{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:33:39Z","timestamp":1773840819976,"version":"3.50.1"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030311285","type":"print"},{"value":"9783030311292","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T00:00:00Z","timestamp":1569974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-31129-2_83","type":"book-chapter","created":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T18:04:51Z","timestamp":1569953091000},"page":"912-921","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Cyber Security Risks in MENA Region: Threats, Challenges and Countermeasures"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-678X","authenticated-orcid":false,"given":"Ahmed A.","family":"Mawgoud","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0200-2918","authenticated-orcid":false,"given":"Mohamed Hamed N.","family":"Taha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8614-9057","authenticated-orcid":false,"given":"Nour Eldeen M.","family":"Khalifa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3849-4566","authenticated-orcid":false,"given":"Mohamed","family":"Loey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,2]]},"reference":[{"issue":"1","key":"83_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1002\/wmh3.19","volume":"5","author":"D Barnett","year":"2013","unstructured":"Barnett, D., Sell, T., Lord, R., Jenkins, C., Terbush, J., Burke, T.: Cyber security threats to public health. World Med. Health Policy 5(1), 37\u201346 (2013)","journal-title":"World Med. Health Policy"},{"key":"83_CR2","unstructured":"Symantec.com: Internet Security Threat Report 2019 | Symantec (2019). \n                    https:\/\/www.symantec.com\/security-center\/threat-report\n                    \n                  . Accessed 11 June 2019"},{"key":"83_CR3","unstructured":"IstiZada: MENA Region Countries List 2018 | IstiZada (2019). \n                    http:\/\/istizada.com\/mena-region\/\n                    \n                  . Accessed 11 July 2019"},{"issue":"1","key":"83_CR4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1017\/S0026318400042371","volume":"34","author":"J Meri","year":"2000","unstructured":"Meri, J.: Software and technology review: multilingual computing in middle east studies. Middle East Stud. Assoc. Bull. 34(1), 14\u201319 (2000)","journal-title":"Middle East Stud. Assoc. Bull."},{"key":"83_CR5","doi-asserted-by":"publisher","unstructured":"Zeng, Q., Pu, S., Zhang, X.: Statistical tests for integrity attacks on cyber-physical systems. Asian J. Control (2018). \n                    https:\/\/doi.org\/10.1002\/asjc.1945","DOI":"10.1002\/asjc.1945"},{"issue":"2","key":"83_CR6","first-page":"31","volume":"5","author":"A Efg","year":"2016","unstructured":"Efg, A.: The impact of cybercrimes on global trade and commerce. Int. J. Inform. Secur. Cybercr. 5(2), 31\u201350 (2016)","journal-title":"Int. J. Inform. Secur. Cybercr."},{"issue":"1","key":"83_CR7","first-page":"59","volume":"2","author":"F Parodi","year":"2013","unstructured":"Parodi, F.: The concept of cybercrime and online threats analysis. Int. J. Inform. Secur. Cybercr. 2(1), 59\u201366 (2013)","journal-title":"Int. J. Inform. Secur. Cybercr."},{"issue":"5","key":"83_CR8","first-page":"3037","volume":"11","author":"S Alshathry","year":"2016","unstructured":"Alshathry, S.: Cyber attack on saudi aramco. Int. J. Manage. Inform. Technol. 11(5), 3037\u20133039 (2016)","journal-title":"Int. J. Manage. Inform. Technol."},{"issue":"1","key":"83_CR9","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1080\/13600834.2014.891870","volume":"23","author":"L Strikwerda","year":"2014","unstructured":"Strikwerda, L.: Should virtual cybercrime be regulated by means of criminal law? A philosophical, legal-economic, pragmatic and constitutional dimension. Inform. Commun. Technol. Law 23(1), 31\u201360 (2014)","journal-title":"Inform. Commun. Technol. Law"},{"key":"83_CR10","unstructured":"Internetworldstats.com: Middle East Internet Statistics and Telecommunications Reports(2019). \n                    https:\/\/internetworldstats.com\/stats5.htm\n                    \n                  . Accessed 09 June 2019"},{"key":"83_CR11","unstructured":"Statista: Middle East: internet penetration 2019 | Statista (2019). \n                    https:\/\/www.statista.com\/statistics\/265171\/comparison-of-global-and-middle-eastern-internet-penetration-rate\/\n                    \n                  . Accessed 03 June 2019"},{"key":"83_CR12","unstructured":"2018.semantics.cc: SEMANTiCS 2018 (2019). \n                    https:\/\/2018.semantics.cc\/\n                    \n                  . Accessed 08 June 2019"},{"key":"83_CR13","unstructured":"World Internet Users Statistics and World Population Stats. In: Internetworldstats.com. \n                    https:\/\/internetworldstats.com\/stats.htm\n                    \n                  . Accessed 07 Jun. 2019"},{"key":"83_CR14","doi-asserted-by":"publisher","first-page":"235","DOI":"10.5755\/j01.itc.48.2.21457","volume":"48","author":"A Kabakus","year":"2019","unstructured":"Kabakus, A.: What static analysis can utmost offer for android malware detection. Inform. Technol. Control 48, 235\u2013240 (2019). \n                    https:\/\/doi.org\/10.5755\/j01.itc.48.2.21457","journal-title":"Inform. Technol. Control"},{"key":"83_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/s1353-4858(00)80045-8","volume":"1995","author":"D Thomsen","year":"1995","unstructured":"Thomsen, D.: IP spoofing and session hijacking. Netw. Secur. 1995, 6\u201311 (1995). \n                    https:\/\/doi.org\/10.1016\/s1353-4858(00)80045-8","journal-title":"Netw. Secur."},{"key":"83_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-74390-5","volume-title":"Vulnerability Analysis and Defense for the Internet","author":"A Singh","year":"2008","unstructured":"Singh, A., Singh, B., Joseph, H.: Vulnerability Analysis and Defense for the Internet. Springer, New York (2008)"},{"key":"83_CR17","doi-asserted-by":"publisher","first-page":"6215","DOI":"10.1002\/sec.1767","volume":"9","author":"\u015e Bahtiyar","year":"2016","unstructured":"Bahtiyar, \u015e.: Anatomy of targeted attacks with smart malware. Secur. Commun. Netw. 9, 6215\u20136226 (2016). \n                    https:\/\/doi.org\/10.1002\/sec.1767","journal-title":"Secur. Commun. Netw."},{"key":"83_CR18","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.3390\/s19112424","volume":"19","author":"D Nagothu","year":"2019","unstructured":"Nagothu, D., Chen, Y., Blasch, E., et al.: Detecting malicious false frame injection attacks on surveillance systems at the edge using electrical network frequency signals. Sensors 19, 2424 (2019). \n                    https:\/\/doi.org\/10.3390\/s19112424","journal-title":"Sensors"},{"key":"83_CR19","doi-asserted-by":"publisher","first-page":"214","DOI":"10.31119\/jssa.2018.21.2.8","volume":"21","author":"A Kaveyeva","year":"2018","unstructured":"Kaveyeva, A., Gurin, K.: \u201cVKontakte\u201d fake accounts and their influence on the users\u2019 social network. Zhurnal Sotsiologii i Sotsialnoy Antropologii (J. Sociol. Soc. Anthropol.) 21, 214\u2013231 (2018). \n                    https:\/\/doi.org\/10.31119\/jssa.2018.21.2.8","journal-title":"Zhurnal Sotsiologii i Sotsialnoy Antropologii (J. Sociol. Soc. Anthropol.)"},{"key":"83_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.18046\/syt.v15i41.2442","volume":"15","author":"O Mondrag\u00f3n","year":"2017","unstructured":"Mondrag\u00f3n, O., Mera Arcos, A., Urcuqui, C., Navarro Cadavid, A.: Security control for website defacement. Sistemas Telem\u00e1tica 15, 45\u201355 (2017). \n                    https:\/\/doi.org\/10.18046\/syt.v15i41.2442","journal-title":"Sistemas Telem\u00e1tica"},{"key":"83_CR21","doi-asserted-by":"publisher","first-page":"25","DOI":"10.5120\/15595-4341","volume":"90","author":"K Patel","year":"2014","unstructured":"Patel, K.: Recognizing spam domains by extracting features from spam emails. Int. J. Comput. Appl. 90, 25\u201330 (2014). \n                    https:\/\/doi.org\/10.5120\/15595-4341","journal-title":"Int. J. Comput. Appl."},{"key":"83_CR22","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.cose.2017.07.012","volume":"73","author":"Y Guo","year":"2018","unstructured":"Guo, Y., Zhang, Z.: LPSE: lightweight password-strength estimation for password meters. Comput. Secur. 73, 507\u2013518 (2018). \n                    https:\/\/doi.org\/10.1016\/j.cose.2017.07.012","journal-title":"Comput. Secur."},{"key":"83_CR23","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1002\/sec.738","volume":"7","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Peng, W., Su, J.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7, 2201\u20132210 (2013). \n                    https:\/\/doi.org\/10.1002\/sec.738","journal-title":"Secur. Commun. Netw."