- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Software Testing and Debugging Techniques
- Information and Cyber Security
- Digital and Cyber Forensics
- Software Engineering Research
- Education and Digital Technologies
- E-Learning and Knowledge Management
- Gallbladder and Bile Duct Disorders
- User Authentication and Security Systems
- Media and Communication Studies
- Innovation in Digital Healthcare Systems
- Semantic Web and Ontologies
- Cardiac, Anesthesia and Surgical Outcomes
- Open Education and E-Learning
- Food Supply Chain Traceability
- Cholangiocarcinoma and Gallbladder Cancer Studies
- Caching and Content Delivery
- Chaos-based Image/Signal Encryption
- Pharmaceutical Quality and Counterfeiting
- Cloud Data Security Solutions
- Data Quality and Management
- Digital Media Forensic Detection
Ahlia University
2023
Nottingham University Hospitals NHS Trust
2019-2023
Nottingham City Hospital
2019-2023
Polytechnic University of San Luis Potosí
2008-2022
University of New Brunswick
2014-2019
European Organization for Nuclear Research
2019
COMSATS University Islamabad
2019
Mobile malware is so pernicious and on the rise, accordingly having a fast reliable detection system necessary for users. In this research, new characterization detecting meaningful deviations in network behavior of smart-phone application proposed. The main goal proposed to protect mobile device users cellular infrastructure companies from malicious applications with just 9 traffic feature measurements. not only able detect or masquerading apps, but can also identify them as general...
The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly plagiarize applications (e.g., through code reuse repackaging) boosting amount on infection rate. In this study, we present AndroidSOO, lightweight approach for detection repackaging symptoms apps. work, introduce explore novel easily extractable attribute called...
The recent escalation of application-layer denial service (DoS) attacks has attracted a significant interest the security research community. Since DoS usually do not manifest themselves at network level, they avoid traditional network-layer-based detection. Therefore, community focused on specialised detection and mitigation mechanisms. However, deployment reliable efficient defence mechanisms against these requires comprehensive understanding existing supported by unified terminology....
E-wallets have started to grow in popularity, reaching a tipping point some countries. This can be attributed the worldwide use of payment-enabled devices and ubiquity e-wallet acceptance by larger smaller retailers. As more customers adopt e-wallets they may also become big target cybercrime. facilitates financial transactions via smartphones which is lucrative opportunity for cybercriminals. paper presents security assessment Android apps provided Canada's leading banks.
The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly employ suite widely available tools to facilitate development. Analysis individual apps for detection often requires understanding functionality complex, time-consuming analysis behavior. Since tend leave traces program structure, we can potentially use visual...
Since the first computer virus hit Advanced Research Projects Agency Network (ARPANET) in early 1970s, security community interest revolved around ways to expose identities of malware writers. Knowledge adversarial promised additional leverage experts their ongoing battle against those perpetrators. At dawn computing era, when writers and malicious software were characterized by lack experience relative simplicity, task uncovering was more or less straightforward. Manual analysis source code...
The appearance of a new Android platform and its popularity has resulted in sharp rise the number reported vulnerabilities consequently mobile threats.Mobile malware, dominant threat for modern devices, was almost non-existent before official release 2008.The rapid development apps app markets coupled with open nature triggered an explosive growth specialized malware subsequent search effective defence mechanisms.In spite considerable research efforts this area, majority proposed solutions...
Web server attacks are increasingly in short time for different purposes, one of the principal vectors this RFI and even automatic way to do this. We suppose that a botnet involved attacks, attackers (host launch attack) web servers compromised since natural format attack tool (remote file include). So we go deeper identified type host is attacker through remote analysis based on domain name, content, dynamic ip addresses.A large was tracked by almost year figure out behavior kind hosters....
IP reputation lookup is one of the traditional methods for recognition blacklisted IPs, i.e., addresses known to be sources spam and malware-related threats. Its use however has been rapidly increasing beyond its domain reaching various filtering tasks. One solutions able provide a necessary scalability Bloom filter. Efficient in memory consumption, filters fast membership check, allowing confirm presence set elements data structure with constant false positive probability. With increased...
In this paper, we addressed the problem of dataset scarcity for task network intrusion detection. Our main contribution was to develop a framework that provides complete process generating traffic datasets based on aggregation real traces. addition, proposed set tools attribute extraction and labeling sessions. A new with botnet generated by assess our method machine learning algorithms suitable unbalanced data. The performance classifiers evaluated in terms macro-averages F1-score (0.97)...
The appearance of the Android platform and its popularity has resulted in a sharp rise number reported vulnerabilities consequently mobile threats. Leveraging openness app markets lack security testing, malware authors commonly plagiarize applications through code reuse, boosting amount on infection rate. In last few years studies focused detection reuse drastically increased. Ranging from lightweight suspicious signs to more sophisticated computationally expensive methods assessing apps'...
Android has become one of the most popular mo-bile device operating systems. Indeed, its security issues have attracted a lot attention. One major concerns is use obfuscation strategies to evade anti-malware solutions. malware authors are increasingly using code tools and techniques hide malicious code. In this work, we in- troduce novel fingerprinting approach for based on spatial analysis. We investigate first-order second-order statistical features analyze distribution pixels representing...
SWAN (Service for Web-based ANalysis) is a CERN service that allows users to perform interactive data analysis in the cloud, “software as service” model. It built upon widely-used Jupyter notebooks, allowing write - and run their using only web browser. By connecting SWAN, have immediate access storage, software computing resources provides they need do analyses. Besides providing an easier way of producing scientific code results, also great tool create shareable content. From results be...
The research focused on the analysis of banking malware such as Zeus, Citadel, Carberp, SpeEye and Soraya, which infected personal computers between 2006–2014. This work described briefly each malware, compared major features ranked by impact. An experiment was performed running samples then analyzing network traffic for machine.
The evolution of phishing methods has resulted in a plethora new tools and techniques to coerce users into providing credentials, generally for nefarious purposes. This paper discusses the relatively recent emergence an evolutionary technique called by form that relies on abuse online forms elicit information from target population. We evaluate corpus emails over year's worth URLs investigate methodology, history, spread, origins, life cycle as well identifying directions future research...
This paper presents an analysis of some characteristics from malicious PDFs files. where examined on a testbed 11,104 and 8,668 non files, the samples includes 0days files used wild for focused attacks. The PDF format is showed very quickly only to help understand attack vectors. attacks are almost three years, recently this kind incrementing, techniques hide anti-virus software growing in complex, so why important now work how formed
Software Engineering is a foundation on modern computer systems development. This discipline offered by the large branch of related university degrees these days around world, among with other science courses. As we all know, cybersecurity problems are mostly software, for example bad implementations, poor quality achieved, lack testing. Overall bigger problem security planification since inception and designing project. Cybersecurity had gained lot attention in recent years. From everyday...
This article presents an exploratory research based on the virtual ethnography from environment of and learning including new technologies. The is a method qualitative social sciences that mainly used in socio-cultural Anthropology, where it has its theoretical basis. target was to explore web 2.0 tools. process participant observation by means blog, other tools communities. result descriptive model Personal Learning Environment which developed ethnographic experience.
Software Engineering is a foundation of modern computer systems development. The process involves several steps, including Analysis and Design, which are the fundamentals for building software systems. This discipline offered by university degrees these days around world, included among other science courses.Nowadays, cybersecurity problems very related with weakness or bad designs, as an example one can mention implementations, projects poor quality, lack testing, others issues. Overall...