scispace - formally typeset
Search or ask a question

Showing papers in "Journal of Applied Security Research in 2020"


Journal ArticleDOI
TL;DR: A deep learning-based method is proposed for the detection of financial fraud based on the Long Short-Term Memory (LSTM) technique, aimed at enhancing the current detection techniques as well as enhancing the detection accuracy in the light of big data.
Abstract: As the use of the internet is growing exponentially, more and more businesses such as the financial sector are operationalizing their services online. Consequently, financial frauds are increasing ...

22 citations


Journal ArticleDOI
TL;DR: Nigeria continues to face the challenge of containing terrorism despite adopting diverse counter-terrorism measures as mentioned in this paper, while extant literature has evaluated the impacts of these measures, explaining why they are ineffective.
Abstract: Nigeria continues to face the challenge of containing terrorism despite adopting diverse counter-terrorism measures. While extant literature has evaluated the impacts of these measures, explaining ...

22 citations


Journal ArticleDOI
TL;DR: A new categorization of terrorism based on casualties and consequences has useful application in counterterrorism regarding proportionate budgeting of weaponry and other resources.
Abstract: This study deployed the agglomerative hierarchical clustering technique on the Global Terrorism Database to develop a new way of categorizing terrorism. Four clusters were extracted, resulting in a...

14 citations


Journal ArticleDOI
TL;DR: In private correctional institutions, staff are an important resource, since they are tasked with a myriad of duties necessary to operate a humane, safe, and secure facility as mentioned in this paper. But as political demands f...
Abstract: In private correctional institutions, staff are an important resource, since they are tasked with a myriad of duties necessary to operate a humane, safe, and secure facility. As political demands f...

11 citations


Journal ArticleDOI
TL;DR: A hybrid algorithm for blind watermarking (BW) is proposed, which utilizes redundant discrete wavelet transform (RDWT), discrete cosine transform (DCT) and singular value decomposition (SVD) together to have the advantages of all three.
Abstract: Watermarking is a technique which offers more robustness and good imperceptibility. Even if the algorithmic principle is public or the existence of hidden information is known, it is difficult to a...

9 citations


Journal ArticleDOI
TL;DR: To identify, characterize and meta-analyze the approaches and intelligent algorithms used to discover patterns on criminal incident data, observing the Decision Tree, Logistic Regression, Naive Bayes, Random Forest, and Support Vector Machine algorithms.
Abstract: Context: Crime is a prevalent social problem, then, government and society, in general, have had enormous problems caused by this phenomenon. However, with the increasing ability to collect and sto...

8 citations


Journal ArticleDOI
TL;DR: A new version of Song scheme, which shows that in contrary to Song claim, the reconstructor cannot recover the secret without receiving any information from the other participants, is proposed.
Abstract: Recently, a threshold d − level quantum secret sharing scheme was presented by Song et al. However, Kao et al. showed that in contrary to Song claim, the reconstructor cannot recover the secret wit...

7 citations


Journal ArticleDOI
TL;DR: A Quality of Service (QoS) aware algorithm is proposed to detect and mitigate the Selective Gray Hole Attack, performed by a rational adversary.
Abstract: Gray hole attack gets trickier, when only certain node’s packets are dropped intentionally, termed as the Selective Gray Hole Attack (SGHA). The literature so far has focused on the attack carried ...

6 citations


Journal ArticleDOI
Tarek S. Sobh1
TL;DR: SIFAML is introduced as a novel ontology-based and plan-based system for AML frameworks to make use of an intelligent formalism by using ontology and STRIPS-based planning.
Abstract: This paper aims to secure money transactions due to money laundering crimes. It presents a Secure Intelligent Framework for Anti-Money Laundering (SIFAML). This framework is new and includes two ma...

6 citations


Journal ArticleDOI
TL;DR: This paper proposes a novel Hybrid optimization algorithm that acquires the characteristics of the above-said algorithms for association rule hiding and it has been shown that it produces better results in less time.
Abstract: In this digital world, information evolves from several sources like social media, e-commerce sites, and mobile networks, etc., in large volumes for processing. The sensitiveness in the form of rul...

6 citations


Journal ArticleDOI
TL;DR: The article explores how the mode of vision opted for—the chosen set of characteristics—is found accountable for shaping the notions of threat and security in the contemporary form of airport security.
Abstract: Based on field research at Vaclav Havel Airport Prague and building on Actor-Network Theory, the article inquires the role of visibility in production of the contemporary form of airport security. ...

Journal ArticleDOI
TL;DR: This paper evaluates the performance of the proposed AbhAS dataset against existing benchmark datasets by extracting high-energy coefficients from images belonging to each dataset with the application of Kekre and discrete cosine transforms (DCT).
Abstract: This paper proposes a realistic image splicing dataset named AbhAS for evaluating various image forensic algorithms. We evaluate the performance of our proposed AbhAS dataset against existing bench...

Journal ArticleDOI
TL;DR: In this paper, the authors provide an overview of the international legal definition of the term "foreign terrorist fighters" and its application in the field of foreign terrorist fighters, and present a definition of a unique and authentic definition of such terms.
Abstract: There does not exist a unique and authentic definition of the term “foreign terrorist fighters” nowadays, same as the term “terrorism”. The paper will provide an overview of the international legal...

Journal ArticleDOI
TL;DR: A robust and unnoticeable secure image watermarking approach using Nonnegative Matrix Factorization (NMF) and Fast Walsh-Hadamard Transform (FWHT) to improve visual imperceptibility and exceptional resiliency against various types of attacks.
Abstract: We present a robust and unnoticeable secure image watermarking approach using Nonnegative Matrix Factorization (NMF) and Fast Walsh-Hadamard Transform (FWHT). The core idea of the proposed scheme c...

Journal ArticleDOI
TL;DR: Arun Kundnani as mentioned in this paper is a Visiting Assistant Professor of Media, Culture and Communication at New York University and author of The Muslims are Coming! Islamophobia, Extremism, and the Domestic War.
Abstract: Arun Kundnani is a Visiting Assistant Professor of Media, Culture and Communication at New York University. He is the author of The Muslims are Coming! Islamophobia, Extremism, and the Domestic War...

Journal ArticleDOI
TL;DR: An algorithm is developed, TerrorClassify, which places terror organizations into hierarchical categories of casualties and consequences based on the extent of havoc caused by individual terror groups.
Abstract: This study developed an algorithm, TerrorClassify, which places terror organizations into hierarchical categories of casualties and consequences. A previous study proposed a method of categorizing ...

Journal ArticleDOI
TL;DR: Detailed features such as Invariant, Depth sequential silhouettes and Spatiotemporal body joint can be obtained to aid efficient analysis of posture that can pave a way to identify the different emotions by tactic Tree based classifier to get better performance in terms of execution time and accuracy.
Abstract: Emotions are noteworthy signs to understand the intentions of others peoples during communication with them. Similarly, in order to identify the different emotional states of individual such as joy...

Journal ArticleDOI
TL;DR: In this article, the authors examined new dimensions of farmer-herder conflicts in the Kwahu Afram Plains South of Ghana and its implication on human security, based on fieldwork conducted from June 2019 to January 2019.
Abstract: This paper examines new dimensions of farmer–herder conflicts in the Kwahu Afram Plains South of Ghana and its implication on human security. Based on fieldwork conducted from June 2019 to January ...

Journal ArticleDOI
TL;DR: A multimodal biometric, secure encrypted data and encrypted biometric encoded in the Quick Response Code (QR code) based e-passport authentication method is proposed for national security application.
Abstract: An e-passport contains the personal and biometric information of a person. It has some current and possible applications relating to national security and law enforcement such as border security, i...