},{"key":"83_CR24","doi-asserted-by":"publisher","first-page":"37","DOI":"10.9766\/kimst.2015.18.1.037","volume":"18","author":"S Jee","year":"2015","unstructured":"Jee, S., Kim, S., Lee, J.: A study to efficiently overcome GPS jamming and GPS spoofing by using data link system. J. Korea Inst. Milit. Sci. Technol. 18, 37\u201345 (2015). \n                    https:\/\/doi.org\/10.9766\/kimst.2015.18.1.037","journal-title":"J. Korea Inst. Milit. Sci. Technol."},{"key":"83_CR25","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-019-0084-4","author":"J Zhao","year":"2019","unstructured":"Zhao, J., Shetty, S., Pan, J., et al.: Transfer learning for detecting unknown network attacks. EURASIP J. Inform. Secur. (2019). \n                    https:\/\/doi.org\/10.1186\/s13635-019-0084-4","journal-title":"EURASIP J. Inform. Secur."},{"key":"83_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.15373\/22501991\/july2014\/37","volume":"3","author":"DS Rajamohan","year":"2012","unstructured":"Rajamohan, D.S., Subha, K.K.: Information technology in financial inclusion. Paripex - Indian J. Res. 3, 1\u20132 (2012). \n                    https:\/\/doi.org\/10.15373\/22501991\/july2014\/37","journal-title":"Paripex - Indian J. Res."},{"key":"83_CR27","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.cose.2018.08.007","volume":"79","author":"R Torten","year":"2018","unstructured":"Torten, R., Reaiche, C., Boyle, S.: The impact of security awarness on information technology professionals\u2019 behavior. Comput. Secur. 79, 68\u201379 (2018). \n                    https:\/\/doi.org\/10.1016\/j.cose.2018.08.007","journal-title":"Comput. Secur."},{"key":"83_CR28","unstructured":"Middle East: internet penetration | Statista. In: Statista. \n                    https:\/\/www.statista.com\/statistics\/265171\/comparison-of-global-and-middle-eastern-internet-penetration-rate\/\n                    \n                  . Accessed 08 July 2019"},{"key":"83_CR29","unstructured":"Kaspersky Security Analyst Summit (SAS) \u2013 Singapore, 8\u201311 April 2019. In: Kaspersky Security Summit (SAS) \u2013 Singapore, 8\u201311 April 2019. \n                    https:\/\/sas.kaspersky.com\/\n                    \n                  . Accessed 11 July 2019"},{"key":"83_CR30","doi-asserted-by":"publisher","first-page":"339","DOI":"10.24908\/ss.v9i4.4339","volume":"9","author":"C Bennett","year":"2012","unstructured":"Bennett, C., Clement, A., Milberry, K.: Introduction to cyber-surveillance. Surveill. Soc. 9, 339\u2013347 (2012). \n                    https:\/\/doi.org\/10.24908\/ss.v9i4.4339","journal-title":"Surveill. Soc."},{"key":"83_CR31","doi-asserted-by":"publisher","first-page":"7","DOI":"10.11610\/isij.3401","volume":"34","author":"P Tasevski","year":"2016","unstructured":"Tasevski, P.: IT and cyber security awareness \u2013 raising campaigns. Inform. Secur.: Int. J. 34, 7\u201322 (2016). \n                    https:\/\/doi.org\/10.11610\/isij.3401","journal-title":"Inform. Secur.: Int. J."},{"key":"83_CR32","unstructured":"Restricting cybersecurity, violating human rights: cybercrime laws in MENA region. In: OpenGlobalRights (2019). \n                    https:\/\/www.openglobalrights.org\/restricting-cybersecurity-violating-human-rights\/\n                    \n                  . Accessed 22 Jan 2019"},{"key":"83_CR33","unstructured":"Hakmeh, J.: Cybercrime Legislation in the GCC Countries, International Security Department, Chatham House (The Royal Institute of International Affairs), July 2018"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the International Conference on Advanced Intelligent Systems and Informatics 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31129-2_83","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T01:56:32Z","timestamp":1569981392000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-31129-2_83"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,2]]},"ISBN":["9783030311285","9783030311292"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31129-2_83","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,2]]},"assertion":[{"value":"2 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AISI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Intelligent Systems and Informatics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Egypt","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aisi2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/egyptscience.net\/AISI2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}