Search Results

Results (3)

Search Parameters:

Author/Affiliation: Jianhua Yang
Order results
Results per page
Open AccessArticle
7 Pages, 917 KB Download PDF

Matching TCP Packets to Detect Stepping-Stone Intrusion using Packet Crossover

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 13–19, 2022; DOI: 10.25046/aj070602
Abstract:

Hackers on the Internet often send attacking commands through compromised hosts, called stepping-stones, for the purpose to be hidden behind a long interactive communication session. In a stepping-stone attack, an intruder uses a chain of stepping-stones as relay machines and remotely login these machines using a remote login program such as SSH (secure shell). A…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 930 KB Download PDF

Enhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 355–367, 2021; DOI: 10.25046/aj060440
Abstract:

Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 349 KB Download PDF

Data Aggregation, Gathering and Gossiping in Duty-Cycled Multihop Wireless Sensor Networks subject to Physical Interference

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 369–377, 2021; DOI: 10.25046/aj060142
Abstract:

Data aggregation, gathering and gossiping are all vital communication tasks in wireless sensor networks (WSNs). When all networking devices are always active, scheduling algorithms for these communication tasks have been extensively investigated under both the protocol and physical interference models. However, wireless devices usually switch between the sleep state and the active state for the…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026