Malmö University Publications
Change search
Link to record
Permanent link

Direct link
Alternative names
Publications (10 of 29) Show all publications
Persson, J. A., Bugeja, J., Davidsson, P., Holmberg, J., Kebande, V. R., Mihailescu, R.-C., . . . Tegen, A. (2023). The Concept of Interactive Dynamic Intelligent Virtual Sensors (IDIVS): Bridging the Gap between Sensors, Services, and Users through Machine Learning. Applied Sciences, 13(11), Article ID 6516.
Open this publication in new window or tab >>The Concept of Interactive Dynamic Intelligent Virtual Sensors (IDIVS): Bridging the Gap between Sensors, Services, and Users through Machine Learning
Show others...
2023 (English)In: Applied Sciences, E-ISSN 2076-3417, Vol. 13, no 11, article id 6516Article in journal (Refereed) Published
Abstract [en]

This paper concerns the novel concept of an Interactive Dynamic Intelligent Virtual Sensor (IDIVS), which extends virtual/soft sensors towards making use of user input through interactive learning (IML) and transfer learning. In research, many studies can be found on using machine learning in this domain, but not much on using IML. This paper contributes by highlighting how this can be done and the associated positive potential effects and challenges. An IDIVS provides a sensor-like output and achieves the output through the data fusion of sensor values or from the output values of other IDIVSs. We focus on settings where people are present in different roles: from basic service users in the environment being sensed to interactive service users supporting the learning of the IDIVS, as well as configurators of the IDIVS and explicit IDIVS teachers. The IDIVS aims at managing situations where sensors may disappear and reappear and be of heterogeneous types. We refer to and recap the major findings from related experiments and validation in complementing work. Further, we point at several application areas: smart building, smart mobility, smart learning, and smart health. The information properties and capabilities needed in the IDIVS, with extensions towards information security, are introduced and discussed.

Place, publisher, year, edition, pages
MDPI, 2023
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-60144 (URN)10.3390/app13116516 (DOI)001004726600001 ()2-s2.0-85163091186 (Scopus ID)
Available from: 2023-06-07 Created: 2023-06-07 Last updated: 2023-09-05Bibliographically approved
Alkhabbas, F., Alsadi, M., Alawadi, S., Awaysheh, F. M., Kebande, V. R. & Moghaddam, M. T. (2022). ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.. Sensors, 22(18), Article ID 6842.
Open this publication in new window or tab >>ASSERT: A Blockchain-Based Architectural Approach for Engineering Secure Self-Adaptive IoT Systems.
Show others...
2022 (English)In: Sensors, E-ISSN 1424-8220, Vol. 22, no 18, article id 6842Article in journal (Refereed) Published
Abstract [en]

Internet of Things (IoT) systems are complex systems that can manage mission-critical, costly operations or the collection, storage, and processing of sensitive data. Therefore, security represents a primary concern that should be considered when engineering IoT systems. Additionally, several challenges need to be addressed, including the following ones. IoT systems' environments are dynamic and uncertain. For instance, IoT devices can be mobile or might run out of batteries, so they can become suddenly unavailable. To cope with such environments, IoT systems can be engineered as goal-driven and self-adaptive systems. A goal-driven IoT system is composed of a dynamic set of IoT devices and services that temporarily connect and cooperate to achieve a specific goal. Several approaches have been proposed to engineer goal-driven and self-adaptive IoT systems. However, none of the existing approaches enable goal-driven IoT systems to automatically detect security threats and autonomously adapt to mitigate them. Toward bridging these gaps, this paper proposes a distributed architectural Approach for engineering goal-driven IoT Systems that can autonomously SElf-adapt to secuRity Threats in their environments (ASSERT). ASSERT exploits techniques and adopts notions, such as agents, federated learning, feedback loops, and blockchain, for maintaining the systems' security and enhancing the trustworthiness of the adaptations they perform. The results of the experiments that we conducted to validate the approach's feasibility show that it performs and scales well when detecting security threats, performing autonomous security adaptations to mitigate the threats and enabling systems' constituents to learn about security threats in their environments collaboratively.

Place, publisher, year, edition, pages
MDPI, 2022
Keywords
Internet of Things, blockchain, multi-agent systems, security, self-adaptive and goal-driven systems, software architecture
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-55176 (URN)10.3390/s22186842 (DOI)000858946100001 ()36146191 (PubMedID)2-s2.0-85138427481 (Scopus ID)
Available from: 2022-10-17 Created: 2022-10-17 Last updated: 2024-09-03Bibliographically approved
Alawadi, S., Kebande, V. R., Dong, Y., Bugeja, J., Persson, J. A. & Olsson, C. M. (2021). A Federated Interactive Learning IoT-Based Health Monitoring Platform. In: New Trends in Database and Information Systems: . Paper presented at ADBIS 2021: New Trends in Database and Information Systems. Tartu, Estonia, August 24-26, 2021. (pp. 235-246). Springer
Open this publication in new window or tab >>A Federated Interactive Learning IoT-Based Health Monitoring Platform
Show others...
2021 (English)In: New Trends in Database and Information Systems, Springer, 2021, p. 235-246Conference paper, Published paper (Refereed)
Abstract [en]

Remote health monitoring is a trend for better health management which necessitates the need for secure monitoring and privacy-preservation of patient data. Moreover, accurate and continuous monitoring of personal health status may require expert validation in an active learning strategy. As a result, this paper proposes a Federated Interactive Learning IoT-based Health Monitoring Platform (FIL-IoT-HMP) which incorporates multi-expert feedback as ‘Human-in-the-loop’ in an active learning strategy in order to improve the clients’ Machine Learning (ML) models. The authors have proposed an architecture and conducted an experiment as a proof of concept. Federated learning approach has been preferred in this context given that it strengthens privacy by allowing the global model to be trained while sensitive data is retained at the local edge nodes. Also, each model’s accuracy is improved while privacy and security of data has been upheld.

Place, publisher, year, edition, pages
Springer, 2021
Series
Communications in Computer and Information Science, ISSN 1865-0929, E-ISSN 1865-0937 ; 1450
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:mau:diva-47470 (URN)10.1007/978-3-030-85082-1_21 (DOI)000775759800021 ()2-s2.0-85115134304 (Scopus ID)978-3-030-85081-4 (ISBN)978-3-030-85082-1 (ISBN)
Conference
ADBIS 2021: New Trends in Database and Information Systems. Tartu, Estonia, August 24-26, 2021.
Available from: 2021-12-13 Created: 2021-12-13 Last updated: 2024-09-03Bibliographically approved
Baror, S. O., Venter, H. S. & Kebande, V. R. (2021). A Framework for Concurrent Contact-Tracing and Digital Evidence Analysis in Heterogeneous Environments. In: Mohamed Ben Ahmed, İsmail Rakıp Karaș, Domingos Santos, Olga Sergeyeva, Anouar Abdelhakim Boudhir (Ed.), Innovations in Smart Cities Applications: The Proceedings of the 5th International Conference on Smart City Applications. Paper presented at 5th International Conference on Smart City Applications (SCA2020), October 7-9, 2020, Karabuk, Turkey (pp. 1183-1196). Springer, 4
Open this publication in new window or tab >>A Framework for Concurrent Contact-Tracing and Digital Evidence Analysis in Heterogeneous Environments
2021 (English)In: Innovations in Smart Cities Applications: The Proceedings of the 5th International Conference on Smart City Applications / [ed] Mohamed Ben Ahmed, İsmail Rakıp Karaș, Domingos Santos, Olga Sergeyeva, Anouar Abdelhakim Boudhir, Springer, 2021, Vol. 4, p. 1183-1196Conference paper, Published paper (Refereed)
Abstract [en]

The multiple functionalities of mobile devices have allowed them to be used for contact-tracing especially with the emergence of an infectious pandemic, for example, in a smart city. This has been experienced, for example, in COVID-19 cases where propagation of infections may not be controlled effectively. Given that data is exchanged between parties it becomes important to have a focus on how this data can be used as a contact trace mechanism. This contract trace mechanism can also provide Potential Digital Evidence (PDE) that can aid to form an objective hypothesis that could be employed during litigation in the event of a suspicious infection, or when a security incident is detected. This paper, therefore, proposes an iterative Concurrent Contact-Tracing (CCT) framework based on digital evidence from mobile devices in heterogeneous environments. 

Place, publisher, year, edition, pages
Springer, 2021
Series
Lecture Notes in Networks and Systems, ISSN 2367-3370, E-ISSN 2367-3389 ; 183
Keywords
Contact-tracing, Digital evidence, Digital forensics, Heterogeneous
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-70936 (URN)10.1007/978-3-030-66840-2_90 (DOI)2-s2.0-85102632632 (Scopus ID)9783030668396 (ISBN)9783030668402 (ISBN)
Conference
5th International Conference on Smart City Applications (SCA2020), October 7-9, 2020, Karabuk, Turkey
Available from: 2024-09-10 Created: 2024-09-10 Last updated: 2024-09-13Bibliographically approved
Kebande, V. R., Alawadi, S., Awaysheh, F. & Persson, J. A. (2021). Active Machine Learning Adversarial Attack Detection in the User Feedback Process. IEEE Access, 9
Open this publication in new window or tab >>Active Machine Learning Adversarial Attack Detection in the User Feedback Process
2021 (English)In: IEEE Access, E-ISSN 2169-3536, E-ISSN 2169-3536, Vol. 9Article in journal (Refereed) Published
Abstract [en]

Modern Information and Communication Technology (ICT)-based applications utilize currenttechnological advancements for purposes of streaming data, as a way of adapting to the ever-changingtechnological landscape. Such efforts require providing accurate, meaningful, and trustworthy output fromthe streaming sensors particularly during dynamic virtual sensing. However, to ensure that the sensingecosystem is devoid of any sensor threats or active attacks, it is paramount to implement secure real-timestrategies. Fundamentally, real-time detection of adversarial attacks/instances during the User FeedbackProcess (UFP) is the key to forecasting potential attacks in active learning. Also, according to existingliterature, there lacks a comprehensive study that has a focus on adversarial detection from an activemachine learning perspective at the time of writing this paper. Therefore, the authors posit the importance ofdetecting adversarial attacks in active learning strategy. Attack in the context of this paper through a UFPThreat driven model has been presented as any action that exerts an alteration to the learning system ordata. To achieve this, the study employed ambient data collected from a smart environment human activityrecognition from (Continuous Ambient Sensors Dataset, CASA) with fully labeled connections, where weintentionally subject the Dataset to wrong labels as a targeted/manipulative attack (by a malevolent labeler)in the UFP, with an assumption that the user-labels were connected to unique identities. While the dataset’sfocus is to classify tasks and predict activities, our study gives a focus on active adversarial strategies froman information security point of view. Furthermore, the strategies for modeling threats have been presentedusing the Meta Attack Language (MAL) compiler for purposes adversarial detection. The findings fromthe experiments conducted have shown that real-time adversarial identification and profiling during the UFPcould significantly increase the accuracy during the learning process with a high degree of certainty and pavesthe way towards an automated adversarial detection and profiling approaches on the Internet of CognitiveThings (ICoT).

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
Adversarial detection, user-feedback-process, active machine learning, monitoring industrial feedback.
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Science education
Identifiers
urn:nbn:se:mau:diva-41020 (URN)10.1109/ACCESS.2021.3063002 (DOI)000626493900001 ()2-s2.0-85102241032 (Scopus ID)
Available from: 2021-03-05 Created: 2021-03-05 Last updated: 2024-09-03Bibliographically approved
Mudau, P. P., Venter, H. S., Kebande, V. R., Ikuesan, R. A. & Karie, N. M. (2021). Cursory View of IoT-Forensic Readiness Framework Based on ISO/IEC 27043 Recommendations. In: Jemal H. Abawajy; Kim-Kwang Raymond Choo; Haruna Chiroma (Ed.), International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)Emerging Applications and Technologies for Industry 4.0: Conference Proceedings. Paper presented at International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020), in Uyo, Akwa Ibom State, Nigeria , July 21–23, 2020 (pp. 229-239). Springer
Open this publication in new window or tab >>Cursory View of IoT-Forensic Readiness Framework Based on ISO/IEC 27043 Recommendations
Show others...
2021 (English)In: International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020)Emerging Applications and Technologies for Industry 4.0: Conference Proceedings / [ed] Jemal H. Abawajy; Kim-Kwang Raymond Choo; Haruna Chiroma, Springer, 2021, p. 229-239Conference paper, Published paper (Refereed)
Abstract [en]

