Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
ECC 0067
Cyber Terrorist Detection by Using Integration of Krill Herd and Simulated Annealing Algorithms
Hassan Awad Hassan Al-Sukhni; Azuan bin Ahmad; Madihah Mohd Saudi and Najwa Hayaati Mohd Alwi
This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. Three new level of categorizations, including low, high and interleave have been introduced in this paper to optimize the accuracy rate. Two thousand datasets had been used for training and testing with 10-fold cross validation for this research and the simulations were performed using Matlab. Based on the conducted experiment, this technique produced 73.01% accuracy rate for the interleave level; thus, outperforming the benchmark work. The findings can be used as a guidance and baseline work for other researchers with the same interest in this area
Year published : 2019
Publication : International Journal of Advanced Computer Science and Applications; Volume 10 : Number 7
CSC 0013
Definition and Framework of Cyber Terrorism
Zahri Yunos Rabiah; Ahmad; Noor Azwa Azreen Abd Aziz
Cyberspace is a virtual place that has become as important as physical space for social, economic and political activities. Many nations in the world are increasing their dependency on cyberspace when they utilize Information and Communications Technology (ICT). In this digital age, there is the emergence of the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities. Interestingly, there are many concepts of cyber terrorism provided by academicians, researchers, policy makers and individuals. This paper proposes a framework describing the core components of cyber terrorism. The framework defines cyber terrorism from six perspectives: Motivation, target, method of attack, domain, action by perpetrator, and impact.
Year published : 2013 | 67-79 | Volume 1/2013
Publication : SEARCCT'S Selection of Articles
CSC 0059
Developing a Cyber Security Awareness Master Plan in Malaysia: Focus Group Discussion Approach
Dr Zahri Yunos, Ramona Susanty Ab Hamid & Mustaffa Ahmad
Not Available
Year published : November 2015
Publication : Proceedings of the 2015 International Conference on Social Sciences and Information November 29 – 30, 2015, Tokyo, Japan
CSC 0053
Developing the Security Zone for Wireless Body Area Network (WBAN) Implementation Using Practical Security Assessment (PSA)
Abdul Fuad Abdul Rahman & Madihah Zulfa Mohamad
Wireless body area network (WBAN) is a wireless network similar to wireless sensor network (WSN). The WBAN uses body sensor to transmit and received wireless communication. The WBAN has recently emerged as one of the premier research topics in enhancing healthcare industry. However, since WBAN requires it to be a low powered sensor node, it will be extremely difficult to put through any advanced security mechanism due to the restriction of power use in WBAN devices. Therefore, this research proposed a different approach in securing WBAN. This research is designed to assess the confidentiality, integrity and availability of WBAN and measure the attack perimeter of the WBAN implementation, using a practical security assessment (PSA). In this paper, the idea of conducting PSA before designing WBAN security solution will be used. The WBAN security solution aimed to enhance the physical security of the WBAN by developing a Secure Zone for WBAN.
Year published : 2015
Publication : Journal of Advances in Computer Networks vol. 3, no. 2
CSC 0062
Development of a Cyber Security Awareness Strategy Using Focus Group Discussion
Dr Zahri Yunos, Ramona Susanty Ab Hamid & Mustaffa Ahmad
Focus group discussion is often used as an exploratory technique and serves as a source of data collection. It typically consists of a group of 5 to 10 participants led by a moderator. This work contributes to developing a cyber security master plan in Malaysia through focus group discussion. For this study, thirty-two (32) participants took part in focus group discussions. The background of the participants varied from management, policy-making, law enforcement and prosecution to the research and technical fields. The participants had a range of working experience. The target groups identified are kids, youths, adults and parents, and organizations (both public and private sectors). The overall results suggest that in order to achieve a successful cyber security awareness implementation strategy, three implementation layers are recommended: strategic, program execution and content development layers. The findings provide a holistic approach to developing a single common platform for cyber security awareness programs in Malaysia that encompasses various stakeholders.
Year published : July 2016
Publication : SAI Computing Conference 2016
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • info@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed