Journal & Conference Proceeding Publications

Get latest Journal & Conference Proceeding Publications related to Cybersecurity Malaysia here

 
Share this page :
CSC 0037
The 5 Strategies to Effective Cyberparenting
Mohamad Nizam Kassim
The advancement in technology and internet services significantly impacts our society positively and negatively. Unfortunately, the concerned parents are seem helpless in struggling to overcome these negative impacts in relation to their children’s technology and internet usage. The main objective of this conceptual paper is to propose the practical strategies for the concerned parents to overcome these challenges in raising up mobile and web generation in the era of digital culture. This conceptual paper called ‘The 5 Strategies to Effective Cyberparenting’ underlines an indispensable approach for the concerned parents in creating family online safety environment for their children. Hence, these strategies would be used as reference thinking model for the concerned parents to overcome the internet threats in digital culture and as guidelines for security professional to develop and implement security awareness program for the concerned parents. As a result, the concerned parents will be empowered with the right knowledge and skills in cyberparenting.
Year published : 2013 | n.a | Conference Proceeding
Publication : Conference Proceedings of the" Social Harms Prevention: Emerging Social Harms, Theories, and Strategies" in Tehran, Iran
CSC 0016
The Application of Qualitative Method in Developing a Cyber Terrorism Framework
Zahri Yunos; Rabiah Ahmad
A qualitative method research has become an increasingly popular approach in the discipline of social science. The purpose of this paper is to describe the application of qualitative method in developing a cyber terrorism framework. The primary goal of this research is to discover the theory and then develop a conceptual framework that describes the phenomena. In this research, a semi structured interview with purposive sampling procedures for data collection was used. The analysis indicated that the framework describing cyber terrorism can be considered from six different components: motivation, target, method of attack, domain, action by perpetrator and impact.
Year published : 2014 | 133-137 | Conference Proceeding
Publication : International Conference of Economics, Management and Development
CSC 0045
The Comparative Study Of Randomness Analysis Between Modified Version of LBlock Block Cipher And Its Original Design
Nik Azura Nik Abdullah, Liyana Chew Nizam Chew & Abdul Alif Zakaria
In this research paper, we present and compare the randomness analysis conducted towards LBlock block cipher and its modified version namely Modified LBlock. Among the important requirement when designing a block cipher algorithm is that the algorithm can act as a random number generator. Therefore, the aim of performing modification towards LBlock algorithm is to enhance its randomness results. Modification were made by replacing the eight 4 X 4 S-boxes with four different 16 X 16 S-boxes which has the same security strength as S-box of AES. During experimentation, this research project considers a full rounds of LBlock and Modified LBlock algorithms which both algorithms accepts a 64-bit plaintext, utilizes an 80-bit key, executes in 32 rounds and produces a 64-bit ciphertext. Nine different data categories were used to generate inputs (plaintext and key), with each having 100 samples. Blocks of ciphertext were generated from these algorithms and were concatenated to construct a binary sequence. NIST Statistical Test Suite consisting of sixteen tests was used to conduct testing and analysis, and the significance level was set to 1%. From the comparative analysis done, it is concluded that the randomness analysis results for Modified LBlock block cipher has 42.96% improvement compared to its original design when tested under 1% significance level and using the same samples.
Year published : November 2015
Publication : International Journal of Computer and Information Technology, Vol 4, Issue 6
CSC 0019
The Organisation of Islamic Conference - Computer Emergency Response Team (OIC-CERT) : Answering Cross Border Cooperation
Rahayu Azlina; Ahmad Mohd Shamir Hashim
The rapid growth of the Information & Communication Technology (ICT) systems and network infrastructures have cause the Internet to be borderless and inevitably given rise to the issues in mitigating cross border cyber crimes. Realizing the danger and the huge impact of this matter, the Computer Security and Incident Response Teams (CSIRT) or the Computer Emergency Response Team (CERT) have developed international and regional collaborations to deal with cross borders cyber threats. Sharing intelligence, research, best practice, challenges and learning from other's mistakes as well as helping to formulate and drive international policy direction and initiatives will help member countries to protect their own critical information infrastructure. Acknowledging this new trend of collaboration and the threats in the cyber world, the Organization of Islamic Conference (OIC) has agreed to the establishment of inter CSIRT/CERT collaboration among its member countries. The OIC - CERT was established in 2009 with the status of an affiliated institution to the OIC. Presently, 18 OIC countries are members of this collaboration and various activities are being conducted with the main objective being to facilitate the development of CIRST capabilities, information sharing on views and issues in cyber security. From the economic perspective, information security is currently considered as one of the factors to lure foreign investment to a country. Thus strengthening the nation's information security will help improve international recognition.
Year published : 2011| IEEE Conference Proceeding
Publication : Proceedings of the 2011 Second Worldwide Cybersecurity Summit
CSC 0066
Towards Stemming Error Reduction for Malay Texts
Mohamad Nizam Kassim; Shaiful Hisham Mat Jali; Mohd Aizaini Maaruf and Anazida Zainal
Text stemmer is one of useful language pre-processing tools in the field of information retrieval, text mining and natural language processing. It is used to map morphological variants of words into base forms. Most of the current text stemmers for the Malay language focused on removing affixes, clitics, and particles from affixation words. However, these stemmers still suffered from stemming errors due to insufficiently address the root cause of these stemming errors. This paper investigates the root cause of stemming errors and proposes stemming technique to address possible stemming errors. The proposed text stemmer uses affixes removal method and multiple dictionary lookup to address various root causes of stemming errors. The experimental results showed promising stemming accuracy in reducing various possible stemming errors.
Year published : 2018
Publication : Lecture Notes in Electrical Engineering – Computational Science and Technology
logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed