Search Results

Results (7)

Search Parameters:

Keyword: Cyber Security
Order results
Results per page
Open AccessArticle
9 Pages, 1,188 KB Download PDF

A Comparison of Cyber Security Reports for 2020 of Central European Countries

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 105–113, 2022; DOI: 10.25046/aj070414
Abstract:

The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 996 KB Download PDF

Review of Pedagogical Principles of Cyber Security Exercises

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 592–600, 2020; DOI: 10.25046/aj050572
Abstract:

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 703 KB Download PDF

Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 72–81, 2020; DOI: 10.25046/aj050310
Abstract:

In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS). Cyber security is “a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc.” An IDS is a software…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 892 KB Download PDF

A Cyber-Vigilance System for Anti-Terrorist Drives Based on an Unmanned Aerial Vehicular Networking Signal Jammer for Specific Territorial Security

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 3, Page # 43–50, 2018; DOI: 10.25046/aj030306
Abstract:

During sudden anti-terrorist drives conducted by the law enforcement agencies, a localized cyber security system happens to be a special tactic to avert the unprecedented massacre and gruesome fatalities against the residents of that area by disconnecting the affected territory from the rest of the world; so that the militants and their outside accomplices cannot…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Telecommunications (TEL))
Open AccessArticle
9 Pages, 3,409 KB Download PDF

Detecting CTC Attack in IoMT Communications using Deep Learning Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 2, Page # 130–138, 2023; DOI: 10.25046/aj080215
Abstract:

Cyber security is based on different principles such as confidentiality and integrity of transmitted data. One of the main methods to send confidential messages is to use a shared secret to encrypt and decrypt them. Even if the amortized computational complexity of the hashing functions is Ο(1), there are several situations when it is not…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 664 KB Download PDF

Towards Adoption of Authentication and Authorization in Identity Management and Single Sign On

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 492–500, 2018; DOI: 10.25046/aj030556
Abstract:

Identity and Access Management (IAM) and Single Sign on (SSO) are two security concepts that are related to each other. IAM governs the user access in an organization whereas SSO facilitates the user by authenticating to one centralized application and not having to re-authenticate when trying to access other applications. This paper addresses the different…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026