Horizons in Computer Science Research No part of this digital document may be reprod uced, stored in a retrieval system or transmitted in any form or by any means. The publisher has taken reasonable care in the preparation of this digital document, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained herein. This digital document is sold with the clear understanding that the publisher is not engaged in rendering legal, medical or any other professional services. Horizons in Computer Science Research Horizons in Computer Science Research. Volume 20 Thomas S. Clary (Editor) 2021. ISBN: 978-1-53619-103-5 (Hardcover) 2021. ISBN: 978-1-53619-107-3 (eBook) Horizons in Computer Science Research. Volume 19 Thomas S. Clary (Editor) 2020. ISBN: 978-1-53618-311-5 (Hardcover) 2018. ISBN: 978-1-53618-359-7 (eBook) Horizons in Computer Science Research. Volume 18 Thomas S. Clary (Editor) 2020. ISBN: 978-1-53617-595-0 (Hardcover) 2020. ISBN: 978-1-53617-596-7 (eBook) Horizons in Computer Science Research. Volume 17 Thomas S. Clary (Editor) 2018. ISBN: 978-1-53614-419-2 (Hardcover) 2018. ISBN: 978-1-53614-420-8 (eBook) Horizons in Computer Science Research. Volume 16 Thomas S. Clary (Editor) 2018. ISBN: 978-1-53613-327-1 (Hardcover) 2018. ISBN: 978-1-53613-328-8 (eBook) More information about this series can be found at https://novapublishers.com/product-category/series/horizons-in-computer- science/ Thomas S. Clary Editor Horizons in Computer Science Research Volume 21 Copyright © 2022 by Nova Science Publishers, Inc. DOI: All rights reserved. No part of this book may be reproduced, stored in a retrieval system or transmitted in any form or by any means: electronic, electrostatic, magnetic, tape, mechanical photocopying, recording or otherwise without the written permission of the Publisher. We have partnered with Copyright Clearance Center to make it easy for you to obtain permissions to reuse content from this publication. Simply navigate to this publication’s page on Nova’s website and locate the “Get Permission” button below the title description. This button is linked directly to the title’s permission page on copyright.com. Alternatively, you can visit copyright.com and search by title, ISBN, or ISSN. For further questions about using the service on copyright.com, please contact: Copyright Clearance Center Phone: +1-(978) 750-8400 Fax: +1-(978) 750-4470 E-mail: [email protected]. NOTICE TO THE READER The Publisher has taken reasonable care in the preparation of this book, but makes no expressed or implied warranty of any kind and assumes no responsibility for any errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of information contained in this book. The Publisher shall not be liable for any special, consequential, or exemplary damages resulting, in whole or in part, from the readers’ use of, or reliance upon, this material. Any parts of this book based on government reports are so indicated and copyright is claimed for those parts to the extent applicable to compilations of such works. Independent verification should be sought for any data, advice or recommendations contained in this book. In addition, no responsibility is assumed by the Publisher for any injury and/or damage to persons or property arising from any methods, products, instructions, ideas or otherwise contained in this publication. This publication is designed to provide accurate and authoritative information with regard to the subject matter covered herein. It is sold with the clear understanding that the Publisher is not engaged in rendering legal or any other professional services. If legal or any other expert assistance is required, the services of a competent person should be sought. FROM A DECLARATION OF PARTICIPANTS JOINTLY ADOPTED BY A COMMITTEE OF THE AMERICAN BAR ASSOCIATION AND A COMMITTEE OF PUBLISHERS. Additional color graphics may be available in the e-book version of this book. Library of Congress Cataloging-in-Publication Data ISBN: (cid:28)(cid:26)(cid:27)(cid:16)(cid:20)(cid:16)(cid:25)(cid:27)(cid:24)(cid:19)(cid:26)(cid:16)(cid:25)(cid:27)(cid:23)(cid:16)(cid:28)(cid:3)(cid:11)(cid:72)(cid:37)(cid:82)(cid:82)(cid:78)(cid:12) ISSN: 2159-2012 Published by Nova Science Publishers, Inc. † New York Contents Preface .......................................................................................... vii Chapter 1 Future Directions Towards Effective Legal Regulation of Cloud Computing ......................................1 Rebecca Parry Chapter 2 The Current Mechanısms for Malware Detectıon and Response ..................................39 Ahmet Hasan Koltuksuz and Cagatay Yucel Chapter 3 Phishing in a Pandemic: Hidden Danger of COVID-19 .........................................79 Vida M. Vilić Chapter 4 IT Disaster Recovery Planning: Establishing and Analyzing the Constructs................. 117 Tejinder Pal Singh Brar, Ravi Kumar Sharma and Parul Gandhi Chapter 5 Resource and Power Management for In-Band D2D Communications .................................... 131 You-Chiun Wang Chapter 6 Digitization Technology of Old Romanian Documents Printed in the Cyrillic Script .................... 