Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0046
Analysis of Steganography Substitution System Methods Using New Testing Techniques Proposed for Strict Avalanche Criterion
Abdul Alif Zakaria, Nor Azeala Mohd Yusof, Wan Zariman Omar, Nik Azura Nik Abdullah & Hazlin Abdul Rani
In this research, we present the analysis on steganography substitution system methods; Least Significant Bit Substitution, Random Interval, Pseudorandom Permutation, Image Downgrading & Covert Channels, and Cover-regions & Parity Bits. New testing techniques proposed by Phyu Phyu Mar and Khin Maung Latt for strict avalanche criterion is implemented to analyze secret message bit distribution in all methods. One million bits of secret messages have been used for sampling in this testing. This analysis compares each methods results on three tests; total number of bit changes in each output, output values in each output, and total number of bit changes in each bit position. From our observation, Random Interval and Cover-regions & Parity Bits produced the best test results compared to the other three steganography substitution methods.
Year published : January 2015
Publication : International Journal of Cryptology Research No 5 Issue 1
CSC 0034
Analysis on Lightweight Block Cipher, KTANTAN
Nik Azura Nik Abdullah; Norul Hidayah Lot Ahmad Zawawi; Hazlin Abd Rani
In this research, we present the analysis on Lightweight Block Cipher; KTANTAN. This block cipher consists of three algorithms with block sizes of 32/48/64-bit and utilizes an 80-bit key. NIST Statistical Test Suite is used to determine the randomness of output sequence produced by all algorithms. Nine data categories are applied to generate the output sequence. From our analysis, we found out that all three algorithms are not random based on the 1% significance level.
Year published : 2011 | 46-51 | IEEE Conference Proceeding
Publication : 7th International Conference on Information Assurance and Security
PPWE 02 2022A
APEC Women Empowerment through Cybercrime-Free Workshop for Secure Online Trading in the 4th Industrial Revolution
SOM Steering Committee on Economic and Technical Cooperation (SCE), Policy Partnership on Women and the Economy (PPWE)
The growing usage of smart technology has facilitated online trading for small and medium-sized firms (SMEs). Consequently, cyber crimes such as financial fraud, phishing, e-commerce fraud, and love scams regularly target women. The APEC Women Free Cybercrime Workshop was created to empower women and enhance their entrepreneurial capabilities in the digital arena. A preliminary study was conducted before the workshop to assess the cybercrime awareness level among potential participants. The APEC Women Free Cybercrime Workshop was held on 12 and 13 September 2023 at Cititel Mid Valley Hotel, Kuala Lumpur. The sessions provided in-depth discussions on securing online trading and covered topics such as cybercrime and threats, cyber laws, online attack demonstration, preventive measures, incident and emotion handling, and best practices. To evaluate the workshop's impact, pre and post-test assessments were conducted to measure the level of cybercrime awareness among participants. The findings from these tests have shown a significant improvement in cybercrime awareness by the end of the workshop.
Year published : February 2024
Publication : SOM Steering Committee on Economic and Technical Cooperation (SCE), Policy Partnership on Women and the Economy (PPWE)
CSC 0058
Application of Case Based Reasoning in IT Security Incident Response
Wira Zanoramy Zakaria
This research explores the possible utilization of the Case-based Reasoning (CBR) technique to realize a CBR system for the domain of cyber security incidents handling and response. The proposed CBR system is intended to assist incident handlers, be it the rookies or even the seniors, in responding to incidents. The CBR recommender system mimics the way of an experienced incident handlers in responding to security incidents. This research investigates other related works on CBR in the area of cyber security. This work also research on the development of case storage and case representation for the domain of incident response.
Year published : September 2015
Publication : Proceeding of the 3rd International Conference on Recent Trends in Engineering & Technology in Istanbul, Turkey
CSC 0005
Application of Mixed Method in Developing a Cyber Terrorism Framework
Rabiah Ahmad and Zahri Yunos
Mixed method research has becoming an increasingly popular approach in the discipline of sociology, psychology, education, health science and social science. The purpose of this paper is to describe the application of mixed method in developing a cyber terrorism framework. This project has two primary goals: firstly is to discover the theory and then develop a conceptual framework that describes the phenomena, and secondly is to verify the conceptual framework that describes the phenomena. In order to achieve conclusive findings of the study, a mixed method research is recommended: qualitative data and quantitative data are collected and analyzed respectively in a separate phase. The mixed method approach improves the rigor and explanation of the research results, thus bring conclusive findings to the study outcome. By utilizing qualitative and quantitative techniques within the same study, we are able to incorporate the strength of both methodologies and fit together the insights into a workable solution.
Year published : 2012 | 209-214 | Vol. 3 No. 3
Publication : Journal of Information Security
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • info@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed