[PDF] Advanced Sciences and Technologies for Security Applications





Previous PDF Next PDF



Frontiers of Advanced Sciences and Technologies: Results

Frontiers of Advanced Sciences and Technologies: Results. Challenges and Perspectives. Engineered Science. This volume aims to provide an advanced forum 



Advanced Sciences and Technologies LLC

Advanced Sciences and Technologies LLC. AUTHORIZED FEDERAL SUPPLY SERVICE. PROFESSIONAL ENGINEERING SERVICES SCHEDULE PRICELIST. SPECIAL ITEM NO.



Frontiers of Advanced Sciences and Technologies: Results

Frontiers of Advanced Sciences and Technologies: Results understanding and interpretation of the science



Advanced Sciences and Technologies for Security Applications

Advanced Sciences and Technologies for Security Applications. Series editor. Anthony J. Masys University of Leicester



Advanced Sciences and Technologies for Security Applications

Advanced Sciences and Technologies for Security Applications. Series Editor. Anthony J. Masys Associate Professor



Advanced Sciences and Technologies for Security Applications

Advanced Sciences and Technologies for Security Applications. Series Editor. Anthony J. Masys Associate Professor



Risk identification for the introduction of advanced science and

The hydrogen energy system (HES) is one of the technologies expected to be introduced for environmental benefit and energy efficiency. This advanced science 



Babak Akhgar Andrew Staniforth David Waddington Editors

Advanced Sciences and Technologies for Security Applications Communications Technologies Emerging Trends in ICT Security (with Hamid.



Applications Systems and Methods in Smart Home Technology: A

International Journal of Advanced Science and Technology. Vol. 15 February



1 ISSN: 2617-2070 (Print) ; 2617-2070 (Online) Journal of Advanced

Journal of Advanced Sciences and Engineering Technologies available online at: http://www.jaset.isnra.org. Aziz I. Abdulla2. Ammar S. Khazaal3.

Advanced Sciences and Technologies

for Security Applications

Series Editor

Anthony J. Masys, Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida,

Tampa, USA

Advisory Editors

Gisela Bichler, California State University, San Bernardino, CA, USA Thirimachos Bourlai, Lane Department of Computer Science and Electrical Engineering, Multispectral Imagery Lab (MILab), West Virginia University,

Morgantown, WV, USA

Chris Johnson, University of Glasgow, Glasgow, UK

Panagiotis Karampelas, Hellenic Air Force Academy, Attica, Greece Christian Leuprecht, Royal Military College of Canada, Kingston, ON, Canada Edward C. Morse, University of California, Berkeley, CA, USA David Skillicorn, Queen"s University, Kingston, ON, Canada Yoshiki Yamagata, National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan

Indexed by SCOPUS

The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domain-specific topics pertaining to security. Publications within the series are peer-reviewed monographs and edited works in the areas of: - biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) - crisis and disaster management - terrorism - cyber security and secure information systems (e.g., encryption, optical and photonic systems) - traditional and non-traditional security - energy, food and resource security - economic security and securitization (including associated infrastructures) - transnational crime - human security and health security - social, political and psychological aspects of security - recognition and identification (e.g., optical imaging, biometrics, authentication and verification) - smart surveillance systems - applications of theoretical frameworks and methodologies (e.g., grounded the- ory, complexity, network sciences, modelling and simulation) Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place. The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to the

Editor-in-Chief or one of the Editors.

More information about this series athttp://www.springer.com/series/5540

Hamid Jahankhani·Arshad Jamal·Shaun Lawson

Editors

Cybersecurity, Privacy

and Freedom Protection in the Connected World

Proceedings of the 13th International

Conference on Global Security, Safety

and Sustainability, London, January 2021

Editors

Hamid Jahankhani

London Campus

Northumbria University

London, UK

Shaun Lawson

Department of Computer and Information

Sciences

Northumbria University

Newcastle upon Tyne, UKArshad Jamal

Northumbria University

London, UK

ISSN 1613-5113 ISSN 2363-9466 (electronic)

Advanced Sciences and Technologies for Security Applications ISBN 978-3-030-68533-1 ISBN 978-3-030-68534-8 (eBook) © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature

Switzerland AG 2021

This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether

the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse

of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and

transmission or information storage and retrieval, electronic adaptation, computer software, or by similar

or dissimilar methodology now known or hereafter developed.

does not imply, even in the absence of a specific statement, that such names are exempt from the relevant

protective laws and regulations and therefore free for general use.

