• Search Menu
  • Editor's Choice
  • Author Guidelines
  • Submission Site
  • Open Access
  • About Journal of Cybersecurity
  • Editorial Board
  • Advertising and Corporate Services
  • Journals Career Network
  • Self-Archiving Policy
  • Journals on Oxford Academic
  • Books on Oxford Academic

Issue Cover

Editors-in-Chief

Tyler Moore

About the journal

Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security …

Latest articles

research paper of information security

Call for Papers: Workshop on the Economics of Information Security

Journal of Cybersecurity is inviting submissions to a new special issue from the workshop on the economics of information security. Authors whose papers appeared at the workshop are invited to submit a revised version to the journal.

Cybersecurity Month

Call for Papers

Journal of Cybersecurity is soliciting papers for a special collection on the philosophy of information security. This collection will explore research at the intersection of philosophy, information security, and philosophy of science.

Find out more

submit

Submit your paper

Join the conversation moving the science of security forward. Visit our Instructions to Authors for more information about how to submit your manuscript.

CYBERS High Impact 480x270.png

High-Impact Research Collection

Explore a collection of recently published high-impact research in the  Journal of Cybersecurity .

Browse the collection  here

research paper of information security

Email alerts

Register to receive table of contents email alerts as soon as new issues of  Journal of Cybersecurity  are published online.

Read and publish

Read and Publish deals

Authors interested in publishing in Journal of Cybersecurity may be able to publish their paper Open Access using funds available through their institution’s agreement with OUP.

Find out if your institution is participating

Related Titles

cybersecurityandcyberwar

Affiliations

  • Online ISSN 2057-2093
  • Print ISSN 2057-2085
  • Copyright © 2024 Oxford University Press
  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright © 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

EURASIP Journal on Information Security

EURASIP Journal on Information Security Cover Image

Featured Article: "Implementing a blockchain from scratch: why, how, and what we learned"

This paper, co-written by one of our former associate editors, Dominik Engel, alongside Fabian Knirsch and Andreas Unterweger, introduces the core concepts of blockchain technology. It then investigates a real-world use case from the energy domain and evaluates the need for blockchain technology within this use case. Read more...

Open special issues

Trends in Digital Identity: Security, Privacy, and Trust Deadline for submissions: 30 June 2024

Journal on Information Security welcomes proposals for Special Issues on timely topics relevant to the field of signal processing. If you are interested in publishing a collection with us, please  read our guidelines here.  

View our collection of published special issues here

  • Most accessed

Machine learning security and privacy: a review of threats and countermeasures

Authors: Anum Paracha, Junaid Arshad, Mohamed Ben Farah and Khalid Ismail

Intelligent multi-agent model for energy-efficient communication in wireless sensor networks

Authors: Kiran Saleem, Lei Wang, Salil Bharany, Khmaies Ouahada, Ateeq Ur Rehman and Habib Hamam

FEDDBN-IDS: federated deep belief network-based wireless network intrusion detection system

Authors: M. Nivaashini, E. Suganya, S. Sountharrajan, M. Prabu and Durga Prasad Bavirisetti

Cancelable templates for secure face verification based on deep learning and random projections

Authors: Arslan Ali, Andrea Migliorati, Tiziano Bianchi and Enrico Magli

RETRACTED ARTICLE: Network security threat detection technology based on EPSO-BP algorithm

Authors: Zhu Lan

Most recent articles RSS

View all articles

Managing confidentiality leaks through private algorithms on Software Guard eXtensions (SGX) enclaves

Authors: Kubilay Ahmet Küçük, David Grawrock and Andrew Martin

A survey on biometric cryptosystems and cancelable biometrics

Authors: Christian Rathgeb and Andreas Uhl

Implementing a blockchain from scratch: why, how, and what we learned

Authors: Fabian Knirsch, Andreas Unterweger and Dominik Engel

phishGILLNET—phishing detection methodology using probabilistic latent semantic analysis, AdaBoost, and co-training

Authors: Venkatesh Ramanathan and Harry Wechsler

Error correcting codes for robust color wavelet watermarking

Authors: Wadood Abdul, Philippe Carré and Philippe Gaborit

Most accessed articles RSS

Call for Special Issues

EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing. The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide overviews of the state-of-the-art in emerging domains.

Special issue proposals in the format of a single  PDF document , are required to be submitted by e-mail to [email protected] . Please include in the subject line ‘JINS Special Issue Proposal’.

