Journal of Surveillance, Security and Safety

Web Name: Journal of Surveillance, Security and Safety

WebSite: http://www.jsssjournal.com

ID:304975

Keywords:

Surveillance,of,Journal,Safety

Description:


jsss Search OAE Journals Journal of Surveillance, Security and Safety

Hot Keywords
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols

Quick Search
Crime prevention and control DNS Big data analytics Organisational learning Resilience properties NFC Cryptographic protocols
Latest Issues
Volume 3, Issue 1 Volume 2, Issue 4 Volume 2, Issue 3 Volume 2, Issue 2 Volume 2, Issue 1 Volume 1, Issue 2 Volume 1, Issue 1

A data-centric approach to the study of system-level prognostics for cyber physical systems: application to safe UAV operations

Timothy Darrah,...Christopher Teubert Original Article|Published on:30 Jun 2022

Android App Antiforensics

Alberto Ceballos Delgado,Bing Zhou Original Article|Published on:29 Mar 2022 Submit a ManuscriptSign InRegister

Subscribe

To receive email updates about the journal, please subscribe here.

Aims and ScopeEditorial BoardEditorial PoliciesAuthor InstructionsAPC Editorial Process Manuscript Templates Contact Us Tweets by @JSSSJournal
Articles

A comparison study to detect seam carving forgery in JPEG images with deep learning models

Abstract Aim: Although deep learning has been applied in image forgery detection, to our knowledge, it Aim: Although deep learning has been applied in image forgery detection, to our knowledge, it ... MORE Aim: Although deep learning has been applied in image forgery detection, to our knowledge, it still falls short of a comprehensive comparison study in detecting seam-carving images in multimedia forensics by comparing the popular deep learning models, which is addressed in this study.Methods: To investigate the performance in detecting seam-carving-based image forgery with popular deep learning models that were used in image forensics, we compared nine different deep learning models in detecting untouched JPEG images, seam-insertion images, and seam removal images (three-class classification), and in distinguishing modified seam-carving images from untouched JPEG images (binary classification). We also investigate the different learning algorithms with the Efficientnet-B5 in adjusting the learning rate with three popular optimizers in deep learning.Results: Our study shows that EfficientNet performs the best among the nine different deep learning frameworks, followed by SRnet, and LFnet. Different algorithms for adjusting the learning rate result in different detection testing accuracy with Efficientnet-B5. In our experiments, decouples the optimal choice of weight decay factor from the setting of the learning rate (AdamW) is generally superior to Adaptive Moment Estimation (Adam) and Stochastic Gradient Descent (SGD). Our study also indicates that deep learning is very promising for image forensics, such as the detection of image forgery.Conclusion: Deep learning is very promising in image forensics that is hardly discernable to human perceptions, but the performance varies over different learning models and frameworks. In addition to the models, the optimizer has a considerable impact on the final detection performance. We would recommend EfficientNet, LFnet and SRnet for seam-carving detection. LESS Full article Naciye Hafsa Celebi,...Qingzhong Liu Original Article|Published on:24 Aug 2022

A data-centric approach to the study of system-level prognostics for cyber physical systems: application to safe UAV operations

