Search Results

Results (189)

Search Parameters:

Keyword: Security
Order results
Results per page
Open AccessArticle
8 Pages, 901 KB Download PDF

Applications of Causal Modeling in Cybersecurity: An Exploratory Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 380–387, 2020; DOI: 10.25046/aj050349
Abstract:

Our research investigates the use of causal modeling and its application towards mapping out cybersecurity threat patterns. We test the strength of various methods of data breaches over its impact on the breach’s discovery time as well as the number of records lost. Utilizing a Causal Modeling framework, we simulate the isolation of confounding variables…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 625 KB Download PDF

Based on Reconfiguring the Supercomputers Runtime Environment New Security Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 291–298, 2020; DOI: 10.25046/aj050338
Abstract:

This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
15 Pages, 1,373 KB Download PDF

Attacks classification and security mechanisms in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 229–243, 2019; DOI: 10.25046/aj040630
Abstract:

This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,108 KB Download PDF

A Big Data Security Layer Meta-Model Proposition

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 409–418, 2019; DOI: 10.25046/aj040553
Abstract:

In Big Data, several solution providers offer distributions to handle this large amount of data. Given the variety of these solutions, we are working to provide universal meta-modeling for all layers of a Big Data system in order to address the issue of interoperability and portability between these solutions. As part of our continuous efforts…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 1,204 KB Download PDF

Toward a Smart Campus Using IoT: Framework for Safety and Security System on a University Campus

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 97–103, 2019; DOI: 10.25046/aj040512
Abstract:

Recently, there is an enormous research on the smart campus concept due to the revolution of the IoT technologies. The motivation of this paper is to: reinforce the safety on campus, reduce the cost, and take one step forward toward a University smart campus. In this paper, we are not only proposing a framework that…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 725 KB Download PDF

Proposal for a Security Model for a Popular Voting System Process in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 53–60, 2019; DOI: 10.25046/aj040507
Abstract:

In Latin America, there is a need for better security systems in different national or sectional votes, which is why this study was carried out, to show a proposal for a security model that helps to obtain better results and to this purpose has been selected information on the database for different Latin American countries,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 696 KB Download PDF

Prototype of a Security Architecture for a System of Electronic Voting for the Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 292–299, 2019; DOI: 10.25046/aj040437
Abstract:

To be able to perform a better voting system, it is important to go to ICT and its various platforms designed for electoral purposes, which are being used in several countries in Latin America. In Ecuador are being used digital mechanisms during the process, but with certain errors and he is being considered to implement…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 678 KB Download PDF

An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 25–30, 2019; DOI: 10.25046/aj040304
Abstract:

Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 947 KB Download PDF

Analysis and Methods on The Framework and Security Issues for Connected Vehicle Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 105–110, 2018; DOI: 10.25046/aj030611
Abstract:

In the world today, the rapid development of the Internet of Things (IoT) and the application of the Connected Vehicle Cloud (CVC) as the Internet of Things in the intelligent transportation are becoming widespread. They can improve people’s safety, vehicle security as well as reduce the cost of ownership of an automobile. At the same…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 2,141 KB Download PDF

A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 267–276, 2018; DOI: 10.25046/aj030532
Abstract:

Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 892 KB Download PDF

A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 43–50, 2018; DOI: 10.25046/aj030306
Abstract:

During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 791 KB Download PDF

Security Analysis and the Contribution of UPFC for Improving Voltage Stability

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 404–411, 2018; DOI: 10.25046/aj030149
Abstract:

The occurrence of many failures in the power system can lead to power instability and affects the system parameters to go beyond its operating limits. It may lead to obstructing the secure operations and reliability of power systems. Ensuring power system security needs proper actions to be taken for the undesirable contingency. Thus, security analysis…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 694 KB Download PDF

A Survey of Security Challenges in Internet of Things

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 274–280, 2018; DOI: 10.25046/aj030133
Abstract:

Internet of things (IoT) is an innovative technology subject to all kind of imaginary and science fictional solutions. Dreams and speculations are still possible about it. A technology combining real life objects and virtual life (Internet) is indeed a fertile pitch of fantasy and original ideas. However, IoT has in practice to face several challenges…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 1,062 KB Download PDF

Framework for the Formal Specification and Verification of Security Guidelines

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 38–48, 2018; DOI: 10.25046/aj030106
Abstract:

Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 287 KB Download PDF

Group law and the Security of elliptic curves on \(F_p[e_1,...,e_n]\)

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 104–108, 2017; DOI: 10.25046/aj020517
Abstract:

In this paper, we study the elliptic curve \(E_{a,b}(A_P)\), with \(A_P\) the localization of the ring \(A=F _p[e_1,...,e_n]\) where \(e_ie_i=e_i\) and \(e_ie_j=0\) if \(i\neq j\), in the maximal ideal \(P=(e_1,...,e_n)\). Finally we show that \( \text{Card}(E_{a,b}(A_P)) \geq (\text{Card}(E_{a,b}(F_p)) - 3)^n + \text{Card}(E_{a,b}(F_p)) \) and the execution time to solve the problem of discrete logarithm in \(E_{a,b}(A_P)\)…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
11 Pages, 663 KB Download PDF

A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 225–235, 2017; DOI: 10.25046/aj020627
Abstract:

Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,133 KB Download PDF

A Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1777–1783, 2017; DOI: 10.25046/aj0203217
Abstract:

Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 720 KB Download PDF

IoT: Their Conveniences, Security Challenges and Possible Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1211–1217, 2017; DOI: 10.25046/aj0203153
Abstract:

The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026