Read more here

Latest Tweets

Your browser needs to have JavaScript enabled to view this timeline

Society affiliation

The European Association for Signal Processing (EURASIP) was founded on 1 September 1978 to improve communication between groups and individuals that work within the multidisciplinary, fast growing field of signal processing in Europe and elsewhere, and to exchange and disseminate information in this field all over the world. The association exists to further the efforts of researchers by providing a learned and professional platform for dissemination and discussion of all aspects of signal processing including continuous- and discrete-time signal theory, applications of signal processing, systems and technology, speech communication, and image processing and communication. EURASIP members are entitled to a 10% discount on the article-processing charge. To claim this discount, the corresponding author must enter the membership code when prompted. This can be requested from their EURASIP representative.

Your browser needs to have JavaScript enabled to view this video

The EURASIP Journal on Information Security is delighted the announce the appointment of our new Editor-in-Chief, Dr. Zekeriya Erkin

Zekeriya Erkin JINS

  • Aims and Scope
  • Editorial Board
  • Sign up for article alerts and news from this journal
  • Follow us on Twitter
  • Follow us on Facebook

Who reads the EURASIP Journal on Information Security

Who reads the journal?

Learn more about the impact the EURASIP Journal on Information Security has worldwide

Affiliated with

research paper of information security

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/publications/assessing-security-requirements-controlled-unclassified-information-1

Assessing Security Requirements for Controlled Unclassified Information

Download paper, additional citation formats.

  • Google Scholar

If you have any questions about this publication or are having problems accessing it, please contact [email protected] .

Cookies on GOV.UK

We use some essential cookies to make this website work.

We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.

We also use cookies set by other sites to help us deliver content from their services.

You have accepted additional cookies. You can change your cookie settings at any time.

You have rejected additional cookies. You can change your cookie settings at any time.

research paper of information security

  • Business and industry
  • Science and innovation
  • Artificial intelligence

Research on the cyber security of AI

A collection of government research reports on the cyber security of artificial intelligence, including surveys and literature reviews.

Cyber security risks to artificial intelligence

Cyber security risks to artificial intelligence (pdf).

PDF , 546 KB , 36 pages

AI cyber security survey - main report

Ai cyber security survey - main report (pdf).

PDF , 844 KB , 25 pages

AI cyber security survey - technical report

Ai cyber security survey - technical report (pdf).

PDF , 686 KB , 31 pages

Cyber security for AI recommendations

PDF , 503 KB , 31 pages

Study of research and guidance on the cyber security of AI

PDF , 802 KB , 23 pages

As part of the £2.6 billion  National Cyber Strategy  the government is working to protect and promote the UK online. This includes taking the lead in the technologies vital to cyber power and securing the next generation of connected technologies, including artificial intelligence ( AI ).

To ensure the opportunities of AI are fully realised, systems must be developed, deployed and operated in a secure and responsible way. The research reports published here support the government’s policy work on the cyber security of AI and complement the call for views on AI cyber security being held between May and July 2024.

For more information and to provide your input, please see the Call for Views on the Cyber Security of AI .

This work was announced at the CyberUK 2024 conference. 

For more information, please read the press notice

This is part of our plan to ensure the UK continues to be a leading responsible and democratic cyber power, with a secure digital economy.

Is this page useful?

  • Yes this page is useful
  • No this page is not useful

Help us improve GOV.UK

Don’t include personal or financial information like your National Insurance number or credit card details.

To help us improve GOV.UK, we’d like to know more about your visit today. Please fill in this survey .

Budget 2024-25 - home

Cost of living help and a future made in Australia

Strengthening medicare and the care economy.

Building a better health system than improves outcomes

Print or save page

On this page

High‑quality health services through Medicare

Boosting access to essential health services

Building a better healthcare system

The Government is investing $2.8 billion to continue its commitment to strengthen Medicare. This includes the $1.2 billion package to address pressures facing the health system, which provides:

  • $882.2 million to support older Australians avoid hospital admission, be discharged from hospital earlier and improve their transition out of hospital to other appropriate care.
  • $227 million to deliver a further 29 Medicare Urgent Care Clinics and boost support for regional and remote clinics. This will increase the total number of clinics across Australia to 87. Since commencing last year, existing clinics have already provided almost 400,000 bulk‑billed visits.
  • $90 million to address health workforce shortages by making it simpler and quicker for international health practitioners to work in Australia.

research paper of information security

Rohan’s daughter Zoya has been  off school with a runny nose and a cough. By 6pm, she is lethargic and has a fever.

Rohan is concerned because his regular GP is now closed. Instead of waiting for hours at the emergency department, he takes Zoya to a Medicare Urgent Care Clinic, without having to make an appointment. 

During the bulk billed visit, Zoya is diagnosed with an infection by the doctor and prescribed appropriate medication. Rohan and Zoya leave within an hour of arrival. Zoya makes a full recovery.

