Sanaz Kavianpour | Abertay University (original) (raw)

Papers by Sanaz Kavianpour

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, Jul 10, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Next-Generation Capabilities in Trusted Research Environments: Interview Study

Journal of Medical Internet Research, Sep 20, 2022

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage

Facebook is significant platform for third-party developers to run written applications in order ... more Facebook is significant platform for third-party developers to run written applications in order to provide users extra functionality and services. Third-party applications (TPAs) access to user’s profile and exchange their information. In doing so, this may lead to information leakage and privacy risks. Although Facebook has control over third-party applications, it still lacks control in the existing mechanisms. The aim of this paper is to investigate how to hinder TPAs from accessing user’s private information while still sustaining the functionality of the applications. To address privacy and functionality simultaneously, this study suggests a classification framework providing mechanism in controlling TPAs access to the users’ data residing on Facebook. The improved framework allows TPAs to utilize some of users’ data according to their classification authority to mitigate users’ information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, 2020

With the popularity of Internet of Things (IoT) technology, the security of the IoT network has b... more With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab–knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Journal of Computer Networks and Communications, 2019

Internet of Things (IoT) has become one of the most significant technologies in recent years beca... more Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A privacy-preserving model to control social interaction behaviors in social network sites

Journal of Information Security and Applications, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Intrusion Detection System Based on NSGA-II Algorithm

2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015

Attack detection is one of the most important issues for computer networks security. Intrusion De... more Attack detection is one of the most important issues for computer networks security. Intrusion Detection System (IDS) monitors network for malicious activity. In this paper, a method is proposed to identify the attacks in IDS. This method generates rule sets for Intrusion Detection System using non-dominated sorting genetic algorithm (NSGA-II). NSGA-II is one type of multi objective genetic algorithms. This method considers features of computer connection and defines two different fitness functions for generating the rules. The advantage of this method compared with previous methods which applied Evolutionary Algorithm. Since some methods applied one fitness function or convert many objectives to single objective, they lost many features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chronic ataxic neuropathy with cold agglutinins: Atypical phenotype and response to anti-CD20 antibodies

Neurology, 2003

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework to Detect Cyber-attacks against Networked Medical Devices (Internet of Medical Things): An Attack-Surface-Reduction by Design Approach

International Journal of Computing and Digital Systems, Jul 25, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

World Academy of Science, Engineering and Technology, International Journal of Humanities and Social Sciences, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Calculating trust value in information propagation for online social network sites

Trust concerns have increased dramatically by the augmentation of online social network sites (OS... more Trust concerns have increased dramatically by the augmentation of online social network sites (OSNSs) popularity. The worth of OSNSs is to form relationships and propagate social information from users' interactions which is beneficial for not only the users but inclusive of cooperator and business values. Thus, the question lies in creating architecture for the social network for communicating and disseminating information with trust as the central concern. The goal of this paper is to highlight and review trust importance in information dissemination for OSNSs. The findings lead to suggest trust level which can be applied on OSNSs to govern amount of information sharing. Hence, a new algorithm is proposed to calculate trust level for information dissemination.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving identify of users in social networking sites by integrating anonymization and diversification algorithm

Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their business... more Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for privacy threats. The goal of this paper is to explain how information disclosure to adversaries will be minimized by using integrated algorithm. This study takes the advantages of Kanonymity algorithm and ldiversity algorithm then evaluated the effectiveness of the combined strengths. The result shows that the proposed algorithm increases the level of privacy for SNSs users by anonymizing and diversifying disclosed information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving anonymity of users identity in social network sites using integrated algorithm

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving Identity of Users in Social Network Sites by Integratinganonymization and Diversification Algorithms

Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their business... more Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for privacy threats. The goal of this paper is to explain how information disclosure to adversaries will be minimized by using integrated algorithm. This study takes the advantages of Kanonymity algorithm and ldiversity algorithm then evaluated the effectiveness of the combined strengths. The result shows that the proposed algorithm increases the level of privacy for SNSs users by anonymizing and diversifying disclosed information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving Privacy in Social Network Sites using Anonymity Algorithm

Social Network Sites(SNSs) are interesting platforms for online users to share information. The r... more Social Network Sites(SNSs) are interesting platforms for online users to share information. The revealed sensitive data of users may be disseminated to malicious parties through these sites vulnerabilities.Thus,users data need to be preserved from privacy concerns.The proposed anonymity algorithm which includes the basic concepts of two main privacy algorithms: K-Anonymity and L-Diversity,will protect users data from re-identification. This optimized method will improve and guarantee the users' privacy from malicious parties who tried to get access to users sensitive information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Sentiment Analysis of Text with Lossless Mining

2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Antecedents of Consumers' Intention to Shop online

