Papers by International Journal of Security, Privacy and Trust Management (IJSPTM)
The quick development of generative AI technology has brought about revolutionary new possibiliti... more The quick development of generative AI technology has brought about revolutionary new possibilities for decision-making, design, and content production. But these developments have also raised serious ethical questions, emphasizing the need for an all-encompassing framework to guarantee the security and control of generative AI systems. To address the ethical issues raised by generative AI, this study puts forth a paradigm that centers on the concepts of accountability, transparency, and governance. Strategies for reducing the dangers associated with AI-generated content are provided by this paper through an analysis of the present regulatory frameworks and the identification of gaps. The framework that is being suggested supports a multi-stakeholder approach that incorporates technical, legal, and ethical viewpoints to establish a well-rounded and efficient regulatory framework. The discussion of research directions for the future and the significance of continuing discourse to maintain AI technologies in line with social ideals finishes the article.
Online Social Networks (OSNs) such as Facebook are extremely popular in Bangladesh, not only to t... more Online Social Networks (OSNs) such as Facebook are extremely popular in Bangladesh, not only to the younger generations, but also to the people from other age categories as well. However, due to different socio-technological factors, the security and privacy awareness of Bangladeshi Facebook users have remained questionable. This is also evident in the wake of a number of incidents reported while using Facebook, particularly involving women users. There have been a few research studies to investigate different security and privacy concerns of Bangladeshi users. However, none of the existing has is comprehensive enough focusing only on female users. In this paper, we aim to fill in this gap by presenting a study on security and privacy concerns while using different Online Social Networks such as Facebook among female users in Bangladesh. We conducted an online survey of 203 Bangladeshi female Facebook users. We analyzed the survey statistics to study the general trend of behavior, practices, and expectations pertaining to secure Facebook usage and different privacy preferences. The study reveals that female users are concerned about their data privacy, however, 67% participants feel safe and secure while using Facebook and 33% participants do not think that Facebook takes necessary steps to protect users’ data privacy on the web. We suggest that such a study can help researchers identify the privacy concerns in using social networking sites/apps such as Facebook to focus on building secure and privacy-friendly technologies to protect users from online crimes and harassment in developing countries.
Genomes are main reason for growth and surface differences in the plants. All plants grow on basi... more Genomes are main reason for growth and surface differences in the plants. All plants grow on basis of their different surrounding like soil, water, breed of seed, and climatic session. This paper attempts to find stem growth from birth to maturity level of selected plant using image processing technique. Few reasons have been observed commonly by the researchers that some plants could not grow sufficiently as to the other plants of similar breed and age. Images were taken of different stage of bean plant and images of some other plant samples were also included for better assessment. Researchers are trying to understand through their calculative analysis by image processing emulator in MATLAB to view its reasons.Suitable comparison technique is applied to detect their period of growth. Image processing methods like Restoration, stem or leaves spots, filtering, and plant comparison have applied in MATLAB.Those effects that are not supporting to grow the plants of their similar age group are matter to calculate scientifically later in the future. The observation would help for further support in medicinal science or agriculturalscience of plant and Bio-chemical.
Multi-agent systems have evolved with their application framework, analysis approaches and design... more Multi-agent systems have evolved with their application framework, analysis approaches and design complexities over the past few decades. In order for programming software agents, you need to handle analysis, design and implementation together; furthermore, privacy and trust should be integrated externally into the agent-oriented applications. Current frameworks do not consider privacy, trust, and data integrity in agent applications. In this study, we propose a domain-specific language that can be used for agent behaviors that consist of roles, organizational entity, goals through annotation processing with templates. Smart contracts can be generated to decrease the time for deployment and development stages. Templates and annotations are popular techniques to reduce boilerplate codebases from agent-oriented programming. These techniques can also be used for model-driven software engineering. This study will take the software agent development as a whole with analysis, design, and development with embedded domain-specific language development in terms of smart contract applications. Furthermore, we would like to refer to methodology, results of the research, and case study to enlighten readers in a better way. Finally, we summarize findings and highlight the main research points by inferencing in the conclusion section.
11th International Conference on Computer Science and Engineering (CSEN 2024) will provide an ex... more 11th International Conference on Computer Science and Engineering (CSEN 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computing. The goal of this conference is to bring together researchers and
practitioners from academia and industry to focus on Computer science & Computer Engineering advancements and establishing new collaborations in these areas. Original research papers, state of-the-art reviews are invited for publication in all areas of Computer Science & Computer Engineering.
