive cyber security (2023)
Presentation / Conference
Arabo, A. (2023, March). The use AI (ChatGPT) for offensive cyber security. Presented at The 2nd International Conference on Computing Innovation and Applied Physics, 2023, Stanford, CA, USA

Offensive cyber security is crucial in modern information security practices, and the usage of AI-powered tools, such as ChatGPT, has enhanced its effectiveness. ChatGPT, a large language model trained by OpenAI, allows trained attackers to create an... Read More about The use AI (ChatGPT) for offensive cyber security.

NTFS 2022: Authenticity in teaching and assessment (2022)
Report
Arabo, A. (2022). NTFS 2022: Authenticity in teaching and assessment. https://www.advance-he.ac.uk: AdvanceHE Blog

The world of education is constantly evolving and so it needs to provide context to what is being delivered at each session. This is more so for complex topics within the cyber science domain that evolves and changes every second.

COVID-19 Pandemic cybersecurity Issues (2020)
Journal Article
Pranggono, B., & Arabo, A. (2021). COVID-19 Pandemic cybersecurity Issues. Internet Technology Letters, 4(2), Article e247. https://doi.org/10.1002/itl2.247

This paper studies the cybersecurity issues that have occurred during the coronavirus (COVID-19) pandemic. During the pandemic, cyber criminals and Advanced Persistent Threat (APT) groups have taken advantage of targeting vulnerable people and system... Read More about COVID-19 Pandemic cybersecurity Issues.

Detecting ransomware using process behavior analysis (2020)
Journal Article
Arabo, A., Dijoux, R., Poulain, T., & Chevalier, G. (2020). Detecting ransomware using process behavior analysis. Procedia Computer Science, 168, 289-296. https://doi.org/10.1016/j.procs.2020.02.249

Ransomware attacks are one of the biggest and attractive threats in cyber security today. Anti-virus software's are often inefficient against zero-day malware and ransomware attacks, important network infections could result in a large amount of data... Read More about Detecting ransomware using process behavior analysis.

Pedagogical Approach to Effective Cybersecurity Teaching (2019)
Book Chapter
Arabo, A., & Serpell, M. (in press). Pedagogical Approach to Effective Cybersecurity Teaching. In Z. Pan, A. D. Cheok, & W. Mueller (Eds.), Transactions on Edutainment XV (129-140). Springer. https://doi.org/10.1007/978-3-662-59351-6_11

© 2019, Springer-Verlag GmbH Germany, part of Springer Nature. Initial research ruled out many factors that were thought may correlate to student academic performance. Finally, a strong correlation was found between their academic performance and the... Read More about Pedagogical Approach to Effective Cybersecurity Teaching.

MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755

© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.

CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system (2017)
Presentation / Conference
Arabo, A. (2017, March). CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system. Paper presented at 12th International Conference on Cyber Warfare and Security, Dayton, USA

Cybersecurity is a prerequisite to ongoing developments concerning the interaction of a myriad of networked components ranging from PCs and portable devices through to households white goods. The resulting ecosystem in many ways resembles the human i... Read More about CyberMix: A roadmap of SDN-based intelligent cybersecurity immune system.

Mobile App Collusions and Its Cyber Security Implications (2016)
Conference Proceeding
Arabo, A. (2016). Mobile App Collusions and Its Cyber Security Implications. In M. Qiu, L. Tao, & J. Niu (Eds.), 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud) (178-183). https://doi.org/10.1109/CSCloud.2016.9

© 2016 IEEE. The key focus in securing mobile software systems is substantiality intended in detecting and mitigating vulnerabilities in a single app or apps developed by the same individual. It fails to identify vulnerabilities that arise as a resul... Read More about Mobile App Collusions and Its Cyber Security Implications.

Cybersecurity in the IoT (2015)
Presentation / Conference
Arabo, A. (2015, March). Cybersecurity in the IoT. Presented at Internet of Things Summit, London, UK

IoT is a nightmare for security and privacy issues and a honeypot for cyber criminals. Cybercrime and threats of cyber security is much closer to connected home ecosystems futures because of the increase adaptability of IoT than ever been expected. M... Read More about Cybersecurity in the IoT.

Privacy-aware IoT cloud survivability for future connected home ecosystem (2014)
Presentation / Conference
Arabo, A. (2014, November). Privacy-aware IoT cloud survivability for future connected home ecosystem. Paper presented at 2014 IEEE/ACS 11th International Conference on Computer Systems and Applications (AICCSA), Doha, Qatar

Cloud services can greatly enhance the capabilities of mobile and smart devices, particularly within the ecosystem of connected home futures. A single device now performs multiple functions: organizing contacts and calendars, playing games, storing s... Read More about Privacy-aware IoT cloud survivability for future connected home ecosystem.

User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks (2013)
Book
Arabo, A. (2013). User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks. Cambridge Scholars Publishing

The emergent notion of ubiquitous computing makes it possible for mobile devices to communicate and provide services via networks connected in an ad-hoc manner. These have resulted in the proliferation of wireless technologies such as Mobile Ad-hoc N... Read More about User-Centred and Context-Aware Identity Management in Mobile Ad-Hoc Networks.