Here is my interview with James Coker from Infosecurity Magazine …
Blog
رتبه بندی دانشگاههای خارج از کشور
در آخرین سطح بندی دانشگاههای انگلستان از طرف اداره کل دانش آموختگان وزارت علوم، مدرک دانشجویان ایرانی که بعد از سپتامبر 2020 در دانشگاههای ساری، بورنموث، برونل به تحصیل می پردازند در سطح دانشگاهی ممتاز طبقه بندی و چنانچه در دانشگاه استفردشایر پذیرفته شوند، در رده دانشگاه خوب قرار می گیرند
CYBOK
For the first time, Cybersecurity Body of Knowledge (CYBOK) is published by NCSC in the UK. In my video, I am reviewing this important project and its relation to the design of our BSc (Hons) Cyber Security course at SUL.
Computer Science – Complete University Guide Ranking 2020
Good to know that Computer Science subject at Staffodshire University, jumped 10 places in 2020 to reach 54th place in the Complete University Guide League Table. Keep it up guys!
Interview with an Industry Expert
Please watch video, where my guest, Dr Amir Taba, a successful industry expert, advises new Computer Science students of mine on golden opportunities & arduous challenges they face in their academic/professional journeys …
Introducing Key Roles in Cybersecurity Job Market
Hi, please check out my new video where I introduced the roles & the required skills to help Cybersecurity job seekers, mainly my UG students.
A new journal paper!
Happy to announce that our new journal paper on IoT Security was just published in Elsevier, see below for more info:
Authors: Mohammad Heydari, Alexios Mylonas, Vahid Heydari Fami Tafreshi, Elhadj Benkhelifa, Surjit Singh,
Title: Known unknowns: Indeterminacy in authentication in IoT,
Journal: Future Generation Computer Systems, Volume 111, 2020, Pages 278-287, ISSN 0167-739X, https://doi.org/10.1016/j.future.2020.03.005.
Abstract: The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and privacy challenges. Indeed, IoT devices create, process, transfer and store data, which are often sensitive, and which must be protected from unauthorized access. Similarly, the infrastructure that links with IoT, as well as the IoT devices themselves, is an asset that needs to be protected. The focus of this work is examining authentication in IoT. In particular, in this work we conducted a state-of-the-art review of the access control models that have been proposed, including both traditional access control models and emerging models that have recently been proposed and are tailored for IoT. We identified that the existing models cannot cope with indeterminacy, an inherent characteristic of IoT, which hinders authentication decisions. In this context, we studied the two known components of indeterminacy, i.e., uncertainty and ambiguity, and proposed a new model that handles indeterminacy in authentication in IoT environments.
Keywords: Internet of Things; Authentication; Uncertainty; Ambiguity; Access control
Python within Pi!
Hi, please see my video for an introduction on Raspberry Pi 4 Model B & Thonny as a Python IDE within those single-board computers!
Introducing Cybersecurity Course at SUL
Hi fellows, please see video where I briefly explain the structure of the BSc Cybersecurity course at Staffordshire University London (SUL).
DoS against WLAN
Hi, a short demo on DoS against WLAN is now available here for my students, enjoy learning!