Abstract Maintaining safe operations in cyber physical systems is a complex task that must account for Maintaining safe operations in cyber physical systems is a complex task that must account for ... MORE Maintaining safe operations in cyber physical systems is a complex task that must account for system degradation over time, since unexpected failures can result in the loss of life and property. Operational failures may be attributed to component degradation and disturbances in the environment that adversely impact system performance. Components in a CPS typically degrade at different rates, and, therefore, require continual monitoring to avoid unexpected failures. Moreover, the effects of multiple degrading components on system performance may be hard to predict. Developing and maintaining accurate physics-based system models can be expensive. Typically, it is infeasible to run a true system to failure, so researchers and practitioners have resorted to using data-driven techniques to better evaluate the effect of degrading components on overall system performance. However, sufficiently organized datasets of system operation are not readily available; the output of existing simulations is not organized to facilitate the use of data-driven machine learning techniques for prognostics. As a step toward addressing this problem, in this paper, we develop a data management framework and an end-to-end simulation testbed to generate such data. The framework facilitates the development and comparison of various system-level prognostics algorithms. We adopt a standard data-centered design methodology, combined with a model based engineering approach, to create a data management framework that address data integrity problems and facilitates the generation of reproducible results. We present an ontological design methodology centered around assets, processes, and data, and, as a proof of concept, develop an unmanned aerial vehicle (UAV) system operations database that captures operational data for UAVs with multiple degrading components operating in uncertain environments.Aim: The purpose of this work is to provide a systematic approach to data generation, curation, and storage that supports studies in fault management and system-level prognostics for real-world and simulated operations. We use a data-driven simulation-based approach to enable reliable and reproducible studies in system-level prognostics. This is accomplished with a data management methodology that enforces constraints on data types and interfaces, and decouples various parts of the simulation to enable proper links with related metadata. The goal is to provide a framework that facilitates data analysis and the development of data-driven models for prognostics using machine learning methods. We discuss the importance of systematic data management framework to support data generation with a simulation environment that generates operational data. We describe a standard framework for data management in the context of run-to-failure simulations, and develop a database schema and an API in MATLAB® and Python to support system-level prognostics analyses.Methods: A systematic approach to defining a data management framework for the study of prognostics applications is a central piece of this work. A second important contribution is the design of a Monte Carlo simulation environment to generate run to failure data for CPS with multiple degrading components. We adopt a bottom-up approach, starting with requirements and specifications, then move into functionality and constraints. With this framework, we use a Monte-Carlo simulation approach to generate data for developing and testing a variety of system-level prognostics algorithms.Results: We have developed a data management framework that can handle high dimensional and complex data generated from real or simulated systems for the study of prognostics. In this paper, we show the advantages of a well-organized data management framework for tracking high-fidelity data with high confidence for complex, dynamic CPS. Such frameworks impose data logging discipline and facilitate downstream uses for developing and comparing different data-driven monitoring, diagnostics, and system-level prognostics algorithms.Conclusions: In this paper, we demonstrate the design, development, and use of an asset, process, and data management framework for the research to develop prognostics & health management applications. This work helps fill a gap for system-level remaining useful life studies by providing a comprehensive simulation environment that can generate run to failure data, and a data management architecture that addresses the needs for system-level prognostics research. The framework is demonstrated with a Monte-Carlo simulation of a UAV system that operates multiple flights under different environmental conditions and degradation sources. This architecture for data management will enable researchers to conduct more complex experiments for a variety of cyber physical systems applications. LESS Full article Timothy Darrah,...Christopher Teubert Original Article|Published on:30 Jun 2022

Advanced fault-tolerant visual multi-secret sharing scheme

Abstract Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called ... MORE Aim: In visual cryptography, a secret image is encrypted into two meaningless random images called shares. These two shares can be stacked to recover the secret image without any calculations. However, because of the alignment problem in the decryption phase, risk of poor quality of the restored image exists. Encrypting multiple secrets on two images simultaneously can improve execution efficiency.Methods: Let 7 × 7 pixels be a unit; this paper designs a codebook for any unit in the secret images by using a random grid. Besides, this paper shows a general shifting approach that can embed N (≥ 2) secret images simultaneously with adjustable distortion.Results: This paper provides a visual multi-secret sharing scheme without pixel expansion; the proposed scheme can encrypt more than two secret images into two shares simultaneously. During decoding, aligning the shares precisely is not necessary.Conclusion: Theoretical analysis and simulation results indicate the effectiveness and practicality of the proposed scheme. LESS Full article Justie Su-Tzu Juan,...Yu-Chun Chung Original Article|Published on:20 May 2022