Improving health outcomes

Almost half of Australians live with a chronic condition. This Budget will provide $141.1 million for research and services for people living with chronic conditions, including bowel and skin cancer, diabetes and dementia.

To improve health outcomes, the Government is providing:

  • Support for Australians to enjoy healthier, more active lives by investing $132.7 million in sport participation and performance programs.
  • $825.7 million to ensure Australians can continue to access testing for and vaccinations against COVID‑19. The Government is also ensuring continued access to oral antiviral medicines on the Pharmaceutical Benefits Scheme.
  • $41.6 million over two years to continue funding for alcohol and other drug treatment and support services, including the Good Sports alcohol management program for community sporting clubs.

The Government is allocating an additional $411.6 million (for a total $1.6 billion over 13 years) through the Medical Research Future Fund to continue existing research and introduce two new research missions for low‑survival cancers and reducing health inequities.

Improving access to medicines

The Government is investing $3.4 billion for new and amended listings to the Pharmaceutical Benefits Scheme, which means eligible patients can save on treatment costs.

By expanding the Closing the Gap Pharmaceutical Benefits Scheme Co‑payment Program, eligible First Nations patients will have free or cheaper access to all Pharmaceutical Benefits Scheme medicines.

Australians will benefit from $141.1 million to support and expand the National Immunisation Program.

Mental health support

The Government’s $888.1 million mental health package over eight years will help people get the care they need, while relieving pressure on the Better Access initiative and making it easier to access services.

A free, low‑intensity digital service will be established to address the gap for people with mild mental health concerns. From 1 January 2026, Australians will be able to access the service without a referral and receive timely, high‑quality mental health support. Once fully established, 150,000 people are expected to make use of this service each year.

The Government is improving access to free mental health services through a network of walk‑in Medicare Mental Health Centres, built on the established Head to Health network. The upgraded national network of 61 Medicare Mental Health Centres will open by 30 June 2026. They will provide clinical services for adults with moderate‑to‑severe mental health needs.

For Australians with complex mental health needs, funding will be provided for Primary Health Networks to partner with GPs to deliver multidisciplinary, wraparound support services and care coordination.

Improving the aged care system

Providing quality care

The Budget provides $2.2 billion to deliver aged care reforms and continue implementing recommendations from the Royal Commission into Aged Care Quality and Safety.

The new Aged Care Act will put the rights and needs of older people at the centre of the aged care system. The new Act will provide the framework for fundamental change within the aged care sector.

More Home Care Packages

The Government is investing $531.4 million to release an additional 24,100 Home Care Packages in 2024–25. This will help reduce average wait times and enable people to age at home if they prefer to do so.

Improving aged care regulation

Funding of $110.9 million over four years will support an increase in the Aged Care Quality and Safety Commission’s regulatory capabilities.

The Government is investing $1.2 billion in critical digital systems to support the introduction of the new Aged Care Act and contemporary IT systems.

The My Aged Care Contact Centre will receive $37 million to reduce call‑waiting times for people seeking information and access to aged care.

Higher wages for aged care workers

The Government has committed to fund the Fair Work Commission decision to increase the award wage for direct and indirect aged care workers once the final determination is made. This will build on the $11.3 billion already allocated to support the interim 15 per cent wage increase for aged care workers.

The Government is providing $87.2 million for workforce initiatives to attract nurses and other workers into aged care.

Reforming the disability sector

Better and more sustainable services

Getting the National Disability Insurance Scheme (NDIS) back on track

A further $468.7 million is being provided to support people with disability and get the NDIS back on track. This includes:

  • $214 million over two years to fight fraud and to co‑design NDIS reforms with people with disability, announced earlier this year
  • $160.7 million to upgrade the NDIS Quality and Safeguards Commission’s information technology
  • $45.5 million to establish a NDIS Evidence Advisory Committee
  • $20 million to start consultation and design on reforms to help NDIS participants and people with disability navigate services.

This builds on $732.9 million provided in the 2023–24 Budget.

In December 2023, National Cabinet agreed to work together to improve the experience of participants and restore the original intent of the Scheme to support people with permanent and significant disability, within a broader ecosystem of supports. This builds on an earlier decision by National Cabinet to ensure Scheme sustainability and achieve an 8 per cent growth target by 1 July 2026, with further moderation as the NDIS matures.

Improving employment for people with disability

A $227.6 million investment will support a new specialised disability employment program to replace the existing Disability Employment Services program by 1 July 2025. This includes a modern digital platform for providers and participants. These reforms will support more people with disability into sustainable work, through a program with greater flexibility, increased individual supports, and better service quality. Eligibility will be expanded to include volunteers outside the income support system and those with less than eight hours per week work capacity.