Article history: Received 12 October 2013 Received in revised form 14 November 2013 Accepted 15 N... more Article history: Received 12 October 2013 Received in revised form 14 November 2013 Accepted 15 November 2013 Available online 20December 2013

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review of Trusted Research Environments to Support Next Generation Capabilities based on Interview Analysis

Journal of Medical Internet Research

BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supporte... more BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards) providing access to data for research whilst protecting patient confidentially. Accessing sensitive data without compromising the privacy and security of the data is a complex process. OBJECTIVE This paper presents the security measures, administrative procedures and technical approaches adopted by TREs. METHODS We contacted TRE operators, 20 of whom, in the UK and internationally, agreed to be interviewed remotely under a non-disclosure agreement and to complete a questionnaire about their TRE. RESULTS We observed many similar processes and standards which TREs follow to adhere to the Seven Safes principles. The security processes and TRE capabilities for supporting observational studies using classical statistical methods were mature and the requirements well understood. However, we identified limitations in the securit...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, 2020

With the popularity of Internet of Things (IoT) technology, the security of the IoT network has b... more With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab-knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A privacy-preserving model to control social interaction behaviors in social network sites

Journal of Information Security and Applications, 2019

Social Network Sites (SNSs) served as an invaluable platform to transfer information across a lar... more Social Network Sites (SNSs) served as an invaluable platform to transfer information across a large number of users. SNSs also disseminate users data to third-parties to provide more interesting services for users as well as gaining profits. Users grant access to third-parties to use their services, although they do not necessarily protect users’ data privacy. Controlling social network data diffusion among users and third-parties is difficult due to the vast amount of data. Hence, undesirable users’ data diffusion to unauthorized parties in SNSs may endanger users’ privacy. This paper highlights the privacy breaches on SNSs and emphasizes the most significant privacy issues to users. The goals of this paper are to i) propose a privacy-preserving model for social interactions among users and third-parties; ii) enhance users’ privacy by providing access to the data for appropriate third-parties. These advocate to not compromising the advantages of SNSs information sharing functionalities.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, Jul 10, 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Next-Generation Capabilities in Trusted Research Environments: Interview Study

Journal of Medical Internet Research, Sep 20, 2022

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Classification of Third-Party Applications on Facebook to Mitigate Users' Information Leakage

Facebook is significant platform for third-party developers to run written applications in order ... more Facebook is significant platform for third-party developers to run written applications in order to provide users extra functionality and services. Third-party applications (TPAs) access to user’s profile and exchange their information. In doing so, this may lead to information leakage and privacy risks. Although Facebook has control over third-party applications, it still lacks control in the existing mechanisms. The aim of this paper is to investigate how to hinder TPAs from accessing user’s private information while still sustaining the functionality of the applications. To address privacy and functionality simultaneously, this study suggests a classification framework providing mechanism in controlling TPAs access to the users’ data residing on Facebook. The improved framework allows TPAs to utilize some of users’ data according to their classification authority to mitigate users’ information leakage.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, 2020

With the popularity of Internet of Things (IoT) technology, the security of the IoT network has b... more With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab–knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Journal of Computer Networks and Communications, 2019

Internet of Things (IoT) has become one of the most significant technologies in recent years beca... more Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A privacy-preserving model to control social interaction behaviors in social network sites

Journal of Information Security and Applications, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Intrusion Detection System Based on NSGA-II Algorithm

2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec), 2015

Attack detection is one of the most important issues for computer networks security. Intrusion De... more Attack detection is one of the most important issues for computer networks security. Intrusion Detection System (IDS) monitors network for malicious activity. In this paper, a method is proposed to identify the attacks in IDS. This method generates rule sets for Intrusion Detection System using non-dominated sorting genetic algorithm (NSGA-II). NSGA-II is one type of multi objective genetic algorithms. This method considers features of computer connection and defines two different fitness functions for generating the rules. The advantage of this method compared with previous methods which applied Evolutionary Algorithm. Since some methods applied one fitness function or convert many objectives to single objective, they lost many features.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Chronic ataxic neuropathy with cold agglutinins: Atypical phenotype and response to anti-CD20 antibodies

Neurology, 2003

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework to Detect Cyber-attacks against Networked Medical Devices (Internet of Medical Things): An Attack-Surface-Reduction by Design Approach

International Journal of Computing and Digital Systems, Jul 25, 2021

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Privacy-Preserving Model for Social Network Sites to Prevent Unwanted Information Diffusion

World Academy of Science, Engineering and Technology, International Journal of Humanities and Social Sciences, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Calculating trust value in information propagation for online social network sites