Aviation attacks based on ILS and VOR vulnerabilities

Abstract Aim: As the aviation industry grows more digital and reliant on wireless technology, it Aim: As the aviation industry grows more digital and reliant on wireless technology, it ... MORE Aim: As the aviation industry grows more digital and reliant on wireless technology, it has grown more appealing to cyber criminals, including nation-state actors and terrorists. Vulnerabilities in a wide range of networked devices and (sub)systems, as well as their implementations and design defects, can be used to carry out malicious operations. The purpose of this study is to provide a comprehensive survey threats on aviation communication models. Methods: We describe an overview of aviation threat model and attacks. A detailed taxonomy predicated on security vulnerability is presented. Further, this paper discusses the research aspects and challenges to be taken care of in aviation security and communication Finally, we conclude with a summary of the current state of threats and their consequences for widely-used aviation models. Results: The main findings of this study is to introduce fundamental security vulnerabilities of aviation model and classify into categories to efficiently analyze them. Vulnerabilities of VOR, ILS systems and their impact are also discussed. Moreover, we describe and assess mitigation systems to defense these attacks. Conclusion: We conclude that the aviation system is still exposed to various attacks. We examine key technological challenges that have been serving as a deterrent to adopting more secure alternative approaches, as well as research avenues where further progress is needed. LESS Full article Gaurav Choudhary,...Shishir Kumar Shandilya Original Article|Published on:30 Apr 2022

Multi-level storage based auditing scheme for 5G and beyond defined edge computing

Abstract Aim: Edge computing has become one of the most essential approaches for processing user-side data Aim: Edge computing has become one of the most essential approaches for processing user-side data ... MORE Aim: Edge computing has become one of the most essential approaches for processing user-side data in the future, thanks to the portability of storage and computing devices. 5G and beyond defined edge computing has become one of the most urgently required technologies. However, there are still several issues that must be resolved. Edge computing's present storage structure is incapable of adapting to new and flexible application scenarios. Simultaneously, data stored on edge devices are more vulnerable to attacks, and the integrity of the data needs to be protected.Method: For 5G and beyond defined edge computing, a novel auditing scheme based on multi-level storage is proposed in this paper. To reduce the response time of data queries, we first present a storage system with neighborhood servers. Then, a scheme for third-party-assisted auditing is described. Users can audit their data using self-defined file names.Results: The scheme is secure and efficient, according to the security analysis and performance simulation. Our scheme cost less computation overhead than the compared related work.Conclusion: The result shows that the novel proposal is efficient for the application in 5G and beyond defined edge computing. LESS Full article Chen Wang,Tianqi Zhou Original Article|Published on:31 Mar 2022

Android App Antiforensics

Abstract Aim: Android is one of the most popular platforms in the market. This popularity has Aim: Android is one of the most popular platforms in the market. This popularity has ... MORE Aim: Android is one of the most popular platforms in the market. This popularity has led the operating system to be a potential tool for criminal activities. Law enforcement has noted this development and started incorporating smartphone evidence into their cases. However, digital evidence is susceptible to data modification, and thus anti-forensic techniques have been developed to counter forensic investigations. This research investigates the possibility of generating false data using automation techniques.Methods: A rooted Android device was acquired. The device screen coordinates were mapped using screenshots and Gimp. The coordinates were used to develop a Python script to automate common user tasks such as making a phone call, sending a text message, or adding a contact. These tasks were performed manually and using the automation script. A system image was acquired of the device before and after data population. The images were analyzed using Autopsy and Cellebrite’s Inspector. The forensic artifacts retrieved were compared between the manual and automatic data population.Results: The artifacts show that the data was added successfully and that forensic tools may not detect that the data was automatically generated.Conclusion: This research shows that it is possible to populate an Android device with false forensic artifacts using automation scripts. Being able to generate forensic artifacts using automation scripts can allow educators to more easily generate datasets to teach forensic techniques. Additionally, it can also be used by malicious actors to generate false forensic artifacts to mislead an investigator. Future work could improve the proposed data generation technique via machine learning to prevent hardcoding the screen coordinates in the automation script or improve the technique to generate data with old timestamps. Another avenue of future work includes the development of techniques to identify false data. LESS Full article Alberto Ceballos Delgado,Bing Zhou Original Article|Published on:29 Mar 2022
See more
Most Cited Papers In Last Two Years