Journal ArticleDOI
TL;DR: It is found that by combining additive cellular automata and Luhn mechanism, a robust master key in the public cloud could be generated using Luhn method which satisfies avalanche, confusion, and diffusion properties for public clouds.
Abstract: This article attempts an additive cellular automata based random key generation using Luhn method which satisfies avalanche, confusion, and diffusion properties for public clouds. It is found that ...

Journal ArticleDOI
TL;DR: Another MSSS scheme is presented that has shorter public outputs and better security relation with the underlying symmetric encryption in the standard model.
Abstract: In a multi-stage secret sharing (MSSS) scheme, a dealer D share l secrets among the participants in such a way that secrets are reconstructed one by one in different stages. Recently, we proposed a...

Journal ArticleDOI
TL;DR: In this article, the professional relationship between police officers and retail store detectives was examined, and a series of semi-structured interviews were conducted with police officers from six states in the US.
Abstract: This article examines the professional relationship between police officers and retail store detectives. Fifty-four semi-structured interviews were conducted with police officers from six states. T...

Journal ArticleDOI
TL;DR: In this article, the authors apply differential association theory to the involvement of Hearst in the Symbionese Liberation Army (SLA), a domestic terrorist group active in the 1970s.
Abstract: This paper applies Differential Association Theory to Patty Hearst’s involvement with the Symbionese Liberation Army (SLA), a domestic terrorist group active in the 1970s. Developed by Edwin Suther...

Journal ArticleDOI
TL;DR: This paper found that terrorist groups' ideological types are a significant predictor of credit claiming for attacks, and that environmental terrorist groups are more likely to claim credit because the attacks serve strategic objectives.
Abstract: Terrorist groups’ ideological types are a significant predictor of credit claiming for attacks. Environmental terrorist groups are more likely to claim credit because the attacks serve strategic pu...

Journal ArticleDOI
TL;DR: Compared to existing reversible data-hiding in encrypted image methods, the proposed method has better embedding rates, embedding payloads, and high-security performance.
Abstract: This article attempts to propose an effective reversible data-hiding in encrypted images using memory cellular automata. The image content owner encrypts the original image using a Paillier homomor...

Journal ArticleDOI
TL;DR: The experimental results show the efficiency of the proposed Ciphertext-Policy Attribute Based Encryption with Constant Size Ciphertext and Blowfish algorithm for secure transmission of sensitive patient information when compared with existing schemes.
Abstract: Secured information transmission is one of the critical challenges in Wireless Body Area Networks (WBAN). The main motivation of this paper is secure transmission of highly sensitive patient inform...

Journal ArticleDOI
TL;DR: A split BF is proposed that divides the original BF into two small ones without increasing the number of hash functions, which lowers false-positive rates and the filter sizes at the same time.
Abstract: Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to u...

Journal ArticleDOI
TL;DR: An efficient Asymmetric File Hierarchy Ciphertext-Policy Attribute Based Encryption (AFH-CP-ABE) is proposed which is based on an asymmetric pairing construction using denominator elimination and twist mapping and is compared with existing schemes.
Abstract: One of the most preferred encryption techniques for data sharing in cloud environment is Ciphertext-Policy Attribute Based Encryption (CP-ABE). An efficient File Hierarchy CP-ABE (FH-CP-ABE) scheme...

Journal ArticleDOI
TL;DR: In this paper, the authors used design thinking to explore the creation and usage of community security intervention tools in four communities in the Asokore Mampong Municipality in Ghana.
Abstract: This study uses design thinking to explore the creation and usage of community security intervention tools. Four communities in the Asokore Mampong Municipality in Ghana were selected purposively f...

Journal ArticleDOI
Omi Hodwitz1
TL;DR: Results indicate that security measures can have limited effects on aviation-based attacks, although these effects are policy-specific and contingent on the type of attack.
Abstract: The purpose of this study is to: (a) test the effectiveness of security measures on aviation-based attacks between 1970 and 2015, (b) assess diffusion and displacement effects of security measures ...