Gabriela Mogos - Academia.edu (original) (raw)

Papers by Gabriela Mogos

Research paper thumbnail of Quantum Image Processing Using Edge Detection Based on Roberts Cross Operators

Lecture notes in networks and systems, 2024

Research paper thumbnail of Quantum Biometric Fingerprint Encryption based on Twofish Algorithm

Research paper thumbnail of Detecting attacks on e-mail

Indonesian journal of electrical engineering and computer science, Mar 1, 2024

E-mail has become a popular communication tool widely used by universities, enterprises and gover... more E-mail has become a popular communication tool widely used by universities, enterprises and governments. Despite the convenience it brought to people, attacks on e-mail happen very frequently in the range of the world, causing large economic loss and occupying a mass of network bandwidth every year. The hazards from e-mail attacks underline the importance of detecting and resisting spam in an efficient and timely way. Using Python, we built Naïve Bayes (NB) and support vector machine (SVM) filters for emails. The filtering performance of NB and SVM email filters applying different kernel functions was compared and evaluated based on several evaluation indices including accuracy, precision, and total cost ratio (TCR). Also, in order to optimize the filters, the influences of stop words removal, feature numbers and other parameters in the filtering algorithms were monitored. This is an open access article under the CC BY-SA license.

Research paper thumbnail of Marketing Analysis

Zenodo (CERN European Organization for Nuclear Research), Mar 3, 2021

Data from the past contains information that will be useful in the future. It works because custo... more Data from the past contains information that will be useful in the future. It works because customer behaviors captured in corporate data are not random, but reflect the differing needs, preferences, propensities, and treatments of customers. The paper presents a study related to the 6 indicators (star, helpful votes, total votes, vine, verified, review) which can help a company to be more competitive in the market.

Research paper thumbnail of Quantum Fingerprint Scrambling Algorithm Based on Chaos Theory

Research paper thumbnail of Quantum Matching Algorithm for Biometric Fingerprints

Fingerprints remain constant throughout life. In over 140 years of fingerprint analysis, no two f... more Fingerprints remain constant throughout life. In over 140 years of fingerprint analysis, no two fingerprints have ever been found to be identical, even in identical twins. Each of us is born with a unique set of fingerprints, although experts still don't know with what exactly what we use them for. In information technology terms, biometrics is associated with technologies and techniques designed to secure and confirm identity based on individual, measurable biological characteristics of the person. Fingerprints can be used in systems and schemes designed to gain access to a computer, a room and, why not, a bank account. A verification system authenticates the person's claimed identity by comparing the fingerprints provided by the person at a given point in time with the measures of these features previously stored in the system and associated with the person's claimed identity. This paper presents a quantum matching algorithm for biometric fingerprints. For this, classi...

Research paper thumbnail of Methods and Tools for Investigating Attacks - Memory Forensics

2022 5th International Conference on Big Data Technologies (ICBDT), Sep 23, 2022

Research paper thumbnail of Quantum Key Distribution by Drone

Journal of Physics: Conference Series

A cryptographic communication system is secure from a practical point of view if the encryption s... more A cryptographic communication system is secure from a practical point of view if the encryption scheme can be broken after X years, where X is determined by security needs and existing technology. Quantum cryptography does not offer a complete solution for all cryptographic problems: secure keys, encryption algorithms based on them, message authentication and finding ways to detect/prevent interception; but it can be seen as a complement to standard symmetric cryptographic systems. This paper presents the implementation of the BB84 quantum key distribution protocol on mobile systems - Amov-lab’s Z410 drone with T-engine 2216 - and tracks the error rate obtained in flight conditions.

Research paper thumbnail of The general principles of safety and security rules at the level of the organization

Research paper thumbnail of Cyber-attacks on SWIFT Systems of financial institutions

2022 5th International Conference on Computer Science and Software Engineering (CSSE 2022)

Research paper thumbnail of The ″transportation″ of the message using private keys

Romanian Journal of Information Science and Technology

Research paper thumbnail of Bugs in Security Onion

2021 6th International Conference on Systems, Control and Communications (ICSCC)

Once the development of information technology and network, the problem of information security i... more Once the development of information technology and network, the problem of information security is becoming increasingly prominent. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. It is becoming more and more important to perceive the network security situation, monitor the network operation status, and ensure the security of information assets. Security Onion (SO) is a free and opensource Linux distribution for threat hunting, enterprise security monitoring, and log management. Security Onion is used to monitor specific network traffic, detect intrusion actions, and stop the attacker from taking further actions. Bugs in other Linux versions of operating systems may also exist in SO. This paper presents some existing security bugs in Ubuntu and the Linux kernel and tests whether these exist and lead to security vulnerabilities that can be exploited in Security Onion as well. Kali Linux with Nmap and Metasploit-Framework is used to implement exploits.

