Please note that server maintenance will be carried out on 24 October 2021 (Sunday) from 8 am to 11:59 am (BST). Website is inaccessible during the maintenance hours. We apologise for any inconvenience caused. If you
have any question or concern, please contact supportinderscience.com.
Forthcoming and Online First Articles
International Journal of Critical Computer-Based Systems
Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.
Articles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
International Journal of Critical Computer-Based Systems (3 papers in press)
Deep learning models for multi-class malware classification using Windows exe API Calls by Kakelli Anil Kumar, Kaustubh Kumar, Nag Lohith Chiluka Abstract: Metamorphic malware is new and one of the most advanced malwares recently discovered. This malware can bypass anti-viruses and are much harder to detect if present in any computer system or network. This research paper intends to develop a better classification method for this metamorphic malware using the latest malware API calls dataset. The multi-class malware classification used in this study is Gated Recurrent Units (GRU). Another non-conventional multi-class malware classification method used is Convolution Neural Network with Long Short-Term Memory (CNN+LSTM). The multi-classification results obtained by GRU are 55% with a 0.56 F1-score, and CNN+LSTM is 60% with a 0.61 F1-score, which is quite good. Moreover, the performance of the proposed deep learning models is compared against different classifiers and existing models to show their effectiveness in categorizing malware. Keywords: Metamorphic Malware; GRU; CNN+LSTM. DOI: 10.1504/IJCCBS.2022.10041810
Abstract Executions of Stochastic Discrete Event Systems by Michel Batteux, Tatiana Prosvirnova, Antoine Rauzy Abstract: Stochastic discrete event systems play a steadily increasing role in reliability engineering and beyond in systems engineering.
Designing stochastic discrete event systems presents however a well-known difficulty:
models are hard to debug and to validate because of the existence of infinitely many possible executions, itself due to stochastic delays, which are possibly intertwined with deterministic ones.
In this article, revisiting ideas introduced in the framework of model-checking of timed and hybrid systems, we show that it is possible to abstract the time in stochastic discrete event systems, therefore alleviating considerably debugging and validation tasks.
More specifically, we show that schedules of transitions can be abstracted into systems of linear inequalities and that abstract and concrete executions are bisimilar: any concrete execution can be simulated by an abstract execution
and reciprocally any abstract execution corresponds to at least one concrete execution.
Moreover, we propose an efficient algorithm to determine whether generated systems of linear inequalities have solutions.
This algorithm takes advantage of the very specific form of inequalities.
The result presented in this article represents thus a very important step forward
in quality assurance of stochastic models of complex technical systems.
We illustrate the potential of the proposed approach by means of AltaRica 3.0 models. Keywords: Stochastic Discrete Event Systems; Timed and Hybrid Automata; Abstract Intepretation; AltaRica 3.0;.
Formal Modelling and Verification of High Interactive Honeypot using Coloured Petri Nets by Sheetal Gokhale, Irfan Siddavatam, Ashwini Dalvi, Mohammed Shaikh, Suchitra Patil Abstract: Honeypot is an active defense mechanism intended to mimic a computer system concealing its identity to misguide attackers. The mechanism traps an attacker and collects intrusion information as they trespass a network environment and cause a menace for their interest. The paper proposes a honeypot tool with deadlock and livelock states to strengthen the defence mechanism and engage the attacker for a longer period. The proposed work aims to present the formal analysis of a honeypot using coloured petri nets tool. The three core components of the honeypot, such as data capture, control and collection, are included in the formal modelling to study the behavioural properties of a honeypot in a deadlock and livelock state. The main objective is to emphasize the working of high interaction honeypot in deadlock or livelock states under an attack surface. The honeypots formal model verification using a state-space tool in coloured petri net determines that an attacker wedged in a deadlock or livelock state fails to navigate further to fulfil malicious intent, thereby deceiving an attacker for a longer period. Keywords: honeypot; coloured petri net; CPN; formal analysis; cowrie.