- Blockchain Technology Applications and Security
- Digital Transformation in Industry
- Cloud Data Security Solutions
- Smart Grid Security and Resilience
- Physical Unclonable Functions (PUFs) and Hardware Security
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Information and Cyber Security
- Economic and Technological Systems Analysis
- Business Process Modeling and Analysis
- Spam and Phishing Detection
- Software Engineering and Design Patterns
- Imbalanced Data Classification Techniques
- University-Industry-Government Innovation Models
- Open Source Software Innovations
- Gene expression and cancer classification
- Innovative Teaching Methods
- Digital Rights Management and Security
- Technology Adoption and User Behaviour
- Professional Masters Programs Analysis
- Advanced Software Engineering Methodologies
- Cybersecurity and Information Systems
- Machine Learning in Bioinformatics
- Cybercrime and Law Enforcement Studies
- Advanced Malware Detection Techniques
University of Tartu
2019-2024
Universitas Muhammadiyah Aceh
2019
Tallinn University
2018
Bahria University
2018
Pakistan Institute of Engineering and Applied Sciences
2014
The first step to realise the true potential of blockchain systems is explain associated security risks and vulnerabilities. These vulnerabilities, exploited by threat agent affect valuable assets services. In this work, we use a risk management (SRM) domain model develop framework explore two - Sybil Double-spending that are observed considered most concerning within systems. illustrates protected or secure, classification threats attacker can trigger using attack, identification cause...
Digital twins, being the virtual replicas of their physical counterparts, share valuable knowledge underlying system. Therefore, they might become a potential source data breaches and playground for attackers to launch covert attacks. It is imperative investigate necessary countermeasures mitigate such
The early development of blockchain technology (BCT) has already demonstrated the technology's potential to serve needs different industries. BCT also become established as a popular research topic in scientific disciplines. This paper aims at introducing how several relevant disciplines—supply chain management; management, economics and finance; computer science; security engineering—see education perspectives for BCT. A field review is conducted present challenges opportunities BCT, well...
Seeking more secure and effective digital representations.
Blockchain is gaining traction for improving the security of healthcare applications, however, it does not become a silver bullet as various threats are observed in blockchain-based applications. Moreover, when performing risk management (SRM) there conceptual ambiguities and semantic gaps that hinder from treating effectively. To address these issues, we present ontology (HealthOnt) offers coherent formal information models to treat traditional We evaluate by SRM back-pain patient’s...
Blockchain governs inter-organizational business processes and enables decentralized autonomous organizations (DAO) with governance capabilities via smart contracts (SC). Due to the programmer’s lack of prior knowledge contract domain, SCs are ambiguous error-prone. Several works, i.e., SPESC, Symboleo, SmaCoNat, exist support legally-binding SCs. The aforementioned SCLs present intriguing approaches building but either domain completeness, or intended for non-collaborative...
Blockchain technology is ready to revolutionise the financial industry.The industry has various security challenges (e.g., tampering, repudiation, denial of service, etc).Also, domain information problems related conceptual ambiguity and semantic gap.The Corda platform provides suitable technological infrastructure build blockchain-based application (CorDapp) in overcome challenges.In this paper, we a Corda-based ontology (CordaSecOnt) improve from an ontological analysis that combines...
Abstract Routine maintenance refers to the repair of damages on roads’ sections by means steady service condition. It is always conducted Blangkejeren-Laweaunan Road Section annual basis. often using a self-management system Executing Officer (PPK) 08, which, according government statistics 65 km long. While implementing project, PPK worked with competent subcontractor as well foreman from community surrounding project region. To reduce risks and enhance safety, contractor made use...
In order to explore the practical potential and needs of interdisciplinary knowledge competence requirements Blockchain technology, project activity "Development Interdisciplinary Skills Concept" starts with literature review identifying state art in Supply Chain Management Logistics, Business Finance, as well Computer Science IT-Security. The further explores academic industry landscape existing initiatives education which offer courses. Moreover, job descriptions adverts are analyzed...
Optimizing administrative functions and enhancing the learning experience are ongoing priorities in education. Modernizing student attendance methods is critical for gauging engagement academic success. The traditional systems face various challenges ranging from labor-intensive processes to security privacy concerns. To address these challenges, we propose a blockchain Decentralized Autonomous Organization (DAO)-based STudent Attendance Management Platform (STAMP). Leveraging DAO...