Research paper thumbnail of Digital forensics on Tencent QQ-instant messaging service in China

Indonesian Journal of Electrical Engineering and Computer Science

Data packet analysis targeting instant messaging (IM) applications has become one of the most men... more Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-oriented Linux distribution, to present the complete process of the data packet analysis operation. The result concludes from the experiment may be able to provide constructive suggestions to other related digital forensics cases.

Research paper thumbnail of Marketing Analysis

- Data from the past contains information that<br> will be useful in the future. It works b... more - Data from the past contains information that<br> will be useful in the future. It works because customer<br> behaviors captured in corporate data are not random,<br> but reflect the differing needs, preferences, propensities,<br> and treatments of customers.<br> The paper presents a study related to the 6 indicators<br> (star, helpful votes, total votes, vine, verified, review)<br> which can help a company to be more competitive in the<br> market.

Research paper thumbnail of Comparative Analysis of Quantum Key Distribution Protocols with Two , Three and Four-State Systems

Cryptographic protocols can be classified by the type of security against eavesdropping which the... more Cryptographic protocols can be classified by the type of security against eavesdropping which they provide. There exist mathematically secure schemes whose security relies on mathematical proofs or conjectures about the complexity of deciphering the message without possessing the correct key. The majority of current secure public Internet connections rely on such schemes. Alternatively, a cryptographic setup may provide a physically secure method for communicating. In these setups the security is provided by the physical laws governing the communication protocol.This paper presents a comparative study of three quantum key distribution protocols with two, three and four-state systems, respectively. Starting with the same dimension of input data, the percentage of errors is analyzed by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.

Research paper thumbnail of Implementation of the Quantum Key Distribution Protocol with Ququarts

In quantum key distribution, two parts exploit a quantum channel to create a secret shared key co... more In quantum key distribution, two parts exploit a quantum channel to create a secret shared key comprising a random string of binary digits. This key can then be used to protect a subsequent communication between them. Quantum cryptography is the latest idea in the long history of secure communications and, if it is to develop, it will have to compete with existing technologies. The practical implementation of quantum information technologies requires, for the most part, highly advanced and currently experimental procedures. Quantum key distribution, has been successfully demonstrated in many laboratories and has reached an advanced level of development. This paper presents a software implementation of quantum key distribution protocol with ququarts, proving security for practical communication systems.

Research paper thumbnail of Ciphertext-Policy Attribute-Based Encryption using Quantum Multilevel Secret Sharing Scheme

The current society, with a rapidly multiplying data volume, offered new valences and created new... more The current society, with a rapidly multiplying data volume, offered new valences and created new opportunities to develop cryptography. Public-key cryptosystems are the most important contribution of modern cryptography. Attribute-based encryption corresponds to the public key cryptography, and enables plain text access only if the user has all the attributes which the original text was encrypted with. There are two types of Attribute-based encryption: Key-Policy Attribute-Based Encryption and Ciphertext-Policy AttributeBased Encryption. The basic idea of Ciphertext-policy Attribute-based encryption scheme is that a cryptotext is associated to an access policy. In Ciphertext-Policy Attribute-Based Encryption the authorization is included in the encrypted data, and only users who satisfy the associated policy can decrypt the data. Data can be encrypted without knowing the number of users who can decrypt, but only specifying the policy enabling the decrypt. This paper proposes a quan...

Research paper thumbnail of Quantum random number generator vs. random number generator

2016 International Conference on Communications (COMM), 2016

A random number generator produces a periodic sequence of numbers on a computer. The starting poi... more A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. This paper presents the entropy and p-value tests performed on classical and quantum random number generators, in order to check the randomness of the generated output data. Both generators have been integrated in software applications reproducing asymmetrical cryptosystems, their results contributing to the generation of key material within Diffie-Hellman protocol. Can regard these tests as a first step in determining if a generator is suitable for a particular cryptographic application. At the same time, the statistical tests cannot serve as a substitute for cryptanalysis.

