Search Results

Results (82)

Search Parameters:

Keyword: Attack
Order results
Results per page
Open AccessArticle
8 Pages, 668 KB Download PDF

Detection Method and Mitigation of Server-Spoofing Attacks on SOME/IP at the Service Discovery Phase

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 1, Page # 25–32, 2026; DOI: 10.25046/aj110103
Abstract:

Service-oriented architecture has attracted attention in automotive development. The Automotive Open System Architecture (AUTOSAR) specifies Scalable Service-Oriented Middleware over IP (SOME/IP) as a key middleware for service-oriented communication in-vehicles. However, SOME/IP-based networks are vulnerable to server spoofing during the service discovery phase, enabling attackers to cause man-in-the-middle attacks by impersonating legitimate services. This paper proposes…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
17 Pages, 1,660 KB Download PDF

On Adversarial Robustness of Quantized Neural Networks Against Direct Attacks

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 6, Page # 30–46, 2024; DOI: 10.25046/aj090604
Abstract:

Deep Neural Networks (DNNs) prove to be susceptible to synthetically generated samples, so-called adversarial examples. Such adversarial examples aim at generating misclassifications by specifically optimizing input data for a matching perturbation. With the increasing use of deep learning on embedded devices and the resulting use of quantization techniques to compress deep neural networks, it is…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 547 KB Download PDF

Dismantle Shilling Attacks in Recommendations Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 684–691, 2021; DOI: 10.25046/aj060174
Abstract:

Collaborative filtering of recommended systems (CFRSs) suffers from overrun false rating injections that diverge the system functions for creating accurate recommendations. In this paper, we propose a three-stage unsupervised approach. Starts by defining the mechanism(s) that makes recommendation vulnerable to attack. Second, find the maximum-paths or the associated related items valued by the user. We…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 885 KB Download PDF

On the Polytopic Modelling & Robust H∞ Control of Nonlinear Systems Subject to Cyber-attack: Application to Attitude Stabilization of Quadrotor

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 78–83, 2023; DOI: 10.25046/aj080109
Abstract:

In the present contribution, a robust output H∞ control ensuring the stability, reliability and security for nonlinear systems when actuator attacks (data deception attacks) occur. A new design method based on the polytopic rewriting of the attacked system as an uncertain one subject to external disturbances will be detailed. Robust polytopic state feedback observer sta-…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Automation & Control Systems (ACS))
Open AccessArticle
9 Pages, 2,432 KB Download PDF

Profiling Attack on WiFi-based IoT Devices using an Eavesdropping of an Encrypted Data Frames

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 49–57, 2022; DOI: 10.25046/aj070606
Abstract:

The rapid advancement of the Internet of Things (IoT) is distinguished by heterogeneous technologies that provide cutting-edge services across a range of application domains. However, by eavesdropping on encrypted WiFi network traflc, attackers can infer private information such as the types and working status of IoT devices in a business or residential home. Moreover, since…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 3,158 KB Download PDF

An Improved Model to Analyze the Impact of Cyber-Attacks on Power Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 5, Page # 27–34, 2022; DOI: 10.25046/aj070504
Abstract:

In this paper, an improved model has been proposed for investigating the impact of cyber-attacks on power systems regarding frequency disturbances and voltage disruption while changing the load called ICAPS. The proposed ICAPS model is formulated by five different controllers, such as LFC, AGC, AGC-PID, AVR, and AVR-PID, implemented in two sets of the system…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Electrical Engineering (ELE))
Open AccessArticle
15 Pages, 366 KB Download PDF

Leakage-abuse Attacks Against Forward Private Searchable Symmetric Encryption

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 156–170, 2022; DOI: 10.25046/aj070216
Abstract:

Dynamic Searchable Symmetric Encryption (DSSE) methods address the problem of securely outsourcing updating private data into a semi-trusted cloud server. Furthermore, Forward Privacy (FP) notion was introduced to limit data leakage and thwart the related attacks on DSSE approaches. FP schemes ensure previous search queries cannot be linked to future updates and newly added files.…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 965 KB Download PDF

Ensemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 291–296, 2021; DOI: 10.25046/aj060532
Abstract:

The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 929 KB Download PDF

SEA WAF: The Prevention of SQL Injection Attacks on Web Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 405–411, 2025; DOI: 10.25046/aj060247
Abstract:

The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
12 Pages, 1,297 KB Download PDF

