• Title/Summary/Keyword: Information Security Learning

Search Result 1,001, Processing Time 0.023 seconds

Relevance of E- Learning and Quality Development in Higher Education

  • Arshi Naim;Sahar Mohammed Alshawaf
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.187-195
    • /
    • 2024
  • This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.

Evaluations of AI-based malicious PowerShell detection with feature optimizations

  • Song, Jihyeon;Kim, Jungtae;Choi, Sunoh;Kim, Jonghyun;Kim, Ikkyun
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.549-560
    • /
    • 2021
  • Cyberattacks are often difficult to identify with traditional signature-based detection, because attackers continually find ways to bypass the detection methods. Therefore, researchers have introduced artificial intelligence (AI) technology for cybersecurity analysis to detect malicious PowerShell scripts. In this paper, we propose a feature optimization technique for AI-based approaches to enhance the accuracy of malicious PowerShell script detection. We statically analyze the PowerShell script and preprocess it with a method based on the tokens and abstract syntax tree (AST) for feature selection. Here, tokens and AST represent the vocabulary and structure of the PowerShell script, respectively. Performance evaluations with optimized features yield detection rates of 98% in both machine learning (ML) and deep learning (DL) experiments. Among them, the ML model with the 3-gram of selected five tokens and the DL model with experiments based on the AST 3-gram deliver the best performance.

Robust Deep Learning-Based Profiling Side-Channel Analysis for Jitter (지터에 강건한 딥러닝 기반 프로파일링 부채널 분석 방안)

  • Kim, Ju-Hwan;Woo, Ji-Eun;Park, So-Yeon;Kim, Soo-Jin;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1271-1278
    • /
    • 2020
  • Deep learning-based profiling side-channel analysis is a powerful analysis method that utilizes the neural network to profile the relationship between the side-channel information and the intermediate value. Since the neural network interprets each point of the signal in a different dimension, jitter makes it much hard that the neural network with dimension-wise weights learns the relationship. This paper shows that replacing the fully-connected layer of the traditional CNN (Convolutional Neural Network) with global average pooling (GAP) allows us to design the inherently robust neural network inherently for jitter. We experimented with the ChipWhisperer-Lite board to demonstrate the proposed method: as a result, the validation accuracy of the CNN with a fully-connected layer was only up to 1.4%; contrastively, the validation accuracy of the CNN with GAP was very high at up to 41.7%.

A Study on Blockchain-Based Asynchronous Federated Learning Framework

  • Qian, Zhuohao;Latt, Cho Nwe Zin;Kang, Sung-Won;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2022.05a
    • /
    • pp.272-275
    • /
    • 2022
  • The federated learning can be utilized in conjunction with the blockchain technology to provide good privacy protection and reward distribution mechanism in the field of intelligent IOT in edge computing scenarios. Nonetheless, the synchronous federated learning ignores the waiting delay due to the heterogeneity of edge devices (different computing power, communication bandwidth, and dataset size). Moreover, the potential of smart contracts was not fully explored to do some flexible design. This paper investigates the fusion application based on the FLchain, which is the combination of asynchronous federated learning and blockchain, discusses the communication optimization, and explores the feasible design of smart contract to solve some problems.

A Qualitative Study of Saudi Female Programming Lecturers' Attitudes towards Mobile Learning and Teaching Approaches

  • Alanazi, Afrah;Li, Alice;Soh, Ben
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.208-216
    • /
    • 2022
  • In Saudi Arabia, female students tend to struggle with the basics of computer programming, especially coding. To better understand why female students sometimes perform poorly in this discipline, this qualitative study aims to obtain the views of female computer programming teachers at a Saudi university on using mobile learning (m-learning) methods in computer programming lectures. Ten teachers from the all-female Aljouf University were interviewed to assess their perceptions of m-learning, in particular, the usefulness of ViLLE visualisation software. Data were analysed using thematic analysis. Most interview responses about m-learning and ViLLE were positive, although there were some notable negative responses. The Saudi culture-related responses were evenly divided between positive and negative, reflecting the culture's limitations.

Performance Improvement of Fuzzy C-Means Clustering Algorithm by Optimized Early Stopping for Inhomogeneous Datasets

  • Chae-Rim Han;Sun-Jin Lee;Il-Gu Lee
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.3
    • /
    • pp.198-207
    • /
    • 2023
  • Responding to changes in artificial intelligence models and the data environment is crucial for increasing data-learning accuracy and inference stability of industrial applications. A learning model that is overfitted to specific training data leads to poor learning performance and a deterioration in flexibility. Therefore, an early stopping technique is used to stop learning at an appropriate time. However, this technique does not consider the homogeneity and independence of the data collected by heterogeneous nodes in a differential network environment, thus resulting in low learning accuracy and degradation of system performance. In this study, the generalization performance of neural networks is maximized, whereas the effect of the homogeneity of datasets is minimized by achieving an accuracy of 99.7%. This corresponds to a decrease in delay time by a factor of 2.33 and improvement in performance by a factor of 2.5 compared with the conventional method.

Time Series Crime Prediction Using a Federated Machine Learning Model

  • Salam, Mustafa Abdul;Taha, Sanaa;Ramadan, Mohamed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.119-130
    • /
    • 2022
  • Crime is a common social problem that affects the quality of life. As the number of crimes increases, it is necessary to build a model to predict the number of crimes that may occur in a given period, identify the characteristics of a person who may commit a particular crime, and identify places where a particular crime may occur. Data privacy is the main challenge that organizations face when building this type of predictive models. Federated learning (FL) is a promising approach that overcomes data security and privacy challenges, as it enables organizations to build a machine learning model based on distributed datasets without sharing raw data or violating data privacy. In this paper, a federated long short- term memory (LSTM) model is proposed and compared with a traditional LSTM model. Proposed model is developed using TensorFlow Federated (TFF) and the Keras API to predict the number of crimes. The proposed model is applied on the Boston crime dataset. The proposed model's parameters are fine tuned to obtain minimum loss and maximum accuracy. The proposed federated LSTM model is compared with the traditional LSTM model and found that the federated LSTM model achieved lower loss, better accuracy, and higher training time than the traditional LSTM model.

Optimization of Cyber-Attack Detection Using the Deep Learning Network

  • Duong, Lai Van
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.159-168
    • /
    • 2021
  • Detecting cyber-attacks using machine learning or deep learning is being studied and applied widely in network intrusion detection systems. We noticed that the application of deep learning algorithms yielded many good results. However, because each deep learning model has different architecture and characteristics with certain advantages and disadvantages, so those deep learning models are only suitable for specific datasets or features. In this paper, in order to optimize the process of detecting cyber-attacks, we propose the idea of building a new deep learning network model based on the association and combination of individual deep learning models. In particular, based on the architecture of 2 deep learning models: Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM), we combine them into a combined deep learning network for detecting cyber-attacks based on network traffic. The experimental results in Section IV.D have demonstrated that our proposal using the CNN-LSTM deep learning model for detecting cyber-attacks based on network traffic is completely correct because the results of this model are much better than some individual deep learning models on all measures.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

A Study of Machine Learning based Hardware Trojans Detection Mechanisms for FPGAs (FPGA의 Hardware Trojan 대응을 위한 기계학습 기반 탐지 기술 연구)

  • Jang, Jaedong;Cho, Mingi;Seo, Yezee;Jeong, Seyeon;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.109-119
    • /
    • 2020
  • The FPGAs are semiconductors that can be redesigned after initial fabrication. It is used in various embedded systems such as signal processing, automotive industry, defense and military systems. However, as the complexity of hardware design increases and the design and manufacturing process globalizes, there is a growing concern about hardware trojan inserted into hardware. Many detection methods have been proposed to mitigate this threat. However, existing methods are mostly targeted at IC chips, therefore it is difficult to apply to FPGAs that have different components from IC chips, and there are few detection studies targeting FPGA chips. In this paper, we propose a method to detect hardware trojan by learning the static features of hardware trojan in LUT-level netlist of FPGA using machine learning.