Delivering essential services

Investing in reliability and security

Strengthening resourcing for Services Australia

The Government is delivering safer and more efficient government services for all Australians.

A $1.8 billion provision will support delivery of customer and payment services. This includes funding for frontline and service delivery staff to manage claims, respond to natural disasters and improve the cyber security environment. The Government is providing $314.1 million over two years to strengthen safety and security at Services Australia centres.

The Government is investing $580.3 million over four years and $139.6 million per year ongoing to sustain the myGov platform and identify potential enhancements. A further $50 million will improve usability, safety and security of the myGov platform and ensure Services Australia can support people to protect their information and privacy.

Strengthening the Australian Taxation Office (ATO) against fraud

There will be $187.4 million to better protect taxpayer data and Commonwealth revenue against fraudulent attacks on the tax and superannuation systems. Funding will upgrade the ATO’s information and communications technologies and increase fraud prevention capabilities to manage increasing risk, prevent revenue loss, and support victims of fraud and cyber crime.

Looking after our veterans

Veterans’ claims processing is prioritised with an additional $186 million for staffing resources and $8.4 million to improve case management and protect against cyber risk. The Government will provide $222 million to harmonise veterans’ compensation and rehabilitation legislation.

A further $48.4 million will be available for Veterans’ Home Care and Community Nursing programs and $10.2 million to provide access to funded medical treatment for ill and injured veterans while their claims for liability are processed.

Back to top

research paper of information security

ICT: Cyber Security and Applications

Proceedings of ICTCS 2023, Volume 3

  • Conference proceedings
  • © 2024
  • Amit Joshi 0 ,
  • Mufti Mahmud 1 ,
  • Roshan G. Ragel 2 ,
  • S. Kartik 3

Global Knowledge Research Foundation, Ahmedabad, India

You can also search for this editor in PubMed   Google Scholar

Nottingham Trent University, Nottingham, UK

University of peradeniya, delthota, sri lanka, department of cse, sns college of technology, coimbatore, india.

  • Presents high-quality research in the field of information and communication technology
  • Features the outcomes of ICTCS 2023, held in Jaipur, India
  • Serves as a reference resource for researchers and practitioners in academia and industry

Part of the book series: Lecture Notes in Networks and Systems (LNNS, volume 916)

Included in the following conference series:

  • ICTCS: International Conference on Information and Communication Technology for Competitive Strategies

Conference proceedings info: ICTCS 2022.

This is a preview of subscription content, log in via an institution to check access.

Access this book

  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (40 papers)

Front matter, scalability analysis of molecular dynamics simulation using namd on ampere-based dense gpu supercomputer.

  • Nisha Agrawal, Abhishek Das, Manish Modani

Digital Muhadathah : Framework Model Development for Digital Arabic Language Learning

  • Aminudin Hehsan, Miftachul Huda, Mahsun Mahsun, Asrori Asrori, Muhammad Hambal Shafwan, Din Muhammad Zakariya et al.

Proficient Exam Monitoring System Using Deep Learning Techniques

  • Priya N. Parkhi, Amna Patel, Dhruvraj Solanki, Himesh Ganwani, Manav Anandani

Object Detection in Rainy Images Based on Multi-stage Image Deraining Network

  • V. S. Vishnu, Philomina Simon

ApnaMarket.NFT: Empowering Art and Collectibles in the NFT Marketplace

  • Padma Adane, Viresh Dhawan, Harsh Singh, Atharva Baheti

Smart Homes of Tomorrow: IoT-Enabled Lifestyle Enhancements

  • Priyanka Patel, Krishna Gevariya, Rency Kapadia

Human Activity Recognition Using Supervised Machine Learning Classifiers

  • Kazi Azizuddin, Premal Patel, Chintan Shah

Application of Deep Learning in Detection and Classification

  • P. K. Muhammad Suarim, Meeradevi, B. J. Sowmya, Prathik Boppudi, Vivek Ranjan, Yashraj Verma et al.

Gesture-Based Alphabet Detection and Scoring Using OpenCV and Tesseract-OCR

  • Karan Chopra, S. Shanthi Therese

Sign-Kiosk: A Real-Time Virtual Assistant

  • Srushti Sujit, Anchala Balaraj, M. S. Pavan Kumar, A. Sagar, M. Anuradha

A Graph-Based Strategy for Intrusion Detection in Connected Vehicles

  • M. S. Sreelekshmi, S. Aji

Correlation Analysis Between INR-USD Exchange Rates and Public Sentiments Using Twitter