The publisher, the authors and the editors are safe to assume that the advice and information in this book

are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or

the editors give a warranty, expressed or implied, with respect to the material contained herein or for any

errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional

claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Committee

General Chair:

Prof. Hamid Jahankhani, UK

hamid.jahankhani@northumbria.ac.uk

Steering Committee

Prof. Babak Akhgar, Director of CENTRIC, Sheffield Hallam University, UK

Prof. Giovanni Bottazzi, Luiss University, Italy

Dr. Brij Bhooshan Gupta, National Institute of Technology Kurukshetra, India

Mrs. Sukhvinder Hara, Middlesex University, UK

Prof. Ali Hessami, Director Vega Systems, UK

Dr. Amin Hosseinian-Far, University of Northampton, UK Dr. Nilakshi Jain, Shah and Anchor Kutchhi Engineering College, Mumbai, India Dr. Arshad Jamal, QAHE and Northumbria University London, UK

Prof. Gianluigi Me, Luiss University, Italy

Dr. John McCarthy, Director, Oxford Systems, UK

Dr. Ian Mitchell, Middlesex University, UK

Dr. Reza Montasari, University of Huddersfield, UK Dr. Sina Pournouri, Sheffield Hallam University, UK Prof. Bobby Tait, University of South Africa, South Africa Prof. Willy Susilo, Director—Institute of Cybersecurity and Cryptology, Univer- sity of Wollongong, Australia Dr. Guomin Yang, University of Wollongong, Australia

Prof. Shaun Lawson, Northumbria University, UK

Dr. Neil Eliot, Northumbria University, UK

Kudrat-E-Khuda (Babu), Department of Law, Daffodil International University,

Bangladesh

Prof. Sergio Tenreiro de Magalhaes, Chair of Cyber Security, Champlain College

Online, USA

v viCommittee

Programme Committee

Dr. Fiona Carroll, Cardiff Metropolitan University, UK Dr. Christos Douligeris, University of Piraeus, Greece Dr. Omar S. Arabiat, Balqa Applied University, Jordan Mr. Konstantinos Kardaras, Technical Consultant, Greece Dr. Chafika Benzaid, Computer Security Division, CERIST, University of Sciences and Technology Houari Boumediene, Algeria Prof. Bobby Tait, University of South Africa, South Africa

Dr. Fouad Khelifi, Northumbria University, UK

Dr. Kenneth Revett, University of Maryland College Park, Massachusetts, USA Dr. Ken Dick, Nebraska University Centre for Information Assurance, USA Dr. Elias Pimenidis, University of West of England, UK Prof. Henrique M. D. Santos, University of Minho, Portugal Prof. Alexander Sideridis, Agricultural University of Athens, Greece Mr. Ray Brown, QAHE and Northumbria University, UK Prof. Murdoch Watney, University of Johannesburg, South Africa Dr. Mamoun Alazab, Macquarie University, Australia Dr. Gregory Epiphaniou, Commercial Director, Wolverhampton Cyber Research

Institute (WCRI), University of Wolverhampton, UK

sity of Wolverhampton, UK

Dr. Carlisle George, Middlesex University, UK

Prof. Gianluigi Me, University of Rome LUISS “Guido Carli", Italy Prof. Antonio Mauro, Head of Security and Compliance Assurance, Octo

Telematics S.p.A., Italy

Dr. John McCarthy, Director, Oxford Systems, UK

Dr. Ameer Al-Nemrat, University of East London, UK

Mrs. Sukhvinder Hara, Middlesex University, UK

Dr. Ian Mitchell, Middlesex University, UK

Prof. Ahmed Bouridane, Northumbria University, UK

Dr. Amin Hosseinian-Far, University of Northampton, UK Dr. Reza Montasari, Birmingham City University, UK Mr. Ayman El Hajjar, QAHE and Northumbria University, UK

Dr. George Weir, University of Strathclyde, UK

Dr. Sufian Yousef, Anglia Ruskin University, UK

Dr. Alireza Daneshkhah, Coventry University, UK

Dr. Maryam Farsi, Cranfield University, UK

Mr. Usman Javed Butt, QAHE and Northumbria University, UK Asim Majeed, QAHE and University of Roehampton, UK Dr. Rose Fong, QAHE and Northumbria University London, UK Dr. Athar Nouman, QAHE and Northumbria University London, UK Mr. Umair B. Chaudhry, Queen Mary College, University of London, UK

Mr. Nishan Chelvachandran, Cyberreu, Finland

Mr. Stefan Kendzierskyj, Cyfortis, UK

13th International Conference on Security,

Safety and Sustainability, ICGS3-21

Cybersecurity Privacy and Freedom Protection

in the Connected World 14th and 15th January 21

About the Conference

Following the successful 12th ICGS3, we have much pleasure in announcing the

13th International Conference on Global Security, Safety & Sustainability.

Year 2020 will be remembered as a year of COVID-19 pandemic year with a profound impact on our lives and challenging times for governments around the world with technology as a backbone of tools to assist us to work remotely while in self-isolation and in total lockdown. Every individual and organisation are faced with the challenges of the adoption of technological change and understand that nothing will be the same for some time after and even when normality resumes. AI, blockchain, machine learning, IoT, IoMT, IIoT all are tested and applied at a very rapid turnaround as we go through the pandemic day after day. However, all these transformations can bring many associated risks regarding data, such as privacy, transparency, exploitation and ownership. Since the COVID-19 pandemic in January 2020, governments and organisations; small or large have seen an increase in cyber-attacks. Hackers, through recon- naissance and some network intrusions, targeting nation states medical research facilities, healthcare organisations conducting research into the virus, financial sectors and so on. Early in April 2020, the UK and the US security agencies sound COVID-19 threat alert “...Cybersecurity Infrastructure and Security Agency issued a joint warning that hacking groups associated with nation-state governments are exploiting the COVID-19 pandemic as part of their cyber operations...". The advancement of Artificial Intelligence (AI), coupled with the prolificacy of The expansion of Big Data and volumetric metadata generated and collated by these mechanisms not only give greater depth of understanding but as change is coming at an unprecedented pace COVID-19 driving the cultural changes and the public sector innovations to a new height of responsibilities. vii viii 13th International Conference on Security, Safety and Sustainability, ... Further development and analysis of defence tactics and countermeasures are needed fast to understand security vulnerabilities which will be exploited by the cybercriminals by identifying newer technologies that can aid in protecting and securing data with a range of supporting processes to provide a higher level of cyber resilience. The ethical implications of connecting the physical and digital worlds, and presenting the reality of a truly interconnected society, presents the realisation of the concept of smart societies in reality. safety and sustainability issues can be examined from several global perspectives through dialogue between academics, students, government representatives, chief executives, security professionals and research scientists from the United Kingdom and from around the globe. The TWO-day Virtual conference will focus on the challenges of complexity, the rapid pace of change and risk/opportunity issues associated with the twenty-first- century lifestyle, systems and infrastructures.

Prof. Hamid Jahankhani

General Chair of the ConferenceOctober 2020

Contents

Artificial Intelligence and the International Information and Psychological Security......................................... 1

Konstantin A. Pantserev and Konstantin A. Golubev

Blockchain Medicine Administration Records (BMAR): Reflections and Modelling Blockchain with UML..................... 9

Ian Mitchell

An Investigation into an Approach to Updating the Governance of Satellite Communications to Enhance Cyber Security.............. 23

Lesley-Anne Turner and Hamid Jahankhani

Enhancing Smart Home Threat Detection with Artificial Intelligence....................................................... 35 Jaime Ibarra, Usman Javed Butt, Ahmed Bouridane, Neil Eliot, and Hamid Jahankhani Cybercrime Predicting in the Light of Police Statistics................ 55

Jerzy Kosi´nski and Grzegorz Krasnod˛ebski

Prediction of Cyber Attacks During Coronavirus Pandemic by Classification Techniques and Open Source Intelligence............ 67

Shannon Wass, Sina Pournouri, and Gregg Ibbotson

Missed Opportunities in Digital Investigation........................ 101

Pat Thompson and Mark Manning

Cyber-Disability Hate Cases in the UK: The Documentation by the Police and Potential Barriers to Reporting..................... 123 Zhraa A. Alhaboby, Haider M. Al-Khateeb, James Barnes, Hamid Jahankhani, Melanie Pitchford, Liesl Conradie, and Emma Short Smart Secure USB SSU-256........................................ 135 Muhammad Ehsan ul Haq, Zeeshan Ali, Muhammad Taimoor Ali,

