Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS <p><strong>JCSCS</strong> is a peer reviewed journal of Computer Science domain published by MAT Journals Pvt. Ltd. It is a print and e-journal focused towards the rapid publication of research and review papers based on Protecting Systems, Networks, and Programs from Digital Attacks. This journal focuses on all aspects of Cyber Security including IoT Security, AI Security, Machine Learning in Security, Security and Crime Science, Cryptography and its Applications, Security Economics, Human Factors and Psychology, Legal Aspects of Information Security, Privacy, Hardware Security, Software Security and System Security, Network and Critical Infrastructure Security, Data-Driven Security and Measurement Studies, Adversarial Reasoning, Malware Analysis, Privacy-Enhancing Technologies and Anonymity, Big Data Security and Privacy, Cloud Security, Digital and Information Forensics, Quantum Security, Cryptography and Cryptology, Authentication and Access Control and Biometrics.</p> en-US Thu, 11 Jan 2024 11:03:28 +0000 OJS 3.3.0.8 http://blogs.law.harvard.edu/tech/rss 60 Secure Digital Signature Using Block Chain Technology https://matjournals.net/engineering/index.php/JCSCS/article/view/71 <p>The lack of authentication and ant forge mechanisms severely compromises the security details of the authorizations issuing the certification. We employ blockchain technology to verify people in a way that is akin to a digital signature with their identity and access authorization, so resolving the issue of certificate forgery. Blockchain technology is an open distributed ledger that ensures that every transaction cannot be altered and holds unquestionable information in a highly secure and encrypted manner. A high standard for the procedure that may guarantee that the data in such a certificate is authentic indicates that the document is authentic and has not been forged, having come from a reliable source. The interplanetary file system uses the content address as the only means of uniquely identifying every file inside a global namespace that includes all computing devices. A bi-dimensional barcode that provides data as black and white dots is called a Quick Response (QR) code. The system consists of black squares that can be photographed by a camera or other image device, arranged in a square framework on a white background.</p> Manu S, Bhagappa, Suhas G K Copyright (c) 2024 Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS/article/view/71 Thu, 01 Feb 2024 00:00:00 +0000 Cyber Bullying Detection Using Machine Learning https://matjournals.net/engineering/index.php/JCSCS/article/view/309 <p>In today's world, social media is the go-to way for people to connect online. But along with all the good stuff, like staying in touch with friends and family, there's also been a rise in some not-so-nice stuff, like online bullying and harassment. Cyberbullying is when people use the internet to hurt others, and it can mess with someone's mental and physical health. It's especially tough for groups like women and kids, and sometimes it can even make them feel like they don't want to live anymore. Similarly, online harassment has become a big problem too. This is when people use the internet to bother or intimidate others. We've seen lots of cases where private messages are shared without permission, fake stories are spread around, or people are targeted with sexual comments. Because of these issues, researchers are now focused on finding ways to identify and stop bullying language or content on social media. This study aims to use machine learning a type of technology that helps computers learn from data to create a system that can detect and deal with online abusive and bullying messages effectively.</p> Saisri Guguloth, K. Sreekala Copyright (c) 2024 Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS/article/view/309 Fri, 12 Apr 2024 00:00:00 +0000 Image Classification for Different Types of Artificial and Living Things https://matjournals.net/engineering/index.php/JCSCS/article/view/338 <p>Image classification is an essential requirement in today’s life. Classifying the images will resolve the major problems of getting ahead with the present world by extending this it will be the base structure to many other projects. Having a collection of many such images, and classifying them into living and artificial things is the major difficulty. A living thing can be described as the things that have life and they can be dead. An artificial thing is a thing that is human-made and has external help. In this project I will be concentrating on two aspects they are: firstly taking a dataset that contains a few artificial like mountains, buildings, glaciers, streets, sea and living things like forests with these, the model will be trained in such a way that model can predict the given image is belonging to which category, secondly it will show the confusion matrix which will help us to observe how the trained model is working and also the number of images in each category using deep learning algorithm like a conventional neural network. This project is aimed to find the best model with the highest accuracy and precision results.</p> Goutami Moka, K. Sreekala Copyright (c) 2024 Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS/article/view/338 Fri, 19 Apr 2024 00:00:00 +0000 An Analysis of Verification Systems and Cybersecurity Dangers https://matjournals.net/engineering/index.php/JCSCS/article/view/394 <p>Global infrastructure provides all nations essential services such as Internet, electricity, banking, finance, public services, transportation, and water management. Each country has a distinct plan for critical infrastructure based on its sector. As IoT-based solutions become more prevalent, critical infrastructures require network and Internet access. As a result, critical systems within information networks are also vulnerable to cyber-attacks. Identifying possible cyber-attacks, developing defence tactics, and implementing preventative measures are critical. Protecting critical infrastructures from cyber-attacks is crucial nowadays. This paper examines current attacks on critical infrastructures. Security steps are addressed to prevent Internet protocol-based innovations. The IoT has enabled online connectivity for almost anything. The Internet of Things (IoT) refers to networked computing devices that may send data without human input. In contrast, the Internet is valuable; it can pose a significant cybersecurity risk to critical infrastructure.</p> Sunmathi R, Tharun Teja G, Lakshmanaprakash S, Abirami A Copyright (c) 2024 Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS/article/view/394 Mon, 29 Apr 2024 00:00:00 +0000 An Investigative Study for the Role of Bio-inspired Algorithms for the Detection of Cyber Bullies https://matjournals.net/engineering/index.php/JCSCS/article/view/381 <p>This study delves into cyberbullying detection through the lens of bio-inspired algorithms. Cyberbullying poses a significant threat to an individual's mental well-being and societal harmony in the digital age. Due to online interactions' dynamic and nuanced nature, traditional detection methods often need to catch up. Drawing inspiration from natural processes, bio-inspired algorithms offer a promising avenue to tackle this complex problem. This investigative study explores the efficacy of bio-inspired algorithms, such as genetic algorithms, swarm intelligence, and artificial immune systems, in identifying cyberbullying instances across various online platforms. Through empirical analysis and experimentation, the study seeks to evaluate the performance of these algorithms in comparison to conventional approaches. Additionally, it endeavours to uncover the underlying mechanisms driving their effectiveness and potential areas for refinement. The results of this study can help design and develop accurate cyber-bullying detection systems, thereby contributing to the creation of safer online environments for individuals of all ages.</p> Akula Veera Vasu Sriphalya, Mutya Sri Lakshmi Meher Gayatri , Manas Kumar Yogi Copyright (c) 2024 Journal of Cyber Security in Computer System https://matjournals.net/engineering/index.php/JCSCS/article/view/381 Fri, 26 Apr 2024 00:00:00 +0000