Search Results

Results (189)

Search Parameters:

Keyword: security
Order results
Results per page
Open AccessArticle
5 Pages, 669 KB Download PDF

Security in SWIPT with Power Splitting Eavesdropper

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 384–388, 2017; DOI: 10.25046/aj020349
Abstract:

Simultaneous wireless information and power transfer (SWIPT) has drawn significant research interest in recent years. In this paper, we investigate the information theoretic secrecy of a SWIPT system under Weibull fading channel. To be specific, we analyze the information security in the presence of an energy harvesting and information decoding eavesdropper. All links are subjected…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 1,258 KB Download PDF

A security approach based on honeypots: Protecting Online Social network from malicious profiles

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 198–204, 2017; DOI: 10.25046/aj020326
Abstract:

In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 1,419 KB Download PDF

Methodology for Management of Information Security in Industrial Control Systems: A Proof of Concept aligned with Enterprise Objectives.

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 88–99, 2017; DOI: 10.25046/aj020313
Abstract:

This article is an extended version of the study presented at the IEEE Ecuador Technical Chapters Meeting (ETCM)-2016. At that time, a methodological proposal was designed, implemented, and applied in a group of industrial plants for the management of the information security of the Industrial control systems (ICS). The present study displays an adaptation and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 872 KB Download PDF

Cross layers security approach via an implementation of data privacy and by authentication mechanism for mobile WSNs

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 97–107, 2017; DOI: 10.25046/aj020112
Abstract:

To implement a new secure network with high mobility and low energy consumption, we use smart sensors. These sensors are powered by micro batteries generally non rechargeable. So, to extend their lifetime, it is necessary to implement new energy conservation techniques. Existing works separate the two features (security, energy conservation) and are interested specifically in…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Network Engineering (ENW))
Open AccessArticle
8 Pages, 1,262 KB Download PDF

Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 25–32, 2026; DOI: 10.25046/aj110103
Abstract:

Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,700 KB Download PDF

A Multi-class Acoustic Dataset and Interactive Tool for Analyzing Drone Signatures in Real-World Environments

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 88–96, 2025; DOI: 10.25046/aj100608
Abstract:

The rapid proliferation of drones across various industries has introduced significant challenges related to privacy, security, and noise pollution. Current drone detection systems, primarily based on visual and radar technologies, face limitations under certain conditions, highlighting the need for effective acoustic-based detection methods. This paper presents a unique and comprehensive dataset of drone acoustic signatures,…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Acoustics (ACO))
Open AccessArticle
22 Pages, 15,097 KB Download PDF

TIMeFoRCE: An Identity and Access Management Framework for IoT Devices in A Zero Trust Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 1–22, 2025; DOI: 10.25046/aj100601
Abstract:

Zero Trust Architecture offers a transformative approach to network security by emphasizing ”never trust, always verify.” IoT devices, while increasingly integral to modern ecosystems, pose unique challenges for identity management and access control due to their constrained processing power, memory, and energy capabilities. In a Zero Trust framework, every IoT device is treated as a…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Telecommunications (TEL))
Open AccessArticle
11 Pages, 790 KB Download PDF

CIRB-Edge for Secure, Energy-Efficient, and Real-Time Edge Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 5, Page # 40–50, 2025; DOI: 10.25046/aj100505
Abstract:

In this work, we present CIRB-Edge, a novel integer compression method designed specifically to overcome the limitations of traditional techniques such as Huffman coding, Delta encoding, and dictionary-based algorithms. These legacy methods often fall short in meeting the stringent requirements of secure, energy-efficient, and real-time edge computing due to their high computational overhead, memory demands,…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 1,858 KB Download PDF

True Random Number Generator Implemented in ReRAM Crossbar Based on Static Stochasticity of ReRAMs

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 5, Page # 30–36, 2024; DOI: 10.25046/aj090504
Abstract:

True Random Number Generators (TRNG) find applications in various fields, especially hardware security. We suggest a TRNG that exploits the intrinsic static stochasticity of Resistive Switching Random Access Memories (ReRAMs) to generate random bits. Other suggested designs use stochasticity in the switching mechanism, which requires high precision over input voltage and time. In the proposed…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 823 KB Download PDF

Energy Management Policy and Strategies in ASEAN

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 102–109, 2024; DOI: 10.25046/aj090411
Abstract:

This research analyses the challenges faced by ASEAN countries in managing its energy efficiencies and resources due to rapid economic growth, increasing energy demand, and diverse energy infrastructures across member states. This paper explores the energy management policies and strategies within the ASEAN region, focusing on the integration of energy efficiency measures, renewable energy initiatives,…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Energy & Fuels (ENF))
Open AccessArticle
14 Pages, 2,353 KB Download PDF

IoT and Business Intelligence Based Model Design for Liquefied Petroleum Gas (LPG) Distribution Monitoring

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 4, Page # 79–92, 2024; DOI: 10.25046/aj090409
Abstract:

Gas leakage caused by various causes poses significant risks to public safety. To address this problem, an intelligent model is proposed for the accurate monitoring of Liquefied Petroleum Gas (LPG) distribution based on the integration of Internet of Things (IoT) and Business Intelli- gence (BI) technologies. Through the use of sensors and actuators, it seeks…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 1,553 KB Download PDF

