Search Results

Results (16)

Search Parameters:

Keyword: Confidentiality
Order results
Results per page
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 10,815 KB Download PDF

A Secure Medical History Card Powered by Blockchain Technology

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 96–106, 2023; DOI: 10.25046/aj080611
Abstract:

A reliable healthcare system ensures that the population has access to top-notch medical ser- vices, ultimately enhancing their overall health most efficiently. At times, data are not secured or handled appropriately. Addressing these concerns, blockchain technology is projected to bring about a substantial revolution in the medical industry by assuring the confidentiality of electronic health…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Bioinformatics (BIF))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 886 KB Download PDF

Time Granularity-based Privacy Protection for Cloud Metering Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1278–1285, 2020; DOI: 10.25046/aj0506152
Abstract:

Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
6 Pages, 568 KB Download PDF

An Overview on CryptDb and Word2vec Approaches

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1282–1287, 2020; DOI: 10.25046/aj0505154
Abstract:

Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 706 KB Download PDF

An Explanatory Review on Cybersecurity Capability Maturity Models

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 762–769, 2020; DOI: 10.25046/aj050490
Abstract:

Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
8 Pages, 671 KB Download PDF

Analysis of Information Security for a Voting Process for Sectional Governments in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 352–359, 2019; DOI: 10.25046/aj040546
Abstract:

Knowing about different events in several Latin American countries, as well as in Ecuador, in relation to data alteration, in the different sectional voting processes, it has been necessary to carry out a security analysis provided by the systems of choice in the different sectional governments of the country. The objective of this study is…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
13 Pages, 1,436 KB Download PDF

The Use of LMS AMESim in the Fault Diagnosis of a Commercial PEM Fuel Cell System

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 1, Page # 297–309, 2018; DOI: 10.25046/aj030136
Abstract:

The world’s pollution rates have been increasing exponentially due to the many reckless lifestyle practices of human beings as well as their choices of contaminating power sources. Eventually, this lead to a worldwide awareness on the risks of those power sources, and in turn, a movement towards the exploration and deployment of several green technologies…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Electrical Engineering (ELE))
Open AccessArticle
11 Pages, 1,022 KB Download PDF

Verifying the Detection Results of Impersonation Attacks in Service Clouds

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 449–459, 2017; DOI: 10.25046/aj020358
Abstract:

A web service impersonation is a class of attacks in which an attacker poses as or assumes the identity of a legitimate service to maliciously utilize that service’s privileges. Providing security for interacting cloud services requires more than user authentication with passwords or digital certificates and confidentiality in data transmission. In this paper, we focus…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026