Search Results

Results (189)

Search Parameters:

Keyword: Security
Order results
Results per page
Open AccessArticle
12 Pages, 1,302 KB Download PDF

Federated Learning with Differential Privacy and Blockchain for Security and Privacy in IoMT A Theoretical Comparison and Review

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 6, Page # 65–76, 2025; DOI: 10.25046/aj100606
Abstract:

The growing integration of the Internet of Medical Things (IoMT) into healthcare has amplified the need for secure and privacy-preserving artificial intelligence. Federated Learning (FL) has emerged as a pivotal paradigm for decentralized medical data processing; however, it still faces challenges concerning data confidentiality, trust management, and scalability. This review presents an extended theoretical comparison…

Read More
(This article belongs to the SP19 (Special Issue on Innovation in Computing, Engineering Science & Technology 2025-26) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
10 Pages, 1,102 KB Download PDF

Exploring Current Challenges on Security and Privacy in an Operational eHealth Information System

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 2, Page # 45–54, 2024; DOI: 10.25046/aj090206
Abstract:

Bearing in mind that patient data is extremely sensitive, it is crucial to establish strong protection when the security and privacy of healthcare data are concerned. Prioritizing data security and privacy is essential for the overall healthcare industry in order to maintain the reliability of electronic healthcare (eHealth) information systems. This study explores the gathered…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Medicine (MED))
Open AccessArticle
13 Pages, 3,740 KB Download PDF

Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 107–119, 2023; DOI: 10.25046/aj080612
Abstract:

Cloud computing has emerged as a pivotal component of contemporary IT systems, affording organizations the agility and scalability required to meet the ever-changing demands of business. However, this technological evolution has introduced a new era of cybersecurity challenges, as attackers employ increasingly sophisticated strategies to breach cloud networks. Such breaches can have far-reaching consequences, including…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section -)
Open AccessArticle
7 Pages, 9,194 KB Download PDF

Photoluminescence Properties of Eu(III) Complexes with Two Different Phosphine Oxide Structures and Their Potential uses in Micro-LEDs, Security, and Sensing Devices: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 3, Page # 154–160, 2023; DOI: 10.25046/aj080317
Abstract:

In the field of micro-LED displays, there is strong demand for red phosphors with high photoluminescence intensity, high color purity, and small particle size. Here, we focus on Eu(III) complexes because they produce sharp photoluminescence spectra with high color purity and can be dissolved in polymer, enabling a reduction in particle size to the molecular…

Read More
(This article belongs to the SP14 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2022-23) & Section Multidisciplinary Materials Science (MMU))
Open AccessArticle
8 Pages, 3,667 KB Download PDF

Prototype to Identify the Capacity in Cybersecurity Management for a Public Organization

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 1, Page # 108–115, 2023; DOI: 10.25046/aj080113
Abstract:

Public organizations are subjected to a complex security situation, which can be addressed by permanently strengthening and evaluating their cybersecurity capabilities. The objective of this research is to develop a model to identify the cybersecurity management capacity of public organizations. The deductive method was applied for the review and analysis of criteria, factors and variables…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 522 KB Download PDF

The Security of Information Systems and Image Processing Supported by the Quantum Computer: A review

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 77–86, 2022; DOI: 10.25046/aj070609
Abstract:

The knowledge and understanding of the technology of quantum computers and their superiority over classical computers are still insufficient or uncertain for many communities of researchers, manufacturers, investors and the general public. For this reason, we try in this article to present and explain some of the basic concepts of quantum computers. We explain how…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,188 KB Download PDF

A Comparison of Cyber Security Reports for 2020 of Central European Countries

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 105–113, 2022; DOI: 10.25046/aj070414
Abstract:

The aim of the article is to analyze the annual reports on cyber security of Central European countries, i.e. the Czech Republic, Slovakia, Poland, Germany, and Austria. The article focuses on the development of the state of cyber security, actors of threats in cyberspace, cyber threats, and the most common types of attacks. The article…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,865 KB Download PDF