A survey of domain name system vulnerabilities and attacks

Abstract Aim: The Domain Name System (DNS) plays an integral role in the functionality of the ... MORE Aim: The Domain Name System (DNS) plays an integral role in the functionality of the Internet. Clients receive Internet service by mapping domain names into internet protocol addresses, which are routable. DNS provides a scalable and flexible name resolution service to clients easily and quickly. However, DNS was initially developed without security, and the information is not secured. Although DNS security extensions was released in 1999 to protect against vulnerabilities, it is not widely deployed, and DNS continues to suffer from a variety of attacks. The purpose of this study is to provide a comprehensive survey of DNS security.Methods: We describe an overview of DNS vulnerabilities, DNS attacks, and even mitigation systems. In detail, attacks are classified by purpose and methods for defending against these attacks are introduced and assessed. Finally, we conclude with a summary of the current state of DNS security.Results: The main findings of this study is to introduce fundamental vulnerabilities of DNS and classify representative DNS attacks into four categories to efficiently analyze them. Moreover, we describe and assess mitigation systems to defense these attacks.Conclusion: We conclude that DNS is an integral part of Internet operations but is still exposed to various attacks due to its vulnerabilities, low deployment of available mitigation techniques, and limitations of such techniques. LESS Full article Tae Hyun Kim,Douglas Reeves Original Article|Published on:12 Sep 2020

Big data analytics of crime prevention and control based on image processing upon cloud computing

Abstract Aim: Current crime behavior observation has the problem of not being real time, thus criminal ... MORE Aim: Current crime behavior observation has the problem of not being real time, thus criminal behavior cannot be promptly controlled. To improve the control of criminal behavior, this study was based on cloud computing image processing, and adopted data mining for criminal behavior.Methods: This study obtained many criminal behavior characteristics through data collection and combined the rapid response capability of cloud computing to adopt data processing. In addition, to improve the accuracy of criminal behavior recognition, the identification method for criminal behaviors in selected populations was studied, and the image processing technology was combined to identify individual crimes and subject segmentation.Results: Our work used statistical methods to collect the characteristics of criminal behavior, and we designed experiments to verify the effectiveness of the algorithm. The experimental research shows that the algorithm has high accuracy in identifying abnormal behavior.Conclusion: The research shows that the accuracy of the algorithm for identifying abnormal behavior is relatively high, and it has high practical value, which can meet the accuracy and real-time requirements of security systems. LESS Full article Zheng Xu,...Vijayan Sugumaran Original Article|Published on:12 Sep 2020

Revisiting three anonymous two-factor authentication schemes for roaming service in global mobility networks

Abstract Designing a secure and efficient anonymous authentication protocol for roaming services in global mobile networks ... MORE Designing a secure and efficient anonymous authentication protocol for roaming services in global mobile networks is a hot topic in the field of information security protocols. Based on the widely accepted attacker model, this paper analyzes the security of three representative anonymous authentication protocols in global mobile networks. It is pointed out that: (1) Xu et al.’s protocol cannot resist the claimed offline password guessing attack and mobile user impersonation attack, and do not achieve mobile user untraceability and forward security; (2) Gupta et al.’s protocol cannot resist offline password guessing attacks, and temporary information disclosure attacks; (3) Madhusudhan et al.’s protocol cannot resist mobile user impersonation attack, foreign agent impersonation attack, replay attack, offline password guessing attack and session key disclosure attack, and cannot realize the anonymity and untraceability and forward security of users. It is emphasized that the fundamental reason for the failure of these protocols lies in the violation of the four basic principles of protocol design: Public key principle, Forward security principle, User anonymity principle and Anti offline guessing attack principle. The specific mistakes of these schemes are clarified, and the corresponding correction methods are proposed. LESS Full article Shuming Qiu,Ding Wang Review|Published on:29 Jun 2021