Automated Performance analysis E-services by AES-Based Hybrid Cryptosystems with RSA, ElGamal, and ECC

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 84–91, 2024; DOI: 10.25046/aj090308
Abstract:

Recently Network safety has become an important or hot topic in the security society (i.e. Encryption and Decryption) developed as a solution of problem that have an important role in the security of information systems (IS). So protected/secure the shared data and information by many methods that require in all internet faciality, data health and…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 1,683 KB Download PDF

Deploying Trusted and Immutable Predictive Models on a Public Blockchain Network

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 72–83, 2024; DOI: 10.25046/aj090307
Abstract:

Machine learning-based predictive models often face challenges, particularly biases and a lack of trust in their predictions when deployed by individual agents. Establishing a robust deployment methodology that supports validating the accuracy and fairness of these models is a critical endeavor. In this paper, we introduce a novel approach to deploying predictive models, such as…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,752 KB Download PDF

An Adaptive Heterogeneous Ensemble Learning Model for Credit Card Fraud Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 3, Page # 01–11, 2024; DOI: 10.25046/aj090301
Abstract:

The proliferation of internet economies has given the corporate world manifold advantages to businesses, as they can now incorporate the latest innovations into their operations, thereby enhancing ease of doing business. For instance, financial institutions have leveraged credit card usage on the aforesaid proliferation. However, this exposes clients to cybercrime, as fraudsters always find ways…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 1,317 KB Download PDF

Malaysia’s Renewable Energy Policy and its Impact on ASEAN Countries

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 2, Page # 67–73, 2024; DOI: 10.25046/aj090208
Abstract:

As the global community increasingly shifts its focus towards sustainable development and combating climate change, renewable energy policies have become pivotal in shaping national and regional energy landscapes. Malaysia, as a developing nation with a rapidly growing economy, has recognized the importance of renewable energy sources in achieving its socio-economic goals while addressing environmental concerns.…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Energy & Fuels (ENF))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 705 KB Download PDF

Strengthening LoRaWAN Servers: A Comprehensive Update with AES Encryption and Grafana Mapping Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 33–41, 2024; DOI: 10.25046/aj090104
Abstract:

This work enhances the LoRaWAN server framework, focusing on an innovative approach for robust security and dynamic data visualization in network management. Migrating from RVC4 to AES encryption, it fortifies the network’s defense against cyber threats, a crucial advancement in IoT security. Furthermore, the integration with Grafana’s mapping plugin capitalizes on geolocation data, a strategic…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 856 KB Download PDF

Minimum Static VAR Compensation Capacity for Bad Voltage Drop Buses in Power Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 212–217, 2023; DOI: 10.25046/aj080324
Abstract:

The quality of the electric power system must be maintained properly, one of which is voltage. Under certain operating conditions, the bus voltage may drop below its minimum level, called bad voltage. A large reactive load can cause a voltage drop across the bus or the location of the bus is far from the generator…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Electrical Engineering (ELE))
Open AccessArticle
18 Pages, 1,595 KB Download PDF

Social Financial Technologies for the Development of Enterprises and the Russian Economy

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 118–135, 2023; DOI: 10.25046/aj080314
Abstract:

The main contradiction identified in the study is that the existing scientific and methodological solves of economy development management processes does not create prerequisites for improving the efficiency of their work, the introduction of progressive technologies for material and moral stimulation of the work of performers and administrative and managerial personnel, advanced social mechanisms for…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Finance (FIN))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
20 Pages, 379 KB Download PDF

Hybrid Intrusion Detection Using the AEN Graph Model

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 44–63, 2023; DOI: 10.25046/aj080206
Abstract:

The Activity and Event Network (AEN) is a new dynamic knowledge graph that models different network entities and the relationships between them. The graph is generated by processing various network security logs, such as network packets, system logs, and intrusion detection alerts, which allows the graph to capture security-relevant activity and events in the network.…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
10 Pages, 1,889 KB Download PDF

Multiple Criteria Decision-making: Risk Analyses for the Soft Target

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 14–23, 2023; DOI: 10.25046/aj080202
Abstract:

This article focuses on risk analysis using a multi-criteria decision-making method. Due to many performed risk analyses for soft targets, we are constantly trying to find new methods for objective risk assessment. Many risk analyses are subjective, which is a problem when planning security measures and comparing results (different events, objects, places, etc.). In this…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Operations Research & Management Science (ORM))
Open AccessArticle
12 Pages, 1,413 KB Download PDF

Multi-Layered Machine Learning Model For Mining Learners Academic Performance

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 850–861, 2021; DOI: 10.25046/aj060194
Abstract:

Different colleges and universities have different approaches to dealing with low-performance learners. However, in most cases, analgesics do not deal with root problems. This research suggests a model of three layers of variables sequentially adaptable to a deep-root issue. The suggested model can identify early pupils who could be at risk because of inaccurate or…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 885 KB Download PDF

On the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 78–83, 2023; DOI: 10.25046/aj080109
Abstract:

In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Automation & Control Systems (ACS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026