Exploring Cybersecurity Ecosystem in the Middle East: Towards an SME Recommender System

Cyber-attacks on Small and Medium Enterprises (SMEs) are rising. However, they often lack effective strategies to prevent threats such as malware, phishing, denial of service (DoS), and others. In this recent paper from ‘Journal of Cyber Security and Mobility’, the authors first examine the current scenario of cybersecurity in the context of Middle East SMEs, then go on to review existing standards and draw up security recommendations.

Read more...

Extended Abstract: Automatic Detection of HTTP Injection Attacks using Convolutional Neural Network and Deep Neural Network

In a recent paper from the Journal of Cyber Security and Mobility, deep learning techniques are used to develop models that would automatically detect injection attacks in HTTP requests.

An extended abstract is now featured on the Cybersecurity Magazine website.
The full article and results and can found on the Journal of Cyber Security and Mobility webpage: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/2263

Read more...

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks

A Secure Trust-aware Cross-layer Routing Protocol for Vehicular Ad hoc Networks
Sihem Baccari, Mohamed Hadded, Haifa Touati, Paul Muhlethaler

VANETs aim to reduce the number of road accident victims and congestion problems while improving the quality of driving. The absence of a central control can make such a network vulnerable to various attacks, both from the outside and from the interior. In this article, a trust-based model is proposal in which each node establishes a trust relationship with its neighbors based on their behaviors during the channel access and packet forwarding process.

Read more...