Ruqiya Fazal, Waseem Iqbal, and Mehreen Afzal

ix xContents The Application of Technology in Combating Human Trafficking...... 149

Reza Montasari and Hamid Jahankhani

Countering Adversarial Inference Evasion Attacks Towards ML-Based Smart Lock in Cyber-Physical System Context............. 157 Software License Audit and Security Implications.................... 171

Wee Kiat Yang, Amin Hosseinian-Far, Luai Jraisat,

and Easwaramoorthy Rangaswamy The Deployment of Autonomous Drones During the COVID-19 Pandemic......................................................... 183 Usman Javed Butt, William Richardson, Maysam Abbod,

Haiiel-Marie Agbo, and Caleb Eghan

Effective Splicing Localization Based on Image Local Statistics........ 221

P. N. R. L. Chandra Sekhar and T. N. Shankar

Applying Big Data Analytics in DDos Forensics: Challenges and Opportunities................................................. 235 Augusto Gonzaga Sarmento, Kheng Cher Yeo, Sami Azam, Asif Karim, Abdullah Al Mamun, and Bharanidharan Shanmugam Cyber Security in the Global Village and Challenges for Bangladesh: An Overview on Legal Context...................... 253

Kudrat-E-Khuda (Babu)

Reasons Behind Poor Cybersecurity Readiness of Singapore's Small Organizations: Reveal by Case Studies......................... 269 Nam Chie Sia, Amin Hosseinian-Far, and Teoh Teik Toe Cloud and Its Security Impacts on Managing a Workforce Remotely: A Reflection to Cover Remote Working Challenges......... 285 Usman Javed Butt, William Richardson, Athar Nouman,

Haiiel-Marie Agbo, Caleb Eghan, and Faisal Hashmi

The Magic Quadrant: Assessing Ethical Maturity for Artificial Intelligence....................................................... 313 Andi Zhobe, Hamid Jahankhani, Rose Fong, Paul Elevique, and Hassan Baajour A Systematic Literature Review of the Role of Ethics in Big Data...... 327

Jade Roche and Arshad Jamal

Transforming Higher Education Systems Architectures Through Adoption of Secure Overlay Blockchain Technologies................. 343

Foysal Miah, Samuel Onalo, and Eckhard Pfluegel

Centralised IT Structure and Cyber Risk Management............... 357 Kamran Abbasi, Nick Petford, and Amin Hosseinian-Far

Contentsxi

Blockchain and Artificial Intelligence Managing a Secure and Sustainable Supply Chain...................................... 367 Elias Pimenidis, John Patsavellas, and Michael Tonkin Does the GDPR Protect UK Consumers from Third Parties Processing Their Personal Data for Secondary Purposes? A Systematic Literature Review..................................... 379

David Sinclair and Arshad Jamal

Identification of Critical Business Processes: A Proposed Novel Approach......................................................... 395 Yousuf Alblooshi, Amin Hosseinian-Far, and Dilshad Sarwar A Critical Overview of Food Supply Chain Risk Management......... 413 Maryam Azizsafaei, Dilshad Sarwar, Liam Fassam, Rasoul Khandan, and Amin Hosseinian-Far Knowledge Sharing and Internal Social Marketing in Improving Cyber Security Practice............................................ 431 Hiep Cong Pham, Mathews Nkhoma, and Minh Nhat Nguyen

Transformation of Cybersecurity Posture in IT

Telecommunication: A Case Study of a Telecom Operator............. 441 Ahmed Adel, Dilshad Sarwar, and Amin Hosseinian-Far Cloud Computing Security Challenges: A Review.................... 459 Iqra Kanwal, Hina Shafi, Shahzad Memon, and Mahmood Hussain Shahquotesdbs_dbs48.pdfusesText_48
[PDF] advances in health sciences education

[PDF] advantages and disadvantages of e-commerce pdf

[PDF] adventure in english unit 7

[PDF] advertising esl lesson plan

[PDF] advertising lesson plans

[PDF] aec financé par emploi quebec

[PDF] aefe amerique du nord

[PDF] aeroport casablanca boutiques

[PDF] aeroport casablanca train

[PDF] aeroport mohamed 5 terminal 1

[PDF] aeroport mohamed 5 terminal 2

[PDF] aeroport mohamed 5 terminal 3

[PDF] aes clermont ferrand

[PDF] aesh 2017 macron

[PDF] aesh 2017 salaire