Deep Learning Affective Computing to Elicit Sentiment Towards Information Security Policies

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 152–160, 2022; DOI: 10.25046/aj070317
Abstract:

Information security behaviour is an integral part of modern business and has become a central theme in many research studies. One of the essential tools available that can be used to influence information security behaviour is information security policies (ISPs). These types of policies, which is mandatory in most organisations, are formalised rules and regulations…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 428 KB Download PDF

Taxonomy of Security Techniques for Routing Protocols in Mobile Ad-hoc Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 2, Page # 25–31, 2022; DOI: 10.25046/aj070203
Abstract:

The Nodes equipped with wireless technology cooperate in an autonomous and instantaneous way to form a mobile ad hoc network. It turns out that several factors make this type of network vulnerable to various security threats. Considering the sensitivity of user data routed through nodes, routing security should be a priority in mobile ad hoc…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
13 Pages, 930 KB Download PDF

Enhance Student Learning Experience in Cybersecurity Education by Designing Hands-on Labs on Stepping-stone Intrusion Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 4, Page # 355–367, 2021; DOI: 10.25046/aj060440
Abstract:

Stepping-stone intrusion has been widely used by professional hackers to launch their attacks. Unfortunately, this important and typical offensive skill has not been taught in most colleges and universities. In this paper, after surveying the most popular detection techniques in stepping-stone intrusion, we develop 10 hands-on labs to enhance student-learning experience in cybersecurity education. The…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 813 KB Download PDF

On the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 921–932, 2021; DOI: 10.25046/aj0602105
Abstract:

Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
14 Pages, 872 KB Download PDF

Challenges in IoT Technology Adoption into Information System Security Management of Smart Cities: A Review

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 99–112, 2021; DOI: 10.25046/aj060213
Abstract:

Sustainable urban development and utilization of Internet of Things (IoT) technology is driving cities globally to evolve into Smart Cities (SC). The power of IoT services and applications will enable public agencies to provide personalized services to the citizens and inevitably improves their much-needed quality of life. However, although the use of IoT technology proves…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 592 KB Download PDF

A Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1657–1665, 2020; DOI: 10.25046/aj0506197
Abstract:

Automatic Dependent Surveillance-Broadcast (ADS-B) is the future of aviation. It is a vast system that provides situational awareness for the aviator and regulator at a very low cost and does so with the aid of multiple disparate systems working closely together and communicating with one another. ADS-B uses the Global Navigation Satellite System (GNSS/ GPS)…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
12 Pages, 811 KB Download PDF

An Enhanced Conceptual Security Model for Autonomous Vehicles

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 853–864, 2020; DOI: 10.25046/aj0506102
Abstract:

Connected and self-driving cars have emerged over the last decade as a leading example of cyber-physical systems, which seek to considerably enhance traffic safety, reduce emissions, decrease costs, and improve efficiency. Google, TESLA, Uber ATG are becoming pioneers in the autonomous vehicles industry. Autonomous vehicles can have a large codebase and with a large volume…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Automation & Control Systems (ACS))
Open AccessArticle
8 Pages, 1,163 KB Download PDF

Multi-Model Security and Social Media Analytics of the Digital Twin

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 323–330, 2020; DOI: 10.25046/aj050639
Abstract:

Digital twins act through application programming interfaces to their physical counterparts to monitor, model, and control them. Beyond these traditional functions of digital twins, they must also act to secure their physical counterparts. A multi-model scheme is presented to help digital twins towards the task of securing the physical system. Additionally, this work includes an…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 846 KB Download PDF

Multi-layered Security Design and Evaluation for Cloud-based Web Application: Case Study of Human Resource Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 674–679, 2020; DOI: 10.25046/aj050583
Abstract:

Cloud computing is the development of information technology to provides resources that can be accessed through network. Security and privacy in cloud computing are major concern for companies. Therefore, cloud computing architecture strategy and design are needed to reduce costs and ensure the security of company assets in cloud computing. In this study, we are…

