Browsing by Author "Damasevicius,R."
Now showing 1 - 6 of 6
- Results Per Page
- Sort Options
Conference Object Citation Count: 3Conflict resolution via emerging technologies?(Institute of Physics Publishing, 2019) Mısra, Sanjay; Ugot,O.-A.; Misra,S.; Adewumi,A.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringThis paper presents a review of the current techniques and approaches adopted in conflict resolution in Multi-Agent Systems (MAS). The review highlights the strength and weaknesses, and thus, their success in fostering cooperation and collaboration in multi-agent systems. We survey alternative approaches to conflict resolution that rely on emerging technologies such as deep learning. From the survey, we discuss the benefits of using these emerging technologies in the conflict resolution process. © 2019 Published under licence by IOP Publishing Ltd.Conference Object Citation Count: 10Design and implementation of a mobile webcast application with google analytics and cloud messaging functionality(Institute of Physics Publishing, 2019) Mısra, Sanjay; Misra,S.; Ibanga,E.; Maskeliunas,R.; Damasevicius,R.; Ahuja,R.; Computer EngineeringChurch cast is an application developed to bring the messages of ministries closer to their members by harnessing the Internet and mobile devices. Due to the very busy schedules of people and religious restrictions in some countries, people are not usually able to be physically present at their locations of worship to listen to or watch their ministers. Existing applications developed in the past like DOMI radio and Redemption TV Media were limited to only audio, poor and unintuitive user interfaces and not providing the administrator any interactions with the users of the application. In this work, we develop an Android-based application that makes it possible for users to watch live streams and on-demand videos from their ministries using their mobile devices. The application also incorporates sharing and analytics functionalities to enable users to share videos messages with loved ones and help the administrator monitor users' activities on the application respectively. The cloud messaging functionality enables the administrator to send messages such as announcements to user devices as push notifications. This would eventually increase user knowledge and interaction with the activities going on in their respective places of worship. © 2019 Published under licence by IOP Publishing Ltd.Article Citation Count: 6The determinants of e-tourism websites for tourists while selecting a travel destination(Inderscience Publishers, 2022) Mısra, Sanjay; Majumdar,D.; Misra,S.; Damasevicius,R.; Computer EngineeringThe purpose of this article is to identify the determinants of the e-tourism websites for tourists to select their travel destinations. Based on the review of the literature, a conceptual model has been developed. The model contains antecedents of e-tourism websites that could help a tourist to select the travel destination. The model has been validated statistically with a survey involving 309 usable respondents. The PLS-SEM analysis was conducted for hypotheses testing and for validation of the conceptual model. The results show that the antecedents of e-tourism websites like the ease of use, website enjoyment, perceived authenticity of websites, and perceived risk have an impact on the tourists for selection of their travel destinations. The e-tourism websites should possess special features to help travellers to accurately finalise their travel destinations. The developer of the website should design the websites to be interactive so that the viewers can enjoy while surfing the website and should be cautious towards the accuracy of the information-content so that the viewers can feel the contents authenticated. Since there are not many studies in the context of the contribution of e-tourism websites for selecting a travel destination, this study has taken an attempt to fill up this gap. © 2022 Inderscience Enterprises Ltd.Article Citation Count: 40Identifying phishing attacks in communication networks using URL consistency features(Inderscience Publishers, 2020) Mısra, Sanjay; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.Article Citation Count: 40Identifying phishing attacks in communication networks using URL consistency features(Inderscience Publishers, 2020) Mısra, Sanjay; Salaudeen,B.B.; Misra,S.; Damasevicius,R.; Maskeliunas,R.; Computer EngineeringPhishing is a fraudulent attempt by cybercriminals, where the target audience is addressed by a text message, phone call or e-mail, requesting classified and sensitive information after presenting himself/herself as a legitimate agent. Successful phishing attack may result into financial loss and identity theft. Identifying forensic characteristics of phishing attack can help to detect the attack and its perpetuators and as well as to enable defence against it. To shield internet users from phishing assaults, numerous anti-phishing models have been proposed. Currently employed techniques to handle these challenges are not sufficient and capable enough. We aim at identifying phishing sites in order to guard internet users from being vulnerable to any form of phishing attacks by verifying the conceptual and literal consistency between the uniform resource locator (URL) and the web content. The implementation of the proposed PhishDetect method achieves an accuracy of 99.1%; indicating that it is effective in detecting various forms of phishing attacks. © 2020 Inderscience Enterprises Ltd.. All rights reserved.Conference Object Citation Count: 20An Improved Model for Alleviating Layer Seven Distributed Denial of Service Intrusion on Webserver(Institute of Physics Publishing, 2019) Mısra, Sanjay; Misra,S.; Adetiba,E.; Abayomi-Alli,O.; Damasevicius,R.; Ahuja,R.; Computer EngineeringApplication layer or Layer Seven Distributed Denial of service (L7DDoS) intrusion is one of the greatest threats that intrusion a webserver. The hackers have different motives which could be for Extortion, Exfiltration e.t.c Researchers have employed several methods to prevent L7DDoS intrusion especially using machine learning. Although Machine learning techniques has proven to be very effective with high detection accuracy, the approach still find it difficult to detect Hyper Text Transfer Protocol (HTTP) based botnet traffic on web server with high false positive rate. The adoption of deep learning based technique using Long Short Term Memory (LSTM) will alleviate this problem. © 2019 Published under licence by IOP Publishing Ltd.