Forthcoming and Online First Articles

International Journal of Critical Computer-Based Systems

International Journal of Critical Computer-Based Systems (IJCCBS)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Critical Computer-Based Systems (3 papers in press)

Regular Issues

  • Deep learning models for multi-class malware classification using Windows exe API Calls   Order a copy of this article
    by Kakelli Anil Kumar, Kaustubh Kumar, Nag Lohith Chiluka 
    Abstract: Metamorphic malware is new and one of the most advanced malwares recently discovered. This malware can bypass anti-viruses and are much harder to detect if present in any computer system or network. This research paper intends to develop a better classification method for this metamorphic malware using the latest malware API calls dataset. The multi-class malware classification used in this study is Gated Recurrent Units (GRU). Another non-conventional multi-class malware classification method used is Convolution Neural Network with Long Short-Term Memory (CNN+LSTM). The multi-classification results obtained by GRU are 55% with a 0.56 F1-score, and CNN+LSTM is 60% with a 0.61 F1-score, which is quite good. Moreover, the performance of the proposed deep learning models is compared against different classifiers and existing models to show their effectiveness in categorizing malware.
    Keywords: Metamorphic Malware; GRU; CNN+LSTM.
    DOI: 10.1504/IJCCBS.2022.10041810
  • Abstract Executions of Stochastic Discrete Event Systems   Order a copy of this article
    by Michel Batteux, Tatiana Prosvirnova, Antoine Rauzy 
    Abstract: Stochastic discrete event systems play a steadily increasing role in reliability engineering and beyond in systems engineering. Designing stochastic discrete event systems presents however a well-known difficulty: models are hard to debug and to validate because of the existence of infinitely many possible executions, itself due to stochastic delays, which are possibly intertwined with deterministic ones. In this article, revisiting ideas introduced in the framework of model-checking of timed and hybrid systems, we show that it is possible to abstract the time in stochastic discrete event systems, therefore alleviating considerably debugging and validation tasks. More specifically, we show that schedules of transitions can be abstracted into systems of linear inequalities and that abstract and concrete executions are bisimilar: any concrete execution can be simulated by an abstract execution and reciprocally any abstract execution corresponds to at least one concrete execution. Moreover, we propose an efficient algorithm to determine whether generated systems of linear inequalities have solutions. This algorithm takes advantage of the very specific form of inequalities. The result presented in this article represents thus a very important step forward in quality assurance of stochastic models of complex technical systems. We illustrate the potential of the proposed approach by means of AltaRica 3.0 models.
    Keywords: Stochastic Discrete Event Systems; Timed and Hybrid Automata; Abstract Intepretation; AltaRica 3.0;.

  • Formal Modelling and Verification of High Interactive Honeypot using Coloured Petri Nets   Order a copy of this article
    by Sheetal Gokhale, Irfan Siddavatam, Ashwini Dalvi, Mohammed Shaikh, Suchitra Patil 
    Abstract: Honeypot is an active defense mechanism intended to mimic a computer system concealing its identity to misguide attackers. The mechanism traps an attacker and collects intrusion information as they trespass a network environment and cause a menace for their interest. The paper proposes a honeypot tool with deadlock and livelock states to strengthen the defence mechanism and engage the attacker for a longer period. The proposed work aims to present the formal analysis of a honeypot using coloured petri nets tool. The three core components of the honeypot, such as data capture, control and collection, are included in the formal modelling to study the behavioural properties of a honeypot in a deadlock and livelock state. The main objective is to emphasize the working of high interaction honeypot in deadlock or livelock states under an attack surface. The honeypots formal model verification using a state-space tool in coloured petri net determines that an attacker wedged in a deadlock or livelock state fails to navigate further to fulfil malicious intent, thereby deceiving an attacker for a longer period.
    Keywords: honeypot; coloured petri net; CPN; formal analysis; cowrie.