Search Results

Results (189)

Search Parameters:

Keyword: Security
Order results
Results per page
Open AccessArticle
15 Pages, 1,706 KB Download PDF

An Efficient Way of Hybridizing Edge Detectors Depending on Embedding Demand

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 63–77, 2023; DOI: 10.25046/aj080108
Abstract:

Edge detection-based image steganography schemes usually embed data in edge pixels only. However, some schemes embed data in non-edge pixels as well. In that case, the schemes embed more bits in the edges than in the smoothed areas. In all cases, the schemes perform large changes in a tiny area of the image during small…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 2,626 KB Download PDF

Technical Aspects and Social Science Expertise to Support Safe and Secure Handling of Autonomous Railway Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 283–294, 2022; DOI: 10.25046/aj070632
Abstract:

In recent years the development of autonomous vehicles has increased tremendously and a variety of methodologies had been applied to make them more safe and secure. This work shows a multilevel approach combining Failure Mode, Effects and Criticality Analysis of an autonomous railway system with sociological and technical aspects to support safe operations and human-machine…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Safety Science (SFS))
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,497 KB Download PDF

Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 139–150, 2022; DOI: 10.25046/aj070614
Abstract:

The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 3,158 KB Download PDF

An Improved Model to Analyze the Impact of Cyber-Attacks on Power Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 5, Page # 27–34, 2022; DOI: 10.25046/aj070504
Abstract:

In this paper, an improved model has been proposed for investigating the impact of cyber-attacks on power systems regarding frequency disturbances and voltage disruption while changing the load called ICAPS. The proposed ICAPS model is formulated by five different controllers, such as LFC, AGC, AGC-PID, AVR, and AVR-PID, implemented in two sets of the system…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Electrical Engineering (ELE))
Open AccessArticle
10 Pages, 865 KB Download PDF

Secured Multi-Layer Blockchain Framework for IoT Aggregate Verification

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 106–115, 2022; DOI: 10.25046/aj070312
Abstract:

Technologies designed for digital provenance, especially the Internet of Things (IoT) and blockchain, may allow for security, transparency, and traceability in the global supply chain. However, upstream nodes in the supply chain that work for large-scale production suppliers are not considered. In addition, most IoT blockchain systems adopt an ID-based signature scheme that may affect…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,136 KB Download PDF

A Secure Trust Aware ACO-Based WSN Routing Protocol for IoT

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 95–105, 2022; DOI: 10.25046/aj070311
Abstract:

The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied architectures and resources to provide ubiquitous and desired services. The popularization of IoT-connected devices facilitating evolution of IoT applications does come with security challenges. The IoT with the integration of wireless sensor networks possess a number of unique characteristics, so…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 759 KB Download PDF

Control and Monitoring Systems in Medium Voltage Distribution Networks in Poland – Current Status and Directions of Development

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 6, Page # 112–118, 2021; DOI: 10.25046/aj060615
Abstract:

The paper describes the control and monitoring systems installed in medium voltage networks by Polish distribution network operators. It also outlines the expected directions of development of these systems, specifies the functions of the individual system components and describes the requirements applicable to them. In particular, attention is paid to the implementation of functions to…

Read More
(This article belongs to Section Energy & Fuels (ENF))
Open AccessArticle
7 Pages, 632 KB Download PDF

TETRA™ Techniques to Assess and Manage the Software Technical Debt

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 303–309, 2021; DOI: 10.25046/aj060534
Abstract:

The paper examines the company’s proprietary means for determining the quality of a software product and measuring its technical debt. The paper’s authors explain how a software product’s quality is directly correlated with the amount of varying technical debts that the end-users receive. All debts can be paid, and technical debt is no exception: one…

Read More
(This article belongs to Section Automation & Control Systems (ACS))
Open AccessArticle
7 Pages, 546 KB Download PDF

VoIP Codec Performance Evaluation on GRE with IPsec over IPv4 and IPv6

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 260–266, 2021; DOI: 10.25046/aj060528
Abstract:

Scientists succeeded in implementing conventional public switch telephone network (PSTN) into internet protocol by launching H.323 IP telephony. The irrelevant and unknown captions in H.323, computer scientists have replaced H.323 by Session Initiation Protocol (SIP) for Voice-over-IP (VoIP). However, the security of voice communication over IP is still a major concern. Besides, security and performance…

Read More
(This article belongs to Section -)
Open AccessArticle
12 Pages, 821 KB Download PDF

Leveraging Energy Efficiency Investments: An Innovative Web-based Benchmarking Tool

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 237–248, 2021; DOI: 10.25046/aj060526
Abstract:

