Search Results

Results (82)

Search Parameters:

Keyword: Attack
Order results
Results per page
Open AccessArticle
13 Pages, 3,740 KB Download PDF

Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 107–119, 2023; DOI: 10.25046/aj080612
Abstract:

Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section -)
Open AccessArticle
13 Pages, 1,308 KB Download PDF

Waterfall: Salto Collazo. High-Level Design of Tokenomics

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 231–243, 2023; DOI: 10.25046/aj080326
Abstract:

This article explains the fundamental principles of the economic policy that are integrated into the decentralized public platform Waterfall. The platform has a DAG (Directed Acyclic Graph) based system architecture and is designed to develop decentralized applications and financial services. The main goal of this work is to create a favorable environment that incentivizes positive…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 1,889 KB Download PDF

Multiple Criteria Decision-making: Risk Analyses for the Soft Target

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 14–23, 2023; DOI: 10.25046/aj080202
Abstract:

This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Operations Research & Management Science (ORM))
Open AccessArticle
15 Pages, 1,706 KB Download PDF

An Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 63–77, 2023; DOI: 10.25046/aj080108
Abstract:

Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 917 KB Download PDF

Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 13–19, 2022; DOI: 10.25046/aj070602
Abstract:

Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,188 KB Download PDF

A Comparison of Cyber Security Reports for 2020 of Central European Countries

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 105–113, 2022; DOI: 10.25046/aj070414
Abstract:

The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,136 KB Download PDF

A Secure Trust Aware ACO-Based WSN Routing Protocol for IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 95–105, 2022; DOI: 10.25046/aj070311
Abstract:

The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 428 KB Download PDF

Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 25–31, 2022; DOI: 10.25046/aj070203
Abstract:

The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
18 Pages, 2,108 KB Download PDF

iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 185–202, 2021; DOI: 10.25046/aj060521
Abstract:

The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 930 KB Download PDF

Enhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 355–367, 2021; DOI: 10.25046/aj060440
Abstract:

Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,212 KB Download PDF

Hiding Information in DNA Sequence Data using Open Reading Frame Guided Splicing

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 3, Page # 164–171, 2021; DOI: 10.25046/aj060319
Abstract:

Encouraged by the huge publicly available genomic databases, research in the field of steganography was recently extended to utilize DNA sequence data to conceal secret information. As an extension of the work presented earlier by the author, this paper proposes an approach for a secure data communication channel between two parties. At one side of…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 818 KB Download PDF

Securing IPv6 Neighbor Discovery using Pre-Shared Key

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 722–732, 2021; DOI: 10.25046/aj060284
Abstract:

Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 681 KB Download PDF

An Operational Responsibility and Task Monitoring Method: A Data Breach Case Study

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 1157–1163, 2021; DOI: 10.25046/aj0601130
Abstract:

As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 546 KB Download PDF

Modified Blockchain based Hardware Paradigm for Data Provenance in Academia

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 66–77, 2021; DOI: 10.25046/aj060108
Abstract:

Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…

Read More
(This article belongs to Section Electronic Engineering (EEE))
Open AccessArticle
9 Pages, 858 KB Download PDF

An Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1741–1749, 2020; DOI: 10.25046/aj0506208
Abstract:

Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 592 KB Download PDF

A Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1657–1665, 2020; DOI: 10.25046/aj0506197
Abstract:

Automatic Dependent Surveillance-Broadcast (ADS-B) is the future of aviation. It is a vast system that provides situational awareness for the aviator and regulator at a very low cost and does so with the aid of multiple disparate systems working closely together and communicating with one another. ADS-B uses the Global Navigation Satellite System (GNSS/ GPS)…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 712 KB Download PDF

A Computational Modelling and Algorithmic Design Approach of Digital Watermarking in Deep Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1560–1568, 2020; DOI: 10.25046/aj0506187
Abstract:

In this paper we propose an algorithmic approach for Convolutional Neural Network (CNN) for digital watermarking which outperforms the existing frequency domain techniques in all aspects including security along with the criteria in the neural networks such as conditions embedded, and types of watermarking attack. This research addresses digital watermarking in deep neural networks and…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,515 KB Download PDF

Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1178–1189, 2020; DOI: 10.25046/aj0506142
Abstract:

Cyberattacks such as spear phishing and malspam pretending to be companies, institutes, and government officials are increasing and evolving. Malware has a variety of purposes, such as collecting personal information and illegal access to the system. New types of malware are increasing every day, and many malware programs spread all over the Internet, causing severe…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 811 KB Download PDF

An Enhanced Conceptual Security Model for Autonomous Vehicles

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 853–864, 2020; DOI: 10.25046/aj0506102
Abstract:

Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
6 Pages, 568 KB Download PDF

An Overview on CryptDb and Word2vec Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1282–1287, 2020; DOI: 10.25046/aj0505154
Abstract:

Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 996 KB Download PDF

Review of Pedagogical Principles of Cyber Security Exercises

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 592–600, 2020; DOI: 10.25046/aj050572
Abstract:

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026