  • Gargee Dorle, Varsha Pimprale

Improving Farm Yield Through Agent-Based Modelling

  • Dattatraya Adane, Anand Upadhyaya, Mayank Pandey, Yash Dhoot

A Recommendation System for Food Tourism

  • Dattatraya S. Adane, Himanshu Shahu, Parshva Choradia, Ritesh Yadav

Working of the Tesseract OCR on Different Fonts of Gujarati Language

  • Kartik Joshi, Harshal Arolkar

Exploring Innovations for Streamlining Orphan Adoption: Harnessing Blockchain and Decentralized Solutions—A Survey and Comprehensive Framework

  • Deepali Patil, Aabha Patil, Aarti Puthran, Nilesh Marathe, Surekha Janrao, Hezal Lopes

Encryption + Watermarking: A Duo Approach for Secure Image Communication in Transform Domain

  • R. Sivaraman, D. Yasvanthira Sri, R. Subashini, B. Vinizia, C. Lakshmi

Animal Detection in Wildlife Conservation Using Deep Learning

  • B. Senbagam, S. Bharathi

Real-Time Groundwater Monitoring Using IoT Sensors for Sustainable Resource Management

  • M. Sowndharya, S. Duraisamy

Other volumes

Information and communication technology for competitive strategies (ictcs 2022).

  • Information and Communication Technology
  • Big Data and Data Mining
  • Sensor Networks and Embedded System
  • Human Computer Interaction
  • E-governance
  • ICTCS 2023 Proceedings

About this book

This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 – 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security. The work is presented in three volumes.

Editors and Affiliations

Mufti Mahmud

Roshan G. Ragel

About the editors

Dr. Amit Joshi is currently the Director of Global Knowledge Research Foundation, also an Entrepreneur  Researcher who has completed his Masters and research in the areas of cloud computing and cryptography in medical imaging. Dr. Joshi has an experience of around 10 years in academic and industry in prestigious organizations. Dr. Joshi is an active member of ACM, IEEE, CSI, AMIE, IACSIT-Singapore, IDES, ACEEE, NPA and many other professional societies. Currently, Dr. Joshi is the International Chair of InterYIT at International Federation of Information Processing (IFIP, Austria), He has presented and published more than 50 papers in national and international journals/conferences of IEEE and ACM. Dr. Joshi has also edited more than 40 books which are published by Springer, ACM and other reputed publishers. Dr. Joshi has also organized more than 50national and international conferences and programs in association withACM, Springer, IEEE to name a few across different countries including India, UK, Europe, USA, Canada, Thailand, Egypt and many more.

Dr. Mufti Mahmud is an Associate Professor of Cognitive Computing at the Computer Science Department of Nottingham Trent University (NTU), UK. He has been the recipient of the top 2% cited scientists worldwide in computer science (since 2020), the NTU VC Outstanding Research Award 2021, and the Marie-Curie postdoctoral fellowship. Dr Mahmud is a member of the university shadow executive team shadowing the pro-vice-chancellor (research and innovation), coordinator of the Computer Science and Informatics research excellence framework unit of assessment at NTU, the group leader of the cognitive computing & brain informatics research group and the deputy group leader of the Interactive Systems research group at NTU. His research portfolio consists of GBP 4.0 million grant capture with expertise that includes brain informatics, computational intelligence, applied data analysis, and big data technologies focusing on healthcare applications. In these fields, he has published over 320 peer-reviewed articles. Dr Mahmud has been the General Chair of the Brain Informatics Conference 2020, 2021, and 2022; founding chair of the Applied Intelligence and Informatics conference since 2021;  Trends in Electronics and Health Informatics 2022; International Symposium of Green Technologies and Applications 2023; chair of the IEEE CICARE symposium since 2017 and was the local organising chair of the IEEE WCCI 2020. He will serve as one of the General Chairs of the 31st edition of the ICONIP conference to be held in Auckland (NZ) in 2024. He is the Big Data Analytics Section Editor of Cognitive Computation, the Regional Editor (Europe) of the Brain Informatics journal, and an Associate Editor of the Frontiers in Neuroscience. He is the chief editor of the Applied Intelligence and Informatics (Springer-Nature) and Smart Healthcare Systems: From Data to Knowledge (CRC Press) book series. Currently, Dr Mahmud is serving as the Chair of the Intelligent System Application and Brain Informatics Technical Committees of the IEEE Computational Intelligence Society (CIS), a member of the IEEE CIS Task Force on Intelligence Systems for Health, the Publications Chair of the IEEE UK and Ireland Industry Applications Chapter, and the Project Liaison Officer of the IEEE UK and Ireland SIGHT Committee, and the Secretary of the IEEE UK and Ireland CIS Chapter. Dr. Roshan Ragel is a full professor in Computer Engineering at the University of Peradeniya, Sri Lanka. He is a skilled university lecturer and researcher with a doctorate in computer science and engineering and a passion for teaching, research and administration. His research interest is in the areas of fault-tolerant and dependable computing, accelerated and high-performance computing, wearable computing and synthesis of secure and reliable embedded processors.Prof. Ragel received his PhD in Computer Science and Engineering from the University of New South Wales, Australia in 2007 and his BSc in Engineering from the University of Peradeniya, Sri Lanka in 2001. He was appointed a Senior Lecturer in Computer Engineering at the University of Peradeniya December 2007 and a full professor since October 2017. Prof. Ragel has co-authored about 150 peer-reviewed articles in topics including Micro- Architectural Support for Reliability and Security in Embedded Processors (SoC), Internet of Things (IoT), Side-Channel Attacks and Countermeasures, Application Specific Processor Design, High-Performance Computing such as Hardware/Software Acceleration of Bioinformatics Algorithms, Wearable Computing, Format-Preserving Digitisation and OCR of Local Language Text, and Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHAs) in the Context of Mobile Applications. He has won several best paper awards in conference papers, the most prolific Sri Lankan author award from Elsevier Research in 2017 and the Presidential award for scientific publication in Sri Lanka in 2018. He was a visiting research scholar at the UNSW, Sydney a few times and UIUC, Illinois once. He is a Senior Member of the IEEE and the IEEE Computer Society.