An Innovative Angle of Attack Virtual Sensor for Physical-Analytical Redundant Measurement System Applicable to Commercial Aircraft

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 698–709, 2021; DOI: 10.25046/aj060176
Abstract:

The angle of attack is a critical flight parameter for commercial aviation aircraft, because automatic envelope protection systems rely on it to keep the aircraft within its safe flight envelope. Faulty measurements of the angle of attack could have catastrophic effects, leading to aircraft loss of control in flight and fatalities, as demonstrated by the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Aerospace Engineering (EAR))
Open AccessArticle
7 Pages, 366 KB Download PDF

Mobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 988–994, 2020; DOI: 10.25046/aj0506118
Abstract:

This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 183 KB Download PDF

Trajectory Tracking Control of a DC Motor Exposed to a Replay-Attack

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 264–269, 2020; DOI: 10.25046/aj050334
Abstract:

This paper investigates the trajectory tracking control (TTC) problem of a networked control system (NCS) against a replay-attack. The impact of data packet dropout and communication delay on the wireless network are taken into account. A new mathematical representation of the NCS under network issues (packet dropout, delay, and replay-attack) is proposed, the resulting closed-loop…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
10 Pages, 435 KB Download PDF

Enhancing an SDN Architecture with DoS Attack Detection Mechanisms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 215–224, 2020; DOI: 10.25046/aj050228
Abstract:

A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 831 KB Download PDF

Analysis of Cyberattacks in Public Organizations in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 116–125, 2020; DOI: 10.25046/aj050215
Abstract:

It was analyzed certain information about cyberattacks in Latin America and methods to counteract the aggressions that affect services, data and infrastructure. The problem is the cyberattack on information networks where there is interdependence between processes, people and devices within public organizations with the negative consequence of denial of services. The objective is to propose…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 390 KB Download PDF

Attacks Classification and a Novel IDS for Detecting Jamming Attack in WBAN

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 80–86, 2020; DOI: 10.25046/aj050210
Abstract:

Wireless Body Area Network (WBAN) aims to monitor patient’s health remotely, by using mini medical sensors that are attached on the human body to collect important data via the wireless network. However, this type of communication is very vulnerable to various types of attacks, poses serious problems to the individual’s life who wears the nodes.…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Network Engineering (ENW))
Open AccessArticle
15 Pages, 1,373 KB Download PDF

Attacks classification and security mechanisms in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 229–243, 2019; DOI: 10.25046/aj040630
Abstract:

This paper proposes a new classification model distinguishing four classes of attacks in Wireless Sensor Networks (WSNs) namely: attacks based on the protocol stack, on the capability of the attacker, on the attack impacts and on the attack target. Then, it presents and classifies the most known attacks in WSNs based the proposed model. Simulations…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 1,409 KB Download PDF

Smartphone Based Heart Attack Risk Prediction System with Statistical Analysis and Data Mining Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1815–1822, 2017; DOI: 10.25046/aj0203221
Abstract:

Nowadays, Ischemic Heart Disease (IHD) (Heart Attack) is ubiquitous and one of the major reasons of death worldwide. Early screening of people at risk of having IHD may lead to minimize morbidity and mortality. A simple approach is proposed in this paper to predict risk of developing heart attack using smartphone and data mining. Clinical…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
19 Pages, 1,686 KB Download PDF

A Computationally Intelligent Approach to the Detection of Wormhole Attacks in Wireless Sensor Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 302–320, 2017; DOI: 10.25046/aj020340
Abstract:

A wormhole attack is one of the most critical and challenging security threats for wireless sensor networks because of its nature and ability to perform concealed malicious activities. This paper proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). Most wormhole detection schemes reported in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 1,914 KB Download PDF

TL-SOC: A Hybrid Decision-Centric Intrusion Detection Framework for Security Operations Centers

Advances in Science, Technology and Engineering Systems Journal, Volume 11, Issue 2, Page # 30–42, 2026; DOI: 10.25046/aj110204
Abstract:

Security Operations Centers (SOCs) require intrusion detection systems that achieve high detection accuracy while maintaining a low false-positive rate and robustness to evolving attack patterns. However, most existing machine learning-based approaches primarily focus on detecting known threats and often overlook distribution shifts and the reliability of generated alerts. In this paper, we propose TL-SOC, a…

Read More
(This article belongs to the SP20 (Special Issue on Multidisciplinary Frontiers in Engineering, Computing and Applied Sciences 2026) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
1 2 3 4

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026