Feature extraction based on word embedding models for intrusion detection in network traffic

Abstract Aim: The analysis of network traffic plays a crucial role in modern organizations since it ... MORE Aim: The analysis of network traffic plays a crucial role in modern organizations since it can provide defense mechanisms against cyberattacks. In this context, machine learning algorithms can be fruitfully adopted to identify malicious patterns in network sessions. However, they cannot be directly applied to a raw data representation of network traffic. An active thread of research focuses on the design and implementation of feature extraction techniques that aim at mapping raw data representations of network traffic sessions to a new representation that can be processed by machine learning algorithms.Methods: In this paper, we propose a feature extraction approach based on word embedding models. The proposed approach extracts semantic features characterized by contextual information that is hidden in the raw data representation.Results: Our experiments conducted on three datasets showed that our feature extraction approach based on word embedding models has the potential to increase the classification performance of conventional machine learning algorithms that are applied to intrusion detection, and it is competitive with known feature extraction baselines in the state-of-the-art.Conclusion: This study shows that word embedding models can be used to carry out intrusion detection tasks accurately. Feature extraction based on word embedding models requires a higher computational time than simpler techniques, but leads to a higher accuracy, which is important for the identification of complex attacks. LESS Full article Roberto Corizzo,...Nathalie Japkowicz Original Article|Published on:28 Dec 2020
See more
Ongoing Special Issues
Topic: Cyber-Physical Systems Safety: Techniques and Challenges

Submission Deadline: 31 Mar 2023

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Browser Threats of Software Security

Submission Deadline: 31 Dec 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Security and Privacy in Cyber-Physical Systems

Submission Deadline: 25 Dec 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Post-Quantum Cryptography and AI Privacy (PQAP)

Submission Deadline: 20 Dec 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: The 17th International Conference on Information Security Practice and Experience (ISPEC 2022)

Submission Deadline: 15 Dec 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Artificial Intelligence (AI) and Emerging Cybersecurity Trends in Attacks and Solutions

Submission Deadline: 31 Oct 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Cyber Threat Intelligence – Multi- and Trans-Disciplinary State of the Art

Submission Deadline: 25 Oct 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Cybersecurity and Digital Forensics Meet AI: New Challenges

Submission Deadline: 30 Sep 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Security of Cyber-Physical Systems

Submission Deadline: 30 Sep 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Advances in Multimodal Biometric and Digital Forensics

Submission Deadline: 30 Sep 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Intelligence, Security, and Privacy in IoT, IoV and 5G/6G Network with Smart City

Submission Deadline: 30 Sep 2022

Published articles: 1

Submit to this Special Issue Contact Assistant Editor

Topic: New Challenges in Big Data Security and Privacy

Submission Deadline: 30 Sep 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

Topic: Big Data Applications and Techniques for Internet of Things

Submission Deadline: 30 Sep 2022

Published articles: 0

Submit to this Special Issue Contact Assistant Editor

See more
About The Journal

ISSN

2694-1015 (Online)

Publisher

OAE Publishing Inc.

Article Processing Charges

$600

Editor-in-Chief

Sitharama Iyengar Sundaraja

Publishing Model

Gold Open Access

Copyright

Copyright is retained by author(s)