Research paper thumbnail of Developing client-server applications using .NET platform

Research paper thumbnail of Building a Hybrid Secure Socket Layer protocol

Research paper thumbnail of Quantum Image Processing Using Edge Detection Based on Roberts Cross Operators

Lecture notes in networks and systems, 2024

Research paper thumbnail of Quantum Biometric Fingerprint Encryption based on Twofish Algorithm

Research paper thumbnail of Detecting attacks on e-mail

Indonesian journal of electrical engineering and computer science, Mar 1, 2024

E-mail has become a popular communication tool widely used by universities, enterprises and gover... more E-mail has become a popular communication tool widely used by universities, enterprises and governments. Despite the convenience it brought to people, attacks on e-mail happen very frequently in the range of the world, causing large economic loss and occupying a mass of network bandwidth every year. The hazards from e-mail attacks underline the importance of detecting and resisting spam in an efficient and timely way. Using Python, we built Naïve Bayes (NB) and support vector machine (SVM) filters for emails. The filtering performance of NB and SVM email filters applying different kernel functions was compared and evaluated based on several evaluation indices including accuracy, precision, and total cost ratio (TCR). Also, in order to optimize the filters, the influences of stop words removal, feature numbers and other parameters in the filtering algorithms were monitored. This is an open access article under the CC BY-SA license.

Research paper thumbnail of Marketing Analysis

Zenodo (CERN European Organization for Nuclear Research), Mar 3, 2021

Data from the past contains information that will be useful in the future. It works because custo... more Data from the past contains information that will be useful in the future. It works because customer behaviors captured in corporate data are not random, but reflect the differing needs, preferences, propensities, and treatments of customers. The paper presents a study related to the 6 indicators (star, helpful votes, total votes, vine, verified, review) which can help a company to be more competitive in the market.

Research paper thumbnail of Quantum Fingerprint Scrambling Algorithm Based on Chaos Theory

Research paper thumbnail of Quantum Matching Algorithm for Biometric Fingerprints

Fingerprints remain constant throughout life. In over 140 years of fingerprint analysis, no two f... more Fingerprints remain constant throughout life. In over 140 years of fingerprint analysis, no two fingerprints have ever been found to be identical, even in identical twins. Each of us is born with a unique set of fingerprints, although experts still don't know with what exactly what we use them for. In information technology terms, biometrics is associated with technologies and techniques designed to secure and confirm identity based on individual, measurable biological characteristics of the person. Fingerprints can be used in systems and schemes designed to gain access to a computer, a room and, why not, a bank account. A verification system authenticates the person's claimed identity by comparing the fingerprints provided by the person at a given point in time with the measures of these features previously stored in the system and associated with the person's claimed identity. This paper presents a quantum matching algorithm for biometric fingerprints. For this, classi...

Research paper thumbnail of Methods and Tools for Investigating Attacks - Memory Forensics

2022 5th International Conference on Big Data Technologies (ICBDT), Sep 23, 2022

Research paper thumbnail of Quantum Key Distribution by Drone

Journal of Physics: Conference Series

A cryptographic communication system is secure from a practical point of view if the encryption s... more A cryptographic communication system is secure from a practical point of view if the encryption scheme can be broken after X years, where X is determined by security needs and existing technology. Quantum cryptography does not offer a complete solution for all cryptographic problems: secure keys, encryption algorithms based on them, message authentication and finding ways to detect/prevent interception; but it can be seen as a complement to standard symmetric cryptographic systems. This paper presents the implementation of the BB84 quantum key distribution protocol on mobile systems - Amov-lab’s Z410 drone with T-engine 2216 - and tracks the error rate obtained in flight conditions.

Research paper thumbnail of The general principles of safety and security rules at the level of the organization

Research paper thumbnail of Cyber-attacks on SWIFT Systems of financial institutions

2022 5th International Conference on Computer Science and Software Engineering (CSSE 2022)

Research paper thumbnail of The ″transportation″ of the message using private keys

Romanian Journal of Information Science and Technology

Research paper thumbnail of Bugs in Security Onion

2021 6th International Conference on Systems, Control and Communications (ICSCC)

Once the development of information technology and network, the problem of information security i... more Once the development of information technology and network, the problem of information security is becoming increasingly prominent. The scope and content of network security threats continue to expand and evolve, and the network security situation and challenges are becoming increasingly severe and complex. It is becoming more and more important to perceive the network security situation, monitor the network operation status, and ensure the security of information assets. Security Onion (SO) is a free and opensource Linux distribution for threat hunting, enterprise security monitoring, and log management. Security Onion is used to monitor specific network traffic, detect intrusion actions, and stop the attacker from taking further actions. Bugs in other Linux versions of operating systems may also exist in SO. This paper presents some existing security bugs in Ubuntu and the Linux kernel and tests whether these exist and lead to security vulnerabilities that can be exploited in Security Onion as well. Kali Linux with Nmap and Metasploit-Framework is used to implement exploits.