Energy Efficiency (EE) plays a key role in decreasing energy consumption at a European level, while it is considered as one of the most cost-efficient means to achieve carbon reduction and reinforce energy sufficiency and security. EE financing is imperative to implement measures that will lead to achieving the desired carbon neutrality and, thus, avert…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
18 Pages, 2,108 KB Download PDF

iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 185–202, 2021; DOI: 10.25046/aj060521
Abstract:

The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 618 KB Download PDF

Devices and Methods for Microclimate Research in Closed Areas – Underground Mining

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 395–400, 2021; DOI: 10.25046/aj060444
Abstract:

Technical safety and health are especially important for mining-extracting industry. Even though the respective lows and good engineering practices exist, technologies develop and could address even better security for humans and equipment. The research question is to survey microclimate sensors in underground mining and to find whether they are ready for automation. The article is…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Instruments & Instrumentation (IIN))
Open AccessArticle
8 Pages, 847 KB Download PDF

Remote Patient Monitoring Systems with 5G Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 44–51, 2021; DOI: 10.25046/aj060406
Abstract:

The new generation of mobile communications and the recent advances in data management are going to enable a fast transformation in the health sector of many countries. 5G networks, with superior technical characteristics, would allow the development of a new set of application and services gathered under the concept of eHealth. In this article we…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Biomedical Engineering (EBI))
Open AccessArticle
9 Pages, 878 KB Download PDF

Performance Evaluation of Convolutional Neural Networks (CNNs) And VGG on Real Time Face Recognition System

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 956–964, 2021; DOI: 10.25046/aj0602109
Abstract:

Face Recognition (FR) is considered as a heavily studied topic in computer vision field. The capability to automatically identify and authenticate human’s faces using real-time images is an important aspect in surveillance, security, and other related domains. There are separate applications that help in identifying individuals at specific locations which help in detecting intruders. The…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
16 Pages, 1,990 KB Download PDF

Detailed Assessment of Dissaving Risk Against Life Expectancy for Elderly People using Anonymous Data and/or Random Data: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 871–886, 2021; DOI: 10.25046/aj0602100
Abstract:

With a view to detecting whether economic activity deterioration for elderly people at age of sixty-five or over could be observed, anonymous data (AD) were used as analysis data, which were obtained from the National Survey of Family Income and Expenditure (NSFIE) conducted by the Ministry of Internal Affairs and Communications (MIC). We have developed…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Environmental Sciences (ENS))
Open AccessArticle
8 Pages, 801 KB Download PDF

Design and Development of an Advanced Affordable Wearable Safety Device for Women: Freedom Against Fearsome

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 829–836, 2021; DOI: 10.25046/aj060296
Abstract:

Harassment and violence against women have become one of the social security problems in Bangladesh. In this paper, we aim to develop safety devices for women named BOHNNI and BADHON which resemble legitimate jewelry. We used a microcontroller for the hardware device to make it most decisive and less immoderate. BOHNNI, a locating device, is…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 818 KB Download PDF

Securing IPv6 Neighbor Discovery using Pre-Shared Key

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 722–732, 2021; DOI: 10.25046/aj060284
Abstract:

Neighbor Discovery Protocol (NDP) is used to discover the MAC address of the connected hosts in Internet Protocol Version 6 (IPv6) in a networked environment. Neighbor Cache Entry (NCE) table holds the association between a host’s IP address and MAC address. However, according to the protocol, the MAC address could be overwritten by sending a…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
7 Pages, 848 KB Download PDF

Node-Node Data Exchange in IoT Devices Using Twofish and DHE

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 622–628, 2021; DOI: 10.25046/aj060271
Abstract:

Internet of Things provides the support for devices, people and things to collaborate in collecting, analyzing and sharing sensitive information from one device onto the other through the internet. The internet of things is thriving largely due to access, connectivity, artificial intelligence and machine learning approaches that it supports. The stability and enhanced speed of…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 973 KB Download PDF

A Framework for the Alignment of ICT with Green IT

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 593–601, 2021; DOI: 10.25046/aj060268
Abstract:

The Public Administration is forced to transform itself by taking advantage of the contribution of ICT to in the process of reducing bureaucracy and increase transparency, promoting the dematerialization of processes, increasing the quality of online services, allowing greater ubiquity of access, reducing response times, in the search for improvement of the quality of life…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,157 KB Download PDF

Development and Improvement of Web Services Selections using Immigrants Scheme of Multi-Objective Genetic Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 412–422, 2021; DOI: 10.25046/aj060248
Abstract:

Quality of service is a significant part of formulating a composing of web services to satisfy the user’s request, especially when several services exist and have been implemented in the same field and functionality. The selection process of web services among many options can be taken based on the quality of service considerations, fitness parameters,…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 929 KB Download PDF

SEA WAF: The Prevention of SQL Injection Attacks on Web Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 405–411, 2025; DOI: 10.25046/aj060247
Abstract:

The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 378–386, 2021; DOI: 10.25046/aj060244
Abstract:

The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026