Search Results

Results (82)

Search Parameters:

Keyword: Attack
Order results
Results per page
Open AccessArticle
17 Pages, 1,074 KB Download PDF

Detailed Security Evaluation of ARANz, ARAN and AODV Protocols

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 176–192, 2020; DOI: 10.25046/aj050523
Abstract:

Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 2,291 KB Download PDF

Composition of Methods to Ensure Iris Liveness and Authenticity

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 130–143, 2020; DOI: 10.25046/aj050417
Abstract:

In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Bioinformatics (BIF))
Open AccessArticle
7 Pages, 750 KB Download PDF

Risk Management: The Case of Intrusion Detection using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 529–535, 2020; DOI: 10.25046/aj050365
Abstract:

Every institution nowadays relies on their online system and framework to do businesses. Such procedures need more attention due to the massive amount of attacks that occurs. These procedures have to go first through the management team of the institution, in order to prevent exploits of the attackers. Thus, the risk management can easily control…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 625 KB Download PDF

Based on Reconfiguring the Supercomputers Runtime Environment New Security Methods

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 291–298, 2020; DOI: 10.25046/aj050338
Abstract:

This paper is an extension of work originally presented in 2019 Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). Author describes two new methods: reactive protection method (without delay after detecting an attack), which consists in virtualizing the execution environment of supercomputers processes if the calculated state descriptor falls into the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 796 KB Download PDF

Analysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 673–682, 2020; DOI: 10.25046/aj050283
Abstract:

Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 653 KB Download PDF

New Solution Implementation to Protect Encryption Keys Inside the Database Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 87–94, 2020; DOI: 10.25046/aj050211
Abstract:

Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
10 Pages, 946 KB Download PDF

Biometric System Vulnerabilities: A Typology of Metadata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 191–200, 2020; DOI: 10.25046/aj050125
Abstract:

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
24 Pages, 5,041 KB Download PDF

Multi Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 67–90, 2019; DOI: 10.25046/aj040609
Abstract:

Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 819 KB Download PDF

DFIG Defects Diagnosis Method for Wind Energy Conversion Chain

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 174–185, 2019; DOI: 10.25046/aj040523
Abstract:

This paper is an extension of research work originally presented in 2018 IEEE fifth International Congress on Information Science and Technology (CiSt). The research consists on developing method to diagnose electrical defects affecting wind turbine doubly-fed induction generator DFIG which constitutes a crucial part of wind energy conversion chain. First off all, we create a…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Electrical Engineering (ELE))
Open AccessArticle
8 Pages, 910 KB Download PDF

Probabilistic Method for Anomalies Detection Based on the Analysis of Cyber Parameters in a Group of Mobile Robots

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 281–288, 2018; DOI: 10.25046/aj030636
Abstract:

This article is devoted to the issues of ensuring the security of a group of mobile robots in the implementation of attacks aimed at the property of accessibility of information and the availability of network nodes. The article presents a method for detecting an abnormal behavior of a network node based on the analysis by…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,285 KB Download PDF

A Holistic User Centric Acute Myocardial Infarction Prediction System With Model Evaluation Using Data Mining Techniques

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 56–66, 2018; DOI: 10.25046/aj030605
Abstract:

Acute Myocardial Infarction (Heart Attack), a Coronary Heart Disease (CHD) is one of the major killers worldwide. Around one thousand data has been collected from AMI patients, people are at risk of maybe a heart attack and individuals with the significant features closely related to heart attack. The sophistication in mobile technology, health care applications…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 921 KB Download PDF

Protecting Private Data using Improved Honey Encryption and Honeywords Generation Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 311–320, 2018; DOI: 10.25046/aj030537
Abstract:

Nowadays, many companies and organizations use various encryption techniques to secure their private data before send it through the unsecure network. However, many attackers try to store private data by using various attacks. Most of the organizations use password based encryption algorithm (PBE) to protect their private data. However, the existing PBE methods are vulnerable…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 2,141 KB Download PDF

A Study on Improving Security and Efficiency using Dynamic Ownership Management in Client-Side Deduplication Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 267–276, 2018; DOI: 10.25046/aj030532
Abstract:

Data deduplication technology is used to improve the spatial efficiency of cloud storage. This technology is used for storing data on a cloud and omitting data uploading if the data are already present. However, various security threats may occur during the deduplication process. These security threats include poison attacks and user identity exposure through ownership.…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 881 KB Download PDF

EAES: Extended Advanced Encryption Standard with Extended Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 51–56, 2018; DOI: 10.25046/aj030307
Abstract:

Though AES is the highest secure symmetric cipher at present, many attacks are now effective against AES too which is seen from the review of recent attacks of AES. This paper describes an extended AES algorithm with key sizes of 256, 384 and 512 bits with round numbers of 10, 12 and 14 respectively. Data…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 847 KB Download PDF

Computation of Viability Kernels on Grid Computers for Aircraft Control in Windshear

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 502–510, 2018; DOI: 10.25046/aj030161
Abstract:

This paper is devoted to the analysis of aircraft dynamics in the cruise flight phase under windshear conditions. The study is conducted with reference to a point-mass aircraft model restricted to move in a vertical plane. We formulate the problem as a differential game against the wind disturbances: The first player, autopilot, manages, via additional…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Aerospace Engineering (EAR))
Open AccessArticle
6 Pages, 621 KB Download PDF

An Analysis of K-means Algorithm Based Network Intrusion Detection System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 496–501, 2018; DOI: 10.25046/aj030160
Abstract:

In this modern age, information technology (IT) plays a role in a number of different fields. And therefore, the role of security is very important to control and assist the flow of activities over the network. Intrusion detection (ID) is a kind of security management system for computers and networks. There are many approaches and…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 344 KB Download PDF

A Joint Safety and Security Analysis of message protection for CAN bus protocol

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 384–393, 2018; DOI: 10.25046/aj030147
Abstract:

One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 421 KB Download PDF

Short CCA-Secure Attribute-Based Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 261–273, 2018; DOI: 10.25046/aj030132
Abstract:

Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
5 Pages, 744 KB Download PDF

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 25–29, 2018; DOI: 10.25046/aj030104
Abstract:

In today’s information based world, it is increasingly important to safeguard the data owned by any organization, be it intellectual property or personal information. With ever increasing sophistication of malware, it is imperative to come up with an automated and advanced methods of attack vector recognition and isolation. Existing methods are not dynamic enough to…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,002 KB Download PDF

A new color image encryption algorithm based on iterative mixing of color channels and chaos

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 94–99, 2017; DOI: 10.25046/aj020515
Abstract:

In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
9 Pages, 882 KB Download PDF

Review on security issues in RFID systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 6, Page # 194–202, 2017; DOI: 10.25046/aj020624
Abstract:

Radio frequency Identification (RFID) is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 445 KB Download PDF

Towards Deployment Strategies for Deception Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1272–1279, 2017; DOI: 10.25046/aj0203161
Abstract:

Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026