Hanna Paulose's scientific contributions

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (2)


A Survey on Human Behavioral Cybersecurity Risk During and Post Pandemic World
  • Chapter

July 2023

·

16 Reads

Hanna Paulose

·

Ashwani Sethi

COVID-19 pandemic also gave rise to cyber pandemic when the incidence of cybercrimes increased manifold all over the world. As the existing health infrastructure crumbled in the face of the severity of the COVID-19, so did the prevalent technical architecture, procedures, policies and practices of cybersecurity at various enterprises in the face of vigorous cyber-attacks. The strict lockdown(s) and quarantine protocols enforced during the pandemic affected the mental condition and human behavior adversely. Loss of lives and livelihoods further aggravated the mental condition causing so many people to become angry, anxious and paranoid. At the same time, the need for remote working increased the dependence on technology networks which proliferated immensely without due regard to cybersecurity architecture. Rapid pace of adoption of emerging technologies necessitated by lockdowns and the enhanced metal stress due to pandemic considerably increased the attack surface for social engineering-based attacks. In this paper we have carried out a systematic literature survey of the threat landscape both, during and post pandemic world in view of human behavioral changes. We have then recommended a mitigation framework incorporating necessary regulations at national level, policies and security culture at organizational level, procedures at operational level and training at individual levels to mitigate the risks associated with the changed threat landscape.KeywordsCOVID-19Mitigation frameworkCybersecurityRansomware attacksCrypto-currenciesMetaverseVulnerabilitiesInformation communication technologiesMachine learning

Share

Dam Break Analysis of Peringalkuthu Dam, Thrissur Using HEC-RAS

July 2022

·

90 Reads

·

·

·

[...]

·

Hanna Paulose

A Dam break analysis is performed to model the flow of flood waves downstream of a dam in the event of a dam break. It involves field data collection and computer simulation to evaluate the dam failure and the impact of dam break on downstream area. Studies conducted to analyze the flood zoning and inundation mapping of different dams such as Idukki, Hidkal, Pulichinathala[1]-[3] etc., prove to be crucial for disaster management in the event of a dam breach. After the literature review, we identified that Peringalkuthu Dam in Thrissur district hasn't been considered for such studies, despite being an aged dam (65+ years) whose safety has come under question during the August 2018 floods. The aim of this project is to conduct a Dam Break Analysis of Peringalkuthu Dam using HEC-RAS to find inundation maps showing depth, velocity and water stage elevation in the event of a dam breach. Input parameters like Design Flood Hydrograph, Manning's Roughness Coefficient, breach Parameters, and Elevation Storage relationship to draw results. The population under risk is also identified. Dam breach studies and inundation maps are important in preparing Emergency Action Plans and proper warning systems.