Search Results

Results (189)

Search Parameters:

Keyword: Security
Order results
Results per page
Open AccessArticle
7 Pages, 930 KB Download PDF

A Hybrid Approach for Intrusion Detection using Integrated K-Means based ANN with PSO Optimization

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 317–323, 2020; DOI: 10.25046/aj050341
Abstract:

Many advances in computer systems and IT infrastructures increases the risks associated with the use of these technologies. Specifically, intrusion into computer systems by unauthorized users is a growing problem and it is very challenging to detect. Intrusion detection technologies are therefore becoming extremely important to improve the overall security of computer systems. In the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 1,578 KB Download PDF

Improved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 249–258, 2020; DOI: 10.25046/aj050332
Abstract:

Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 768 KB Download PDF

Generating a Blockchain Smart Contract Application Framework

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 191–197, 2020; DOI: 10.25046/aj050325
Abstract:

Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 928 KB Download PDF

Alternative Real-time Image-Based Smoke Detection Algorithm

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 123–128, 2020; DOI: 10.25046/aj050316
Abstract:

Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 814 KB Download PDF

A Harmonized European Drone Market? – New EU Rules on Unmanned Aircraft Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 93–99, 2020; DOI: 10.25046/aj050312
Abstract:

The European drone market has been showing steady growth year after year. New EU drone rules will come into force as of July 1st, 2020, with the European Union setting itself the target to replace national rules with a common regulation with the ultimate goal of creating a harmonized European drone market. This study will…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Aerospace Engineering (EAR))
Open AccessArticle
9 Pages, 1,012 KB Download PDF

Using Leader Election and Blockchain in E-Health

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 46–54, 2020; DOI: 10.25046/aj050307
Abstract:

The development of electronic healthcare systems requires to adopt modern technologies and architectures. The use of Electronic Personal Health Record (E-PHR) should be supported by efficient storage such as cloud storage which enables more security, availability and accessibility of patients’ records. Actually, the increase of availability of E-PHR enhances parallel access, which improves the performance…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Biotechnology & Applied Microbiology (BAM))
Open AccessArticle
7 Pages, 779 KB Download PDF

Analysis of the Blockchain for Adoption in Electronic Commerce Management in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 762–768, 2020; DOI: 10.25046/aj050295
Abstract:

The document describes the advancement of technology in commercial negotiations and functionality for various electronic transactions in Ecuador, with the aim of analyzing the blockchain and its adoption in managing e-commerce. The quantitative approach with a deductive and descriptive method has been used to identify the benefits in transactional activities and data security, both customers…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 796 KB Download PDF

Analysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 673–682, 2020; DOI: 10.25046/aj050283
Abstract:

Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 613 KB Download PDF

An ISO 25010 Based Quality Model for ERP Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 578–583, 2020; DOI: 10.25046/aj050272
Abstract:

Higher Education Institutions (HEIs) have begun rapidly adopting, selecting and implementing ERP systems due to the call by various governments to streamline their processes and practices. While ERPs are expanding at much faster rate, there is pressure on most HEIs to ensure quality. For quality model, ISO/IEC 25010 is an international standard for software and…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 1,060 KB Download PDF

Scapy Scripting to Automate Testing of Networking Middleboxes

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 293–298, 2020; DOI: 10.25046/aj050238
Abstract:

Middleboxes like load balancers are being used by all the corporations to manage and support their infrastructures. These devices see a large amount of bandwidth every day. This might include a range of protocols which might be varying from network layer to the application layer. This traffic can be corrupt or malicious thus causing these…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 435 KB Download PDF

Enhancing an SDN Architecture with DoS Attack Detection Mechanisms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 215–224, 2020; DOI: 10.25046/aj050228
Abstract:

A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 653 KB Download PDF

New Solution Implementation to Protect Encryption Keys Inside the Database Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 87–94, 2020; DOI: 10.25046/aj050211
Abstract:

Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
5 Pages, 1,071 KB Download PDF

Rooftop Urban Agriculture Model with Two Tomato Varieties (Lycopersicum esculentum Mill) and Toppings in the High Jungle – Peru

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 446–450, 2020; DOI: 10.25046/aj050157
Abstract:

The study objective was to design and evaluate the agroecological system of an agricultural model with vegetable covers (Luffa cylindrica, Cyclanthera pedata and Mucuna pruriens) associated with tomato plants (Lycopersicum esculentum Mill), Rio Grande and Cherry varieties. The agroecological system is shown with its components of inputs, processes and outputs. The main entrances being solar…

Read More
(This article belongs to Section Green & Sustainable Science & Technology (GSS))
Open AccessArticle
16 Pages, 1,198 KB Download PDF

Trust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 387–402, 2020; DOI: 10.25046/aj050150
Abstract:

An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet. It is the extreme importance that peers (users) are able to trust each other and rely on them for file sharing and for services. This…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 827 KB Download PDF

Fuzzy Modelling using Firefly Algorithm for Phishing Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 291–296, 2019; DOI: 10.25046/aj040637
Abstract:

A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,529 KB Download PDF

Spiral Curve for Revocable Touchless Fingerprint Template Securisation

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 134–139, 2019; DOI: 10.25046/aj040616
Abstract:

Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
24 Pages, 5,041 KB Download PDF

Multi Biometric Thermal Face Recognition Using FWT and LDA Feature Extraction Methods with RBM DBN and FFNN Classifier Algorithms

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 67–90, 2019; DOI: 10.25046/aj040609
Abstract:

Person recognition using thermal imaging, multi-biometric traits, with groups of feature filters and classifiers, is the subject of this paper. These were used to tackle the problems of biometric systems, such as a change in illumination and spoof attacks. Using a combination of, hard and soft-biometric, attributes in thermal facial images. The hard-biometric trait, of…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 1,341 KB Download PDF

Verification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 369–374, 2019; DOI: 10.25046/aj040548
Abstract:

With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 575 KB Download PDF

Fully Homomorphic Encryption Scheme Based On Complex Numbers

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 30–38, 2019; DOI: 10.25046/aj040504
Abstract:

In this paper, we present a new Somewhat Homomorphic Encryption (SHE) scheme using computation over complex numbers. We then use Bootstrapping technique to make the scheme Fully Homomorphic (FH) and supports unbounded number of circuit depth. In addition to its homomorphic properties and security level, a main characteristic of the proposed new scheme is its…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 264 KB Download PDF

Using Privacy Enhancing and Fine-Grained Access Controlled eKYC to implement Privacy Aware eSign

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 4, Page # 347–358, 2019; DOI: 10.25046/aj040443
Abstract:

eSign is an online electronic signature service which is recently gaining more prominence in India. eSign is based on two online services from UIDAI, viz. a viz., Aadhaar based authentication and retrieval of resident’s eKYC information after taking his/her consent. With increased adoption of Aadhaar based services, privacy of user data has become more and…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 1,122 KB Download PDF

Proposal of Ledger Technology to Apply to a Public Organization in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 251–259, 2019; DOI: 10.25046/aj040333
Abstract:

Ledger technology has now changed financial systems around the world, applying this technology to the improvement of the public sector, mainly to the debt collection system, we improve the speed of payment and its immediate registration, we make use of the advantages of Ledger technology with respect to reliability, security and speed. The objective is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Behavioral Analysis of Bitcoin Users on Illegal Transactions

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 402–412, 2019; DOI: 10.25046/aj040250
Abstract:

Bitcoin is a popular crypto currency that is used as a mode of investment and a medium for trading goods and services. Anonymity, security and decentralization are significant features of Bitcoin. This creates several opportunities for criminals to involve in illegal and fraudulent activities. This research study aimed to automate the process of gaining the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026