Publication Frequency

Quarterly

Indexing

CNKI

Dimensions

Lens

Editorial Board See more
S. S. Iyengar
Xiaofeng Chen
Richard Brooks
Shiyan Hu
Xinyi Huang
Jian Shen
Willy Susilo
Bhavani Thuraisingham
Sherali Zeadally
Sos Agaian
Mamoun Alazab
Zubair Baig
Ken Barker
Gautam Biswas
Luca Calderoni
Rongmao Chen
Jerry Chun-Wei Lin
Frédéric Cuppens
Nora Cuppens
Aly A. Farag
Massimo Ficco
Fei Gao
Lawrence A. Gordon
Stefanos Gritzalis
Brij Gupta
Debiao He
Qiong Huang
Patrick C.K. Hung
Sokratis Katsikas
Ashraf Labib
Qi Li
Kaitai Liang
Qingzhong Liu
Xiangyang Luo
Leandros Maglaras
Yashwant Malaiya
Dinesh Manocha
Barbara Masucci
Massimo Merro
Sangman Moh
Saraju P. Mohanty
Haris Mouratidis
Khan Muhammad
Kshirasagar S. Naik
Japkowicz Nathalie
Pedro Peris-Lopez
Josef Pieprzyk
Jean-Jacques Quisquater
Douglas Reeves
Vijay Varadharajan
Athanasios V. Vasilakos
Michael N. Vrahatis
Ding Wang
Zheng Xu
Guomin Yang
Kuo-Hui Yeh
Yelena Yesha
Mazdak Zamani
Fangguo Zhang
Ting Zhu
Data

76

Authors

133

Reviewers

79

On Board Editors

2020

Published Since

24

Articles Published

13

Special Issues

35,841

Article Views

6,183

Article Downloads

Open Archives

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/

Membership
JOURNAL OF SURVEILLANCE, SECURITY AND SAFETY
ISSN 2694-1015 (Online) editorial@jsssjournal.com
Navigation
About the Journal News Partners
follow us
LinkedIn Twitter
OAE Publishing Inc.
Privacy Cookies Terms of Service Contact Us
OAE JOURNALS
Ageing and Neurodegenerative Diseases Artificial Intelligence Surgery Cancer Drug Resistance Complex Engineering Systems Connected Health Chemical Synthesis Carbon Footprints Disaster Prevention and Resilience Energy Materials Extracellular Vesicles and Circulating Nucleic Acids Green Manufacturing Open Hepatoma Research Intelligence & Robotics Journal of Cancer Metastasis and Treatment Journal of Materials Informatics Journal of Translational Genetics and Genomics Journal of Unexplored Medical Data Journal of Smart Environments and Green Computing Journal of Surveillance, Security and Safety Journal of Environmental Exposure Assessment Water Emerging Contaminants & Nanoplastics Metabolism and Target Organ Damage Microbiome Research Reports Microstructures Minerals and Mineral Materials Mini-invasive Surgery Neuroimmunology and Neuroinflammation One Health & Implementation Research Plastic and Aesthetic Research Rare Disease and Orphan Drugs Journal Soft Science Soil Health Space Mission Planning & Operations Stomatological Disease and Science The Journal of Cardiovascular Aging Vessel Plus
FOLLOW OAE
Twitter Facebook LinkedIn YouTube bilibili WeChat © 2016-2022 OAE Publishing Inc., except certain content provided by third parties

TAGS:Surveillance of Journal Safety

<<< Thank you for your visit >>>

Websites to related :
Kunststofffenster und Türe gün

  Erstellen Sie Ihr eigenes ProduktKunststofffenster1-flügelige1-flügelige - Kippfenster2-flügelige3-flügeligeAtypische KunststofffensterGünstigste

Eberhard Arnold: Bruderhof Histo

   Eberhard Arnold Founder of the Bruderhof

30th Congress of the European As

  

Balázs Sándor Néptáncos, Lak

  

Geriatric Medicine - Section of

  Geriatric Medicine - Section of UEMS

Volksource - for the love of dub

   Source VW specialists with ease! SEARCH VW TRADERS BY CATEGORY AND AREA

Digital Experience - Agenzia di

  Skip to content HomeAboutSocial Web MarketingAdvertisingSviluppo ApplicazioniServizi CloudBlogContatti MenuHomeAboutSocial Web MarketingAdvertisingS

Parenti District Art & Design •

   ProgramAboutContacts search

Antigravitational Records &#8211

   HomePortfolioAboutContactBlog Menu © 2019

Homepage - OPS - Officina Presso

   AboutCore competencesProduct portfolioContactReserved AreaAboutCore competencesProduct portfolioContactReserved AreaDrive forward.Along

ads

Hot Websites