Dr. S. Karthik is presently Professor & Dean in the Department of Computer Science & Engineering, SNS College of Technology, affiliated to Anna University- Chennai, Tamil Nadu, India. He received the M.E and PhD degree from Anna University, Chennai. His research interests include network security, big data, cloud computing, web services and wireless systems. In particular, he is currently working in a research group developing new Internet security architectures and active defence systems against DDoS attacks. Dr. S.Karthik published more than 200 papers in refereed international journals and 125 papers in conferences and has been involved in many international conferences as Technical Chair and tutorial presenter.  He is an active member of IEEE, ISTE, IAENG, IACSIT and Indian Computer Society.

Bibliographic Information

Book Title : ICT: Cyber Security and Applications

Book Subtitle : Proceedings of ICTCS 2023, Volume 3

Editors : Amit Joshi, Mufti Mahmud, Roshan G. Ragel, S. Kartik

Series Title : Lecture Notes in Networks and Systems

DOI : https://doi.org/10.1007/978-981-97-0744-7

Publisher : Springer Singapore

eBook Packages : Engineering , Engineering (R0)

Copyright Information : The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024

Softcover ISBN : 978-981-97-0743-0 Published: 14 May 2024

eBook ISBN : 978-981-97-0744-7 Published: 13 May 2024

Series ISSN : 2367-3370

Series E-ISSN : 2367-3389

Edition Number : 1

Number of Pages : XX, 501

Number of Illustrations : 72 b/w illustrations, 189 illustrations in colour

Topics : Communications Engineering, Networks , Science and Technology Studies , Systems and Data Security , Computational Intelligence , Artificial Intelligence

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

research paper of information security

Department of Agricultural, Food, and Resource Economics Innovation Lab for Food Security Policy, Research, Capacity and Influence

research paper of information security

Maize Price Shocks, Food Expenditure and the Mediating Role of Access to Market in Ghana

May 14, 2024 - Edward Martey, Justina Adwoa Onumah, Frank Adusah-Poku

share this on facebook

The existing empirical literature on the impact of food price shocks on food consumption has primarily concentrated on market-purchased foods, offering limited insights into home-produced foods and food quality. Addressing this gap, our study employs panel data from Ghana to investigate the relationship between exposure to positive maize price shocks and price variability and household consumption patterns of nutrient-dense and less nutrient-dense diets, considering both market purchases and home production. Our findings indicate that maize price shocks lead to a reduction in households' consumption of purchased nutrient-dense and less nutrient-dense food groups, while increasing the consumption of home-produced nutrient-dense food groups. The effects of maize price shocks on diet consumption vary across household types, primary crop cultivation, and wealth status. Additionally, access to markets emerges as a crucial mechanism through which maize price shocks influence households' consumption of nutrient-dense and less nutrient-dense diets. The implications of our study underscore the significance of enhanced market access and policy interventions aimed at mitigating food price increases to improve food nutrition security.

 maize price shocks; food consumption; nutrient-dense diets; market access; Ghana

DOWNLOAD FILE

Tags: prci research paper

new - method size: 1 - Random key: 0, method: personalized - key: 0

You Might Also Be Interested In

STAAARS+ RFP webinar Sept 14 2022

Published on September 15, 2022

PRCI STAAARS+ Teams Presentation Video 2022

Published on July 26, 2022

research paper of information security

Scoping Study of Agriculture Development Strategy of Nepal (ADS) (Five-year achievements)

Published on February 1, 2023

Sugarcane Production and Food Security in Uganda

Published on September 1, 2023

Institutional Arrangements Between Sugarcane Growers and Millers in Uganda and Implications for Grower Productivity and Profitability

research paper of information security

Rwanda Natural Forest Cover Dynamics between 2015 and 2020

Published on June 19, 2023

Accessibility Questions:

For questions about accessibility and/or if you need additional accommodations for a specific document, please send an email to ANR Communications & Marketing at [email protected] .