Trust concerns have increased dramatically by the augmentation of online social network sites (OS... more Trust concerns have increased dramatically by the augmentation of online social network sites (OSNSs) popularity. The worth of OSNSs is to form relationships and propagate social information from users' interactions which is beneficial for not only the users but inclusive of cooperator and business values. Thus, the question lies in creating architecture for the social network for communicating and disseminating information with trust as the central concern. The goal of this paper is to highlight and review trust importance in information dissemination for OSNSs. The findings lead to suggest trust level which can be applied on OSNSs to govern amount of information sharing. Hence, a new algorithm is proposed to calculate trust level for information dissemination.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving identify of users in social networking sites by integrating anonymization and diversification algorithm

Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their business... more Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for privacy threats. The goal of this paper is to explain how information disclosure to adversaries will be minimized by using integrated algorithm. This study takes the advantages of Kanonymity algorithm and ldiversity algorithm then evaluated the effectiveness of the combined strengths. The result shows that the proposed algorithm increases the level of privacy for SNSs users by anonymizing and diversifying disclosed information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving anonymity of users identity in social network sites using integrated algorithm

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving Identity of Users in Social Network Sites by Integratinganonymization and Diversification Algorithms

Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their business... more Currently, Social Networking Sites (SNSs) expand internet users’ relationships and their businesses. Despite the huge benefits gained by SNS users, the huge amount of information exchanged by different users makes SNSs an easy target for privacy threats. The goal of this paper is to explain how information disclosure to adversaries will be minimized by using integrated algorithm. This study takes the advantages of Kanonymity algorithm and ldiversity algorithm then evaluated the effectiveness of the combined strengths. The result shows that the proposed algorithm increases the level of privacy for SNSs users by anonymizing and diversifying disclosed information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Preserving Privacy in Social Network Sites using Anonymity Algorithm

Social Network Sites(SNSs) are interesting platforms for online users to share information. The r... more Social Network Sites(SNSs) are interesting platforms for online users to share information. The revealed sensitive data of users may be disseminated to malicious parties through these sites vulnerabilities.Thus,users data need to be preserved from privacy concerns.The proposed anonymity algorithm which includes the basic concepts of two main privacy algorithms: K-Anonymity and L-Diversity,will protect users data from re-identification. This optimized method will improve and guarantee the users' privacy from malicious parties who tried to get access to users sensitive information.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Sentiment Analysis of Text with Lossless Mining

2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Antecedents of Consumers' Intention to Shop online

Article history: Received 12 October 2013 Received in revised form 14 November 2013 Accepted 15 N... more Article history: Received 12 October 2013 Received in revised form 14 November 2013 Accepted 15 November 2013 Available online 20December 2013

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Review of Trusted Research Environments to Support Next Generation Capabilities based on Interview Analysis

Journal of Medical Internet Research

BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supporte... more BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards) providing access to data for research whilst protecting patient confidentially. Accessing sensitive data without compromising the privacy and security of the data is a complex process. OBJECTIVE This paper presents the security measures, administrative procedures and technical approaches adopted by TREs. METHODS We contacted TRE operators, 20 of whom, in the UK and internationally, agreed to be interviewed remotely under a non-disclosure agreement and to complete a questionnaire about their TRE. RESULTS We observed many similar processes and standards which TREs follow to adhere to the Seven Safes principles. The security processes and TRE capabilities for supporting observational studies using classical statistical methods were mature and the requirements well understood. However, we identified limitations in the securit...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Intrusion Detection System for the Internet of Things Based on Blockchain and Multi-Agent Systems

Electronics, 2020

With the popularity of Internet of Things (IoT) technology, the security of the IoT network has b... more With the popularity of Internet of Things (IoT) technology, the security of the IoT network has become an important issue. Traditional intrusion detection systems have their limitations when applied to the IoT network due to resource constraints and the complexity. This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. The system consists of the following modules: data collection, data management, analysis, and response. The National security lab-knowledge discovery and data mining NSL-KDD dataset is used to test the system. The results demonstrate the efficiency of deep learning algorithms when detecting attacks from the transport layer. The experiment indicates that deep learning algorithms are suitable for intrusion detection in IoT network environment.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A privacy-preserving model to control social interaction behaviors in social network sites

Journal of Information Security and Applications, 2019

Social Network Sites (SNSs) served as an invaluable platform to transfer information across a lar... more Social Network Sites (SNSs) served as an invaluable platform to transfer information across a large number of users. SNSs also disseminate users data to third-parties to provide more interesting services for users as well as gaining profits. Users grant access to third-parties to use their services, although they do not necessarily protect users’ data privacy. Controlling social network data diffusion among users and third-parties is difficult due to the vast amount of data. Hence, undesirable users’ data diffusion to unauthorized parties in SNSs may endanger users’ privacy. This paper highlights the privacy breaches on SNSs and emphasizes the most significant privacy issues to users. The goals of this paper are to i) propose a privacy-preserving model for social interactions among users and third-parties; ii) enhance users’ privacy by providing access to the data for appropriate third-parties. These advocate to not compromising the advantages of SNSs information sharing functionalities.

Bookmarks Related papers MentionsView impact