The Internet of things (IoT) technology has been adopted by many organisations as a way of improving business operations and discovering new business opportunities. However, the threat-related landscape and security ramifications that comes with this adoption has become a subject of focus. As a result, there is a need to significantly explore IoT readiness across organisations. The authors in this paper propose an IoT Forensic Readiness (IoT-FR) Framework for organisations that leverages on ISO/IEC 27043 International Standard. The IoT-FR framework benefits organisations that intend to adopt and implement IoT. 

Place, publisher, year, edition, pages
Springer, 2021
Series
Lecture Notes in Networks and Systems, ISSN 2367-3370, E-ISSN 2367-3389 ; 254
Keywords
Digital forensics, IoT, ISO/IEC 27043, Readiness
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-70940 (URN)10.1007/978-3-030-80216-5_17 (DOI)2-s2.0-85112690214 (Scopus ID)978-3-030-80215-8 (ISBN)978-3-030-80216-5 (ISBN)
Conference
International Conference on Emerging Applications and Technologies for Industry 4.0 (EATI’2020), in Uyo, Akwa Ibom State, Nigeria , July 21–23, 2020
Available from: 2024-09-10 Created: 2024-09-10 Last updated: 2024-09-13Bibliographically approved
Al-Dhaqm, A., Razak, S., Ikuesan, R., Kebande, V. R. & Othman, S. (2021). Face Validation of Database Forensic Investigation Metamodel. Infrastructues, 6(2), 1-20, Article ID 13.
Open this publication in new window or tab >>Face Validation of Database Forensic Investigation Metamodel
Show others...
2021 (English)In: Infrastructues, ISSN 2412-3811, Vol. 6, no 2, p. 1-20, article id 13Article in journal, Editorial material (Other academic) Published
Abstract [en]

Using a face validity approach, this paper provides a validation of the Database Forensic Investigation Metamodel (DBFIM). The DBFIM was developed to solve interoperability, heterogeneity, complexity, and ambiguity in the database forensic investigation (DBFI) field, where severalmodels were identified, collected, and reviewed to develop DBFIM. However, the developedDBFIM lacked the face validity-based approach that could ensure DBFIM’s applicability in the DBFIfield. The completeness, usefulness, and logic of the developed DBFIM needed to be validated byexperts. Therefore, the objective of this paper is to perform the validation of the developed DBFIMusing the qualitative face validity approach. The face validity method is a common way of validating metamodels through subject expert inquiry on the domain application of the metamodel to assess whether the metamodel is reasonable and compatible based on the outcomes. For this purpose,six experts were nominated and selected to validate the developed DBFIM. From the expert review,the developed DBFIM was found to be complete, coherent, logical, scalable, interoperable, and useful for the DBFI field. 

Place, publisher, year, edition, pages
Basel: MDPI, 2021
Keywords
database forensics, digital forensic, face validity, metamodel, validation
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Science education
Identifiers
urn:nbn:se:mau:diva-39593 (URN)10.3390/infrastructures6020013 (DOI)000623662600001 ()2-s2.0-85100332066 (Scopus ID)
Available from: 2021-01-20 Created: 2021-01-20 Last updated: 2024-09-17Bibliographically approved
Zawali, B., Ikuesan, R. A., Kebande, V. R., Furnell, S. & A-Dhaqm, A. (2021). Realising a Push Button Modality for Video-Based Forensics. Infrastructures, 6(4), Article ID 54.
Open this publication in new window or tab >>Realising a Push Button Modality for Video-Based Forensics
Show others...
2021 (English)In: Infrastructures, ISSN 2412-3811, Vol. 6, no 4, article id 54Article in journal (Refereed) Published
Abstract [en]