Lots of safety vulnerabilities have been harming software and hardware. Grey box fuzzer is one of... more Lots of safety vulnerabilities have been harming software and hardware. Grey box fuzzer is one of the most successful methods for automatic vulnerability detection. Most research focus on using fuzzer for SW quality check only. This paper introduced how to leverage fuzzer to exposure security gap as early as possible. Conventional Grey box Fuzzers like AFL can open perform fuzzing against the whole input and spend more time on smaller seeds with lower execution time, which significantly impact fuzzing efficiency for complicated input types. In this work, we introduce one intelligent grey box fuzzing for Intel Media driver, MediaFuzzer, which can perform effective fuzzing based on selective fields of complicated input. Also, with one novel calling depth-based power schedule biased toward seed corpus which can lead to deeper calling chain, it dramatically improves the vulnerability exposures (~6.6 times more issuesexposed) and fuzzing efficiency (~2.7 times more efficient) against the baseline AFL for Intel media driver with almost negligible overhead.
IJSPTM, 2022
The reformulated paper after the proceeding of the NCWMC 2022 recovers some previous manuscripts ... more The reformulated paper after the proceeding of the NCWMC 2022 recovers some previous manuscripts intercepted by the PLA of PRC for covert military operations with intrusions in global investment and financial systems. The crimes are analytically conducted through cloud servers and I/O for intelligence gathering. The information contained in the manuscripts with THEIR informatics not only could have led to further economic-financial surrogation of the PLA in American economy with investments, but also threats American national security through ontological calculation frameworks with artificial intelligence and further calculative power assertions - apart from the threats of outer space peace and security. It can be the reason behind the black hole and white hole observational results with the signal-satellite information approach to general relativity manuscripts. A preliminary conception for defense strategy is proposed with previous insights and post facto security breaches to USA Space Command directly and national security conductively.
With the simplicity of transmission of data over the web increasing, there has more prominent nee... more With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
16th International Conference on Wireless & Mobile Network (WiMo 2024) is dedicated to addressing... more 16th International Conference on Wireless & Mobile Network (WiMo 2024) is dedicated to addressing the challenges in the areas of wireless & mobile networks. The Conference looks for significant contributions to the Wireless and Mobile computing in theoretical and practical aspects. The Wireless and Mobile computing domain emerges from the integration among personal computing, networks, communication technologies, cellular technology, and the Internet Technology. The modern applications are emerging in the area of mobile ad hoc networks and sensor networks. This Conference is intended to cover contributions in both the design and analysis in the context of mobile, wireless, ad-hoc, and sensor networks. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced wireless and Mobile computing concepts and establishing new collaborations in these areas.
2nd International Conference on Security & Applications (SECURA 2024) focuses on all technical an... more 2nd International Conference on Security & Applications (SECURA 2024) focuses on all technical and practical aspects of Security and its Applications. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security research trends and applications to establishing new collaborations in these areas.
16th International Conference on Network and Communications Security (NCS 2024) is a shift away f... more 16th International Conference on Network and Communications Security (NCS 2024) is a shift away from the traditional client-server model to systems based on the peer-to peer network, which allows users share resources effectively. Also, due to increase in number of Internet applications & users, the security issues and pivotal challenges include integrity verification, authentication, and access control etc., are also increasing. As a consequence, the subject of security protection in Network & Communication area has attracted intensive research activities in academia and industry. With the recent advances in Communication & network technology, the applications in commercial security scenario become increasing essential.
With the simplicity of transmission of data over the web increasing, there has more prominent nee... more With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Python is used extensively in research, including algorithm testing. Python is a multi-paradigm p... more Python is used extensively in research, including algorithm testing. Python is a multi-paradigm programming language and supports both object-oriented programming and functional programming. In the functional side, it supports both regular functions and generator functions. This study tests both approaches in terms of usability cases and performance. A password-cracking algorithm is used for this tryout.
AIRCC Publishing Corporation, 2023
The Internet of Things (IoT) is a new paradigm for the development of ubiquitous computing, which... more The Internet of Things (IoT) is a new paradigm for the development of ubiquitous computing, which enables the connection of billions of heterogeneous devices with each other and the cloud. IoT is being used in many different applications, from smart homes to big data analytics. However, the IoT infrastructure is vulnerable to security threats, such as data breaches, man-in-the-middle attacks, and malicious actors. Furthermore, energy consumption is an important factor in IoT networks, as many IoT devices are battery-powered and need to conserve energy. Machine learning techniques are being increasingly used to enhance the security and energy efficiency of the IoT network. Machine learning algorithms can be used to detect malicious activities in the network and protect against them. It can also be used to identify anomalies in the network, which can be used to detect potential security threats. Furthermore, machine learning techniques can be used to optimize energy consumption in the network, by predicting energy demands and adjusting the network accordingly.