  • prci research paper,
  • innovation lab for food security policy research capacity & influence

IMAGES

  1. 😊 Information security research papers. Essay Information Security

    research paper of information security

  2. 😍 Web security research papers. Research Paper On Web Services Security

    research paper of information security

  3. 😀 Web security research papers. Web Services Research Papers. 2019-01-21

    research paper of information security

  4. (PDF) Research Paper on Cyber Security

    research paper of information security

  5. 😊 Information security research papers. Essay Information Security

    research paper of information security

  6. Network Security Research Paper

    research paper of information security

VIDEO

  1. 2023 Question Paper Of Security Analysis And Portfolio Management #importantquestions #hindi #import

  2. Why Privacy Matters in Cybersecurity

  3. class 10 information technology answer key 2024

  4. Information Security (18)| Legal and Social Issues in Information Security| by Arfan Shahzad

  5. class 10 information techn 402 answer key 2024

  6. Semantic Annotation of ACM research papers

COMMENTS

  1. Journal of Information Security and Applications

    Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications.JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying ...

  2. Information Security:A Review of Information Security Issues and

    In this paper, we illustrate the factors that impact information security in different fields; cyber security, Internet of Things and network security from various studies and outline the security requirements to reduce this impact. ... Information security is defined as protecting the information, the system, and the hardware that use, store ...

  3. Home

    The International Journal of Information Security is a comprehensive resource for critical advancements in the field of information security. Presents important technical work in information security, whether theoretical, applicable, or related to implementation. Covers system security, network security, content protection, applications.

  4. Journal of Cybersecurity

    About the journal. Journal of Cybersecurity publishes accessible articles describing original research in the inherently interdisciplinary world of computer, systems, and information security …. Find out more. The simple economics of an external shock to a bug bounty platform. The cybersecurity of fairy tales.

  5. 134940 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on INFORMATION SECURITY. Find methods information, sources, references or conduct a literature review on ...

  6. Artificial intelligence for cybersecurity: Literature review and future

    The article is a full research paper (i.e., not a presentation or supplement to a poster). ... Grammatikis et al. presented a security information and event management system specifically tailored for the smart grid to detect, normalize and correlate cyberattacks and anomalies against a range of smart-grid application layer protocols [195].

  7. Information Security Journal: A Global Perspective

    Reach an engaged target audience and position your brand alongside authoritative peer-reviewed research by advertising in Information Security Journal: A Global Perspective. Publishes research on security-related tools, policy and technology like telecommunications, computer operations and physical, cloud and cryptography security.

  8. Cyber risk and cybersecurity: a systematic review of data ...

    Depending on the amount of data, the extent of the damage caused by a data breach can be significant, with the average cost being USD 392 million Footnote 1 (IBM Security 2020). This research paper reviews the existing literature and open data sources related to cybersecurity and cyber risk, focusing on the datasets used to improve academic ...

  9. Information systems security research agenda: Exploring the gap between

    Topic modeling of Information Systems Security research between 1990 and 2020. • Delphi study of CISOs to rank order important Information Systems Security concerns. • Explores the gap between what practitioners consider to be important and what researchers are currently studying. • Develop a research agenda in Information Systems Security.

  10. Journal of Cybersecurity and Privacy

    We highlight the contribution to improving the communication of security information, including the systematic mapping between user-defined security guidance and information derived from knowledge bases. ... Finally, we conclude this paper with future research directions for quantifying the security of SA systems. Full article (This article ...

  11. Privacy Prevention of Big Data Applications: A Systematic Literature

    Information security is a Big Data issue. The research community is focusing on the development in the period of Big Data, computer science, and increasing business applications of quick and efficient algorithms for Big Data security intelligence, with the primary aim of ensuring a safe environment free of unlawful access (Cheng et al., 2017).

  12. Organizational information security policies: a review and research

    Research indicates that most organizations have some type of security policy in place (Goel and Chengalur-Smith, 2010).However, security policies differ greatly among organizations depending on the value and sensitivity of the information and technology resources to be protected, as well as the potential implications of damage, modification, or disclosure of the information to the organization ...