Complexity and sophistication among multimedia-based tools have made it easy for perpetrators to conduct digital crimes such as counterfeiting, modification, and alteration without being detected. It may not be easy to verify the integrity of video content that, for example, has been manipulated digitally. To address this perennial investigative challenge, this paper proposes the integration of a forensically sound push button forensic modality (PBFM) model for the investigation of the MP4 video file format as a step towards automated video forensic investigation. An open-source multimedia forensic tool was developed based on the proposed PBFM model. A comprehensive evaluation of the efficiency of the tool against file alteration showed that the tool was capable of identifying falsified files, which satisfied the underlying assertion of the PBFM model. Furthermore, the outcome can be used as a complementary process for enhancing the evidence admissibility of MP4 video for forensic investigation.

Place, publisher, year, edition, pages
MDPI, 2021
Keywords
multimedia forensics, push button forensics, file signature alteration technique
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-42373 (URN)10.3390/infrastructures6040054 (DOI)000643749300001 ()2-s2.0-85108382505 (Scopus ID)
Available from: 2021-05-27 Created: 2021-05-27 Last updated: 2024-02-05Bibliographically approved
Kebande, V. R., Karie, N. & Ikuesan, R. (2021). Real-time monitoring as a supplementary security component of vigilantism in modern network environments. International Journal of Information Technology, 13, 5-17
Open this publication in new window or tab >>Real-time monitoring as a supplementary security component of vigilantism in modern network environments
2021 (English)In: International Journal of Information Technology, ISSN 2511-2104, Vol. 13, p. 5-17Article in journal (Refereed) Published
Abstract [en]

The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments.

Place, publisher, year, edition, pages
Springer Nature, 2021
Keywords
Real-time monitoring, Implementation, Vigilantism, Cyber security, Network environments, Issues and challenges
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:mau:diva-37543 (URN)10.1007/s41870-020-00585-8 (DOI)2-s2.0-85097278507 (Scopus ID)
Available from: 2020-12-11 Created: 2020-12-11 Last updated: 2024-09-17Bibliographically approved
Al-Dhaqm, A., Razak, S. A., Ikuesan, R. A., Kebande, V. R. & Siddique, K. (2020). A Review of Mobile Forensic Investigation Process Models. IEEE Access, 8, 173359-173375
Open this publication in new window or tab >>A Review of Mobile Forensic Investigation Process Models
Show others...
2020 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 8, p. 173359-173375Article, review/survey (Refereed) Published
Abstract [en]

Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques. Consequently, increased proliferation, mobile-based services, and the need for new requirements have led to the development of the MF field, which has in the recent past become an area of importance. In this article, the authors take a step to conduct a review on Mobile Forensics Investigation Process Models (MFIPMs) as a step towards uncovering the MF transitions as well as identifying open and future challenges. Based on the study conducted in this article, a review of the literature revealed that there are a few MFIPMs that are designed for solving certain mobile scenarios, with a variety of concepts, investigation processes, activities, and tasks. A total of 100 MFIPMs were reviewed, to present an inclusive and up-to-date background of MFIPMs. Also, this study proposes a Harmonized Mobile Forensic Investigation Process Model (HMFIPM) for the MF field to unify and structure whole redundant investigation processes of the MF field. The paper also goes the extra mile to discuss the state of the art of mobile forensic tools, open and future challenges from a generic standpoint. The results of this study find direct relevance to forensic practitioners and researchers who could leverage the comprehensiveness of the developed processes for investigation.

Place, publisher, year, edition, pages
IEEE, 2020
Keywords
Smart phones, Analytical models, Unified modeling language, Tools, Digital forensics, Mobile forensics, investigation process model
National Category
Computer Sciences
Identifiers
urn:nbn:se:mau:diva-36642 (URN)10.1109/ACCESS.2020.3014615 (DOI)000575905200001 ()2-s2.0-85097978190 (Scopus ID)
Available from: 2020-11-06 Created: 2020-11-06 Last updated: 2024-11-13Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4071-4596

Search in DiVA

Show all publications