AIRCC Publishing Corporation, 2023
Knowledge graphs are an innovative paradigm for encoding, accessing, combining, and interpreting ... more Knowledge graphs are an innovative paradigm for encoding, accessing, combining, and interpreting data from heterogeneous and multimodal sources beyond simply a combination of technology. In a shorter time, knowledge graphs have been identified as an important component of modern search engines, intelligent assistants, and corporate intelligence. Geospatial data science, cognitive neuroscience, and machine learning emerge together in geospatial knowledge graphs symbolic of spatiality, attributes, and interactions. These knowledge graphs can be used for many geospatial applications, including geographic information retrieval, geospatial interoperability, and geographic information systems knowledge discovery. Nevertheless, Geospatial Knowledge Graphs rarely reach their maximum potential in geospatial and downstream applications since most conventional data warehouses and system elements in KGs need to account for the specialty of geographical information. A geospatial graph's linear relationship between the measurement and true values cannot effectively represent the bias component of measuring the linearity of GeoKGs. A measurement technique is linear when the relationship between the measurement and true values is a linear data function that can be analytically verified. It is a major variable because it allows data to be linearly extended across points. A linear fit of geographic knowledge graphs characterizes a relationship when the measurement system is linear. When the measurement system is linear, the connection is represented by a polynomial approximation. A linear polynomial approximation is compared with a linear data fitting to evaluate linearity.
Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share informati... more Vehicular Ad Hoc Networks (VANETs) enable road users and public infrastructure to share information that improves the operation of roads and driver experience. However, these are vulnerable to poorly behaved authorized users. Trust management is used to address attacks from authorized users in accordance with their trust score. By removing the dissemination of trust metrics in the validation process, communication overhead and response time are lowered. In this paper, we propose a new Tamper-Proof Device (TPD) based trust management framework for controlling trust at the sender side vehicle that regulates driver behaviour. Moreover, the dissemination of feedback is only required when there is conflicting information in the VANET. If a conflict arises, the RoadSide Unit (RSU) decides, using the weighted voting system, whether the originator is to be believed, or not. The framework is evaluated against a centralized reputation approach and the results demonstrate that it outperforms the latter.
A pair of attacks on energy sector assets offers a unique opportunity to better understand the di... more A pair of attacks on energy sector assets offers a unique opportunity to better understand the differences in impact from cyber and kinetic warfare. A review of the 2021 cyber attack on Colonial Pipeline and the missile strike on the Syvash wind farm demonstrates the principle of reversibility in action, particularly in regard to the short-lived nature of cyber attacks. Within the context of security and strategy, particularly at the cyber/energy security nexus, this means that traditional state security thinking needs to evolve to address threats in the cyber domain rather than try to retrofit dated strategies. The two cases compared offer lessons that can be applied more broadly in the formation of state-level cyber and energy strategic thinking, ultimately improving resilience and the appropriateness of protection.
With the simplicity of transmission of data over the web increasing, there has more prominent nee... more With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
The reformulated paper after the proceeding of the NCWMC 2022 recovers some previous manuscripts ... more The reformulated paper after the proceeding of the NCWMC 2022 recovers some previous manuscripts intercepted by the PLA of PRC for covert military operations with intrusions in global investment and financial systems. The crimes are analytically conducted through cloud servers and I/O for intelligence gathering. The information contained in the manuscripts with THEIR informatics not only could have led to further economic-financial surrogation of the PLA in American economy with investments, but also threats American national security through ontological calculation frameworks with artificial intelligence and further calculative power assertions - apart from the threats of outer space peace and security. It can be the reason behind the black hole and white hole observational results with the signal-satelliteinformation approach to general relativity manuscripts. A preliminary conception for defense strategy is proposed with previous insights and post facto security breaches to USA Space Command directly and national security conductively.
Uploads
Papers by International Journal of Security, Privacy and Trust Management (IJSPTM)
practitioners from academia and industry to focus on Computer science & Computer Engineering advancements and establishing new collaborations in these areas. Original research papers, state of-the-art reviews are invited for publication in all areas of Computer Science & Computer Engineering.
practitioners from academia and industry to focus on Computer science & Computer Engineering advancements and establishing new collaborations in these areas. Original research papers, state of-the-art reviews are invited for publication in all areas of Computer Science & Computer Engineering.
Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs
application of the proposed method has also been presented.
Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The
goal of this journal is to bring together researchers and practitioners from academia and industry to focus
on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in Wireless and
Mobile Networks.