  13. Home page

    EURASIP Journal on Information Security (JINS) welcomes Special Issues on timely topics related to the field of signal processing.The objective of Special Issues is to bring together recent and high quality works in a research domain, to promote key advances in information security, with a particular emphasis on the use of signal processing tools in adversarial environments and to provide ...

  14. (PDF) Information security policies: A review of challenges and

    A security policy is defined in a formal document that. specifies what constuitutes acceptable and unacceptable. behaviour of users in relation to dealing w ith information assets. in a secure ...

  15. Big Data Security and Privacy Protection

    In view of the wide application and popularization of large data, more and more data security and privacy issues have brought great challenges to the development of large data. Starting from the characteristics of big data, this paper analyses various risks of information security, and puts forward the corresponding development strategy of big data security. The results show that the ...

  16. (PDF) Information Security Risk Assessment

    Technology, Lahore 54770, Pakistan; [email protected]. * Correspondence: [email protected]. Definition: Information security risk assessment is an important part of enterprises ...

  17. Too Close for Comfort: Cyber Terrorism and Information Security across

    The choice for cyber security, with a focus on technical security and the security of vital infrastructures, was in answer to "(…) growing concerns that the broad definition of "information security" advanced by Moscow and Beijing is a Trojan horse for content control and a human rights issues at heart".

  18. Information Security Management Practices: Case Studies from India

    Information security is the 'application of any technical methods and managerial processes on the information resources (hardware, software and data) in order to keep organizational assets and personal privacy protected' (Hong, Chi, Chao & Tang, 2006).Whereas, information security management (ISM) consists the set of activities involved in configuring resources in order to meet information ...

  19. Research on Virus Propagation Network Intrusion Detection Based on

    The field of network security is highly concerned with intrusion detection, which safeguards the security of computer networks. The invention and application of intrusion detection technology play indispensable roles in network security, and it is crucial to investigate and comprehend this topic. Recently, with the continuous occurrence of intrusion incidents in virus propagation networks ...

  20. Information Security Policy Compliance: Systematic Literature Review

    Inclusion criteria written in English time publication at 2014 to 2018 study discussion about human behavior in information security policies and about organization compliance in area information security, information technology, and management information system if similar paper found at a conference and journal, only from the journal will be ...

  21. Assessing Security Requirements for Controlled Unclassified Information

    This publication provides organizations with assessment procedures and a methodology that can be used to conduct assessments of the security requirements in NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. The assessment procedures are flexible and can be customized to the needs of ...

  22. Applied Sciences

    A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications. Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the ...

  23. Research on the cyber security of AI

    Research and statistics. Reports, analysis and official statistics. Policy papers and consultations. Consultations and strategy. Transparency. Data, Freedom of Information releases and corporate ...

  24. United States International Cyberspace & Digital Policy Strategy

    Leadership in cyberspace, the digital economy, and emerging digital technologies is central to advancing the U.S. vision set forth in the October 2022 National Security Strategy (NSS) of a "free, open, secure, and prosperous world.". As the lead foreign policy agency for the United States, the Department of State is advancing the 2023 ...

  25. (PDF) Information security

    Information security threats can be. broken down into a number of different kinds: The intentional consequences of intentional actions, for example, hacking, denial of service attacks, mal ...

  26. Strengthening Medicare and the care economy

    The Government is investing $580.3 million over four years and $139.6 million per year ongoing to sustain the myGov platform and identify potential enhancements. A further $50 million will improve usability, safety and security of the myGov platform and ensure Services Australia can support people to protect their information and privacy.

  27. Full article: The moderating role of institutions between FDI and GDP

    The paper studies the role of institutions as moderating variables in the relationship between FDI and GDP and between FDI and employment-to-population ratio (EPR). The investigated period is from 1991 to 2020. The paper examines whether institutions hold an influence on the relationship, its direction (positive or negative), and its strength.

  28. ICT: Cyber Security and Applications

    This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies. The conference will be held in Jaipur, India during 8 - 9 December 2023. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective ...

  29. Maize Price Shocks, Food Expenditure and the Mediating Role of Access

    Issued in furtherance of MSU Extension work, acts of May 8 and June 30, 1914, in cooperation with the U.S. Department of Agriculture. Quentin Tyler, Director, MSU Extension, East Lansing, MI 48824. This information is for educational purposes only.

  30. Research paper A comprehensive review study of cyber-attacks and cyber

    Cyber-security policy may require that "when the risk of disclosure of confidential information is high, information should not be provided without carefully examining the recipient's ability to maintain information security (Arend et al., 2020). This policy leaves the assessment of data risk to a manager who may want to reduce costs using ...