• My PhD research is scientific research in the information and computer security field.
• it focused on cybersecurity of control systems of the operation technology field.
• The model is trying to solve the problem of insiders of the Industrial control system network. It is focused mainly on detecting unauthorized changes in the monitored file content of the operator and engineering workstation.
• files content could be changed by a trusted employee or trusted contractor, or neglected operator. It could be done also by any malicious action. This change could be intentionally or unintentionally. This change could be with malicious intent or without. but in the end, this change could have unwanted consequences.
I also built a tool by using python language, which simulates the work to my suggested model and tests it and its success in detection.
I tried to find previous review papers for the trial works to solve the problem of insiders; Compared with those previous studies, The previous studies follow many other ways to solve the problem of insider threats. some research by using a machine learning approach and other approaches which depend on monitoring internal logs and system commands. On the other hand, there are some approaches that try to monitor users’ behaviour and detect any non-normal activities.
As far as I know, I could not find any similar research trying to detect intrusion by monitoring file content.
the problem facing me now is how to validate the work of my model. I could not find any previous model to compare my model to and prove it can make improvements. and what is the parameter that the model enhances?
I need one to help me finish this work.
Please contact me if you understand the problem and you can really help.
you should do a PhD research in the cybersecurity field. the control system is recommended
20 freelances font une offre moyenne de 1066 $ pour ce travail
Hello, I am a PhD candidate in Electrical Engineering (control systems). I'm expert in MATLAB/Simulink and Python programming and by strong mathematical and statistical background, have good flexibility for solve your Plus
I am university professor in Computer Networks and Cybersecurity and cybersecurity expert eith around 50 published papers and one book. Check my science profile under Kire Jakimoski at [login to view URL] and researchgate.
As a skilled web security developer, I bid on your security model validation project because I have the expertise and experience to deliver superior quality work. I guarantee you constant updates in the project as a wa Plus
Good Day! If the project is deleted please open my portfolio link and hire me through my profile and lets discuss your project details . I have reviewed your project requirements and would like to assist you with th Plus
Hi I had a PhD in computer science. I had published many articles. I can help you. Contact me. Thanks.
Hi, i understood your project details very well and i can finish the same in your timeline. come over chat to discuss further
Hello, I am an experienced research writer and I will be glad to assist you with accomplishing your project of scientific research in the information and computer security field. I have written and published capstones Plus
Hi, I can rewrite, paraphrase, and rephrase the text to reduce plagiarism and make writing a unique piece. I will give you the plagiarism report along with the final file. I’ve been rewriting, paraphrasing and rephra Plus
YES, I CAN DO IT BEFORE YOUR DEADLINE.............. I am a PhD writer with 10 years of experience. I have worked on several similar projects of academic writing, and can deliver professional academic writing. I have s Plus
Hey Bakil A., Hope you are doing great today. > Please read it carefully, this is not a generic proposal < I see that you are looking for Need a doctor in information security field to help in PHD research writing Plus
Hi there! I’ve read your project requirement and I hope I can help you to complete the project within the budget. I have skills in article writing, blog management. Besides that I have 14+ years of working experience. Plus
Hi! I know where to look to elicit information, and how to properly analyze my findings using different citation styles. Every detail I get you, would be properly referenced for further investigations. Here are a c Plus
Hi! I have gone through your project details on this research. We can look for previous materials first. I had my PG in Information Intelligence and Cyber Security and I have over 9 years of experience in research whe Plus
I am establish Cyber-security professional with 12+ experience. Please find the attached CV for your kind consideration. I am working as an Architecture and prepare Technical Proposals, Designs, did Implementation, T Plus
Hi, Greetings and hoping you are doing well, i welcome you to my profile where quality and client satisfaction is the Priority. I am Expert Dominic and i hope to cooperate with you on your project . CERTIFIED EXPERT I Plus
DEAR CLIENT, Greetings and hoping you are doing well, i welcome you to my profile where quality and client satisfaction is the Priority. I am Engineer Joseph and i hope to cooperate with you on your project . CERTIFI Plus