Research paper thumbnail of Digital forensics on Tencent QQ-instant messaging service in China

Indonesian Journal of Electrical Engineering and Computer Science

Data packet analysis targeting instant messaging (IM) applications has become one of the most men... more Data packet analysis targeting instant messaging (IM) applications has become one of the most mentioned case examples in the digital forensic industry, considering that the forensic engineers can extract valuable information by analysing the data packets used by the IM software. The crucial part of this process is to accomplish a series of research and investigation, in addition to correctly implement the related forensics tools. This paper is intended to use QQ, a popular IM software in China, as an experiment example, in cooperation with various tools from Kali Linux, a digital forensics-oriented Linux distribution, to present the complete process of the data packet analysis operation. The result concludes from the experiment may be able to provide constructive suggestions to other related digital forensics cases.

Research paper thumbnail of Marketing Analysis

- Data from the past contains information that<br> will be useful in the future. It works b... more - Data from the past contains information that<br> will be useful in the future. It works because customer<br> behaviors captured in corporate data are not random,<br> but reflect the differing needs, preferences, propensities,<br> and treatments of customers.<br> The paper presents a study related to the 6 indicators<br> (star, helpful votes, total votes, vine, verified, review)<br> which can help a company to be more competitive in the<br> market.

Research paper thumbnail of Comparative Analysis of Quantum Key Distribution Protocols with Two , Three and Four-State Systems

Cryptographic protocols can be classified by the type of security against eavesdropping which the... more Cryptographic protocols can be classified by the type of security against eavesdropping which they provide. There exist mathematically secure schemes whose security relies on mathematical proofs or conjectures about the complexity of deciphering the message without possessing the correct key. The majority of current secure public Internet connections rely on such schemes. Alternatively, a cryptographic setup may provide a physically secure method for communicating. In these setups the security is provided by the physical laws governing the communication protocol.This paper presents a comparative study of three quantum key distribution protocols with two, three and four-state systems, respectively. Starting with the same dimension of input data, the percentage of errors is analyzed by comparison with the dimensions of the cryptographic keys obtained in the case of each protocol.

Research paper thumbnail of Implementation of the Quantum Key Distribution Protocol with Ququarts

In quantum key distribution, two parts exploit a quantum channel to create a secret shared key co... more In quantum key distribution, two parts exploit a quantum channel to create a secret shared key comprising a random string of binary digits. This key can then be used to protect a subsequent communication between them. Quantum cryptography is the latest idea in the long history of secure communications and, if it is to develop, it will have to compete with existing technologies. The practical implementation of quantum information technologies requires, for the most part, highly advanced and currently experimental procedures. Quantum key distribution, has been successfully demonstrated in many laboratories and has reached an advanced level of development. This paper presents a software implementation of quantum key distribution protocol with ququarts, proving security for practical communication systems.

Research paper thumbnail of Ciphertext-Policy Attribute-Based Encryption using Quantum Multilevel Secret Sharing Scheme

The current society, with a rapidly multiplying data volume, offered new valences and created new... more The current society, with a rapidly multiplying data volume, offered new valences and created new opportunities to develop cryptography. Public-key cryptosystems are the most important contribution of modern cryptography. Attribute-based encryption corresponds to the public key cryptography, and enables plain text access only if the user has all the attributes which the original text was encrypted with. There are two types of Attribute-based encryption: Key-Policy Attribute-Based Encryption and Ciphertext-Policy AttributeBased Encryption. The basic idea of Ciphertext-policy Attribute-based encryption scheme is that a cryptotext is associated to an access policy. In Ciphertext-Policy Attribute-Based Encryption the authorization is included in the encrypted data, and only users who satisfy the associated policy can decrypt the data. Data can be encrypted without knowing the number of users who can decrypt, but only specifying the policy enabling the decrypt. This paper proposes a quan...

Research paper thumbnail of Quantum random number generator vs. random number generator

2016 International Conference on Communications (COMM), 2016

A random number generator produces a periodic sequence of numbers on a computer. The starting poi... more A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. A random number generator produces a periodic sequence of numbers on a computer. The starting point can be random, but after it is chosen, everything else is deterministic. This paper presents the entropy and p-value tests performed on classical and quantum random number generators, in order to check the randomness of the generated output data. Both generators have been integrated in software applications reproducing asymmetrical cryptosystems, their results contributing to the generation of key material within Diffie-Hellman protocol. Can regard these tests as a first step in determining if a generator is suitable for a particular cryptographic application. At the same time, the statistical tests cannot serve as a substitute for cryptanalysis.

Research paper thumbnail of Developing client-server applications using .NET platform

Research paper thumbnail of Building a Hybrid Secure Socket Layer protocol