Read More
(This article belongs to Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
9 Pages, 996 KB Download PDF

Review of Pedagogical Principles of Cyber Security Exercises

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 592–600, 2020; DOI: 10.25046/aj050572
Abstract:

Modern digitalized cyber domains are extremely complex ensemble. Cyber attacks or incidents against system may affect capricious effects for another system or even for physical devices. For understanding and training to encounter those effects requires an effective and complex simulation capability. Cyber Security Exercises are an effective expedient for training and learning measures and operations…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
17 Pages, 1,074 KB Download PDF

Detailed Security Evaluation of ARANz, ARAN and AODV Protocols

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 176–192, 2020; DOI: 10.25046/aj050523
Abstract:

Ad-Hoc networks are self-organized wireless networks. Finding a secure and efficient route leading from a specific source node to an intended destination node is one of the serious concerns in mobile Ad-Hoc networks. ARANz is one of the significant protocols that has been proposed for such networks. ARANz implements the authentication methods used with the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 451 KB Download PDF

Fast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 63–68, 2020; DOI: 10.25046/aj050509
Abstract:

Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 742 KB Download PDF

Analysis of Security-Reliability Trade-off for Multi-hop Cognitive Relaying Protocol with TAS/SC Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 54–62, 2020; DOI: 10.25046/aj050508
Abstract:

This paper studies a trade-off between security (intercept probability (IP)) and reliability (outage probability (OP)) for a multi-hop decode-and-forward (DF) relaying protocol in an underlay cognitive radio network, in presence of a multi-antenna eavesdropper. In the considered protocol, all primary and secondary terminals are equipped with multiple antennas, and they employ transmit antenna selection (TAS)…

Read More
(This article belongs to Section Telecommunications (TEL))
Open AccessArticle
8 Pages, 706 KB Download PDF

An Explanatory Review on Cybersecurity Capability Maturity Models

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 762–769, 2020; DOI: 10.25046/aj050490
Abstract:

Cybersecurity is growing exponentially day by day in both the public and private sectors. This growth also comes with a new and dynamic cyber-threats risk that causes both sectors’ performance to halt. These sectors must update their cybersecurity measures and must understand the capability and maturity of their organization’s cybersecurity preparedness. Cybersecurity maturity models are…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 370 KB Download PDF

Development Trends of Smart Cities in the Future – Potential Security Risks and Responsive Solutions

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 548–556, 2020; DOI: 10.25046/aj050465
Abstract:

Smart cities are an indispensable development of the ongoing urbanization process world- wide. Currently, smart cities are being built and deployed by countries in the first steps. Based on research on the current state of developing smart cities in the world, the author forecasts the future development trends of such cities, pointing to one of…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 663 KB Download PDF

Survey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 374–380, 2020; DOI: 10.25046/aj050443
Abstract:

Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…

Read More
(This article belongs to the iraset-20 (Special Issue on Innovative Research in Applied Science, Engineering and Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 2,283 KB Download PDF

A Survey and an IoT Cybersecurity Recommendation for Public and Private Hospitals in Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 518–528, 2020; DOI: 10.25046/aj050364
Abstract:

It was analyzed the reference information on Cybersecurity architectures, models, standards, evaluations, mechanisms, and procedures applied to IoT domains, and public and private health area. The problem is the lack of proposals for IoT Cybersecurity in public and private hospitals to minimize random failures, ensure the privacy of personal data of patients, avoid the paralysis…

Read More
(This article belongs to Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 798 KB Download PDF

Measurement of Employee Awareness Levels for Information Security at the Center of Analysis and Information Services Judicial Commission Republic of Indonesia

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 501–509, 2020; DOI: 10.25046/aj050362
Abstract:

The Center for Analysis and Information Services (Palinfo) at the Judicial Commission closely related to the management of information systems which are used to process organizational internal data and information systems on public services. Data processing and network management have an information system security risk. The Judicial Commission seeks to reduce risk and improve the…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
1 2 3 8

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026