185 A. Colesnicov, L. Malahov, S. Cojocaru and L. Burtseva Contents of Earlier Volumes .................................................................... 219 Index ......................................................................................... 225 Preface This volume includes six chapters presenting some of the latest updates in computer science research. Chapter One considers possible future directions as to the role of law in relation to cloud computing and related services and how this could offer additional protection for service users. Chapter Two presents an overview of mechanisms for malware detection and response. Chapter Three presents some of the most common cybersecurity problems connected to the COVID-19 pandemic. Chapter Four describes a consistent and suitable plan for IT disaster recovery. Chapter Five provides a comprehensive survey of resource and power management schemes for in- band device-to-device communications. Lastly, Chapter Six presents technologies and approaches developed for digitization of old Romanian documents. Chapter 1 - Cloud computing offers significant advantages to businesses, as well as public bodies and individuals and it has significantly grown in usage in recent years, with a 2020 global market value of $219 billion predicted to rise to $791.48 billion by 2028 (Fortune Business Insights, 2021). This technology, which enables users to store and access data remotely, as well as to access infrastructure, platforms and software remotely, can offer significant costs savings and other advantages. At the same time there is growing concentration of cloud service supply among a small number of market players which brings with it possible market distortions and regulators are only starting to get to grips with what is needed for a competitive marketplace. This concentration of service supply also brings with it vulnerability as service outage can cause widespread disruption. At its worst there is the under- appreciated risk of the insolvency of a service provider, which has the potential to be devastating, even presenting the possibility of a ‘too big to fail’ scenario. The concentration of service suppliers also presents vulnerability to hackers who may identify weaknesses in services on which many businesses, individuals and public bodies depend. There is therefore the possibility of significant damage to be caused to the affairs of businesses and individuals, viii Thomas S. Clary raising a possible need for greater regulation of this sector. This chapter will consider possible future directions as to the role of law in relation to cloud computing and related services and how this could offer additional protection for service users. While there is an argument that this is an area of shared responsibility and service users should exercise caution and avoid creating potential for single points of failure there are broader public risks that must be appreciated. Chapter 2 - This research starts with the short history of malware which is followed by the taxonomical suggestions to define the structure for a typical malware, which has been identified with ever-evolving characteristics. The dimension of maliciousness demands an imperative work of analysis to detect & remove the malware to achieve cybersecurity. The utilized static and dynamic analysis techniques to determine malware are conventional and thus have been progressing steadily over the years. However, each of these determination methodologies has its weak points as well as its strong sides. The utilization of memory imaging of malware to detect it over the information & communication systems has been relatively new and is thus promising to overcome those deficiencies of conventional methodologies for memory imaging constitutes the fingerprinting mechanism for malware. The malware mitigation and response methodologies are also considered as the last part of this research. Chapter 3 - The coronavirus pandemic has brought a new reality to people all around the world, caused people to feel the fear of unknown, fear of the new virus, sudden complete change of habits and lifestyles, social isolation, restriction of freedom of movement, mandatory self-isolation. People were forced to transfer their everyday habits and professional obligations to cyberspace. As COVID-19 continued to spread, companies had to allow employees to work from their home, although this resulted in an inadequate level of cyber security, security loopholes, and a mass of deviant behaviors which made businesses vulnerable. Employees using home network and public internet services to access their official resources added a new set of security challenges, since privacy issue remain ignored in the wake of COVID-19. Also, educational system all over the world transferred into cyberspace, relying to the distance learning and online classes. Medical and healthcare systems became overload with confidential data about the patients and their medical condition. Hackers’ phishing activities jeopardized all confidential information gathered by the employers, educational institutions and medical informational systems, causing great danger to private data collections and personal information of individuals.