Search Results

Results (189)

Search Parameters:

Keyword: security
Order results
Results per page
Open AccessArticle
9 Pages, 5,165 KB Download PDF

Semantic-less Breach Detection of Polymorphic Malware in Federated Cloud

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 553–561, 2017; DOI: 10.25046/aj020371
Abstract:

Cloud computing is one of the largest emerging utility services that is expected to grow enormously over the next decade. Many organizations are moving into hybrid cloud/hosted computing models. Single cloud service provider introduces cost and environmental challenges. Also, multi-cloud solution implemented by the Cloud tenant is suboptimal as it requires expensive adaptation costs. Cloud…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,704 KB Download PDF

Secure Path Selection under Random Fading

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 376–383, 2017; DOI: 10.25046/aj020348
Abstract:

Application-oriented Wireless Sensor Networks (WSNs) promises to be one of the most useful technologies of this century. However, secure communication between nodes in WSNs is still an unresolved issue. In this context, we propose two protocols (i.e. Optimal Secure Path (OSP) and Sub-optimal Secure Path (SSP)) to minimize the outage probability of secrecy capacity in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 606 KB Download PDF

Directional Antenna Modulation Technique using A Two-Element Frequency Diverse Array

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 227–232, 2017; DOI: 10.25046/aj020331
Abstract:

Direction dependent antenna modulation (DAM), as a potential physical-layer security technique, is able to enhance the security of wireless communication systems by virtue of the capability of its direction-dependent signal modulation format transmission. In this paper, DAM using frequency diverse array (FDA) to produce the modulation is presented. By phase shifting each element, the desired…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
7 Pages, 702 KB Download PDF

Toward Confirming a Framework for Securing the Virtual Machine Image in Cloud Computing

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 44–50, 2017; DOI: 10.25046/aj020406
Abstract:

The concept of cloud computing has arisen thanks to academic work in the fields of utility computing, distributed computing, virtualisation, and web services. By using cloud computing, which can be accessed from anywhere, newly-launched businesses can minimise their start-up costs. Among the most important notions when it comes to the construction of cloud computing is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 2,518 KB Download PDF

Improving customs’ border control by creating a reference database of cargo inspection X-ray images

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 60–66, 2017; DOI: 10.25046/aj020309
Abstract:

Countries’ effective and efficient border security is becoming increasingly important in today’s global world of economy and trade. To ensure these, customs organisations are responsible for the prevention of illicit goods’ transportation across borders, particularly upon entry. The predicament of the customs administrations will soon be aggravated by both the increase of global trade and…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Remote Sensing (RMS))
Open AccessArticle
6 Pages, 1,057 KB Download PDF

Zero Trust Cloud Networks using Transport Access Control and High Availability Optical Bypass Switching

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 30–35, 2017; DOI: 10.25046/aj020305
Abstract:

Cyberinfrastructure is undergoing a radical transformation as traditional enterprise and cloud computing environments hosting dynamic, mobile workloads replace telecommunication data centers.  Traditional data center security best practices involving network segmentation are not well suited to these new environments.  We discuss a novel network architecture, which enables an explicit zero trust approach, based on a steganographic…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Telecommunications (TEL))
Open AccessArticle
6 Pages, 1,514 KB Download PDF

Wireless Android Based Home Automation System

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 234–239, 2017; DOI: 10.25046/aj020128
Abstract:

This manuscript presents a prototype and design implementation of an advance home automation system that uses Wi-Fi technology as a network infrastructure connecting its parts. The proposed system consists of two main components; the first part is the server, which presents system core that manages and controls user’s home. Users and system administrator can locally…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Electronic Engineering (EEE))
Open AccessArticle
5 Pages, 877 KB Download PDF

Implementation a Secure Electronic Medical Records Exchange System Based on S/MIME

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 172–176, 2017; DOI: 10.25046/aj020120
Abstract:

The exchange of electronic medical records can reduce the preservation and the use of papers of medical records for management issues. The sharing of electronic medical records has been effective in Taiwan. Now days, enterprises are sharing their electronic medical records through the Exchange Center of EMR under the Virtual Private Network but slightly less…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 1,137 KB Download PDF

Privacy-by-Design (PbD) IoT Framework : A Case of Location Privacy Mitigation Strategies for Near Field Communication (NFC) Tag Sensor

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 134–148, 2017; DOI: 10.25046/aj020116
Abstract:

Near Field Communication (NFC) technology is a short range (range about 10cm) standard extended from the core standard Radio Frequency Identifier (RFID). These technologies are a portion of wireless communication technology. Even though NFC technologies benefit in various field, but it’s still exposed to multiple type of privacy attacks and threat as well since the…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Telecommunications (TEL))
Open AccessArticle
10 Pages, 739 KB Download PDF

System Testing Evaluation for Enterprise Resource Planning to Reduce Failure Rate

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 1, Page # 6–15, 2016; DOI: 10.25046/aj020102
Abstract:

Enterprise Resource Planning (ERP) systems are widely used applications to manage resources, communication and data exchange between different departments and modules with the purpose of managing the overall business process of the organization using one integrated software system. Due to the large scale and the complexity nature of these systems, many ERP implementation projects have…

Read More
(This article belongs to the SP2 (Special Issue on Computer Systems, Information Technology, Electrical and Electronics Engineering 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))
1 6 7 8

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026