Search Results

Results (16)

Search Parameters:

Keyword: Vulnerabilities
Order results
Results per page
Open AccessArticle
12 Pages, 1,497 KB Download PDF

Prototype to Mitigate the Risks, Vulnerabilities and Threats of Information to Ensure Data Integrity

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 139–150, 2022; DOI: 10.25046/aj070614
Abstract:

The constant evolution of Information and Communication Technologies, Internet, access to different free software, among others; they generate problems in the management of information security in companies; to mitigate risks, vulnerabilities, and information threats, an alternative was presented considering that information security systems are the basis for decision-making at the government, strategic, tactical, and operational…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 796 KB Download PDF

Analysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 673–682, 2020; DOI: 10.25046/aj050283
Abstract:

Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 946 KB Download PDF

Biometric System Vulnerabilities: A Typology of Metadata

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 1, Page # 191–200, 2020; DOI: 10.25046/aj050125
Abstract:

This study presents a root cause analysis of biometric vulnerabilities and provides a comprehensive typology of metadata in biometric adaptation. Although they are more reliable and secure than traditional authentication methods, biometric techniques are subject to vulnerabilities that pose challenges. Faced with the proliferation of cases of identity theft and fraud, biometrics is increasingly used…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 812 KB Download PDF

An Approach to Vulnerabilities, Threats and Risk in Voting Systems for Popular Elections in Latin America

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 106–116, 2019; DOI: 10.25046/aj040315
Abstract:

The problems in information security regarding vulnerabilities, threats and risks in voting systems for popular election in Latin America and the world persist; because in most of the countries of the world there is no maturity in democracy and defined policies; the problems of confidentiality, integrity and authenticity in the electoral processes can be evidenced.…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 637 KB Download PDF

Source Code Vulnerabilities in IoT Software Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1502–1507, 2017; DOI: 10.25046/aj0203188
Abstract:

An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
7 Pages, 929 KB Download PDF

SEA WAF: The Prevention of SQL Injection Attacks on Web Applications

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 405–411, 2025; DOI: 10.25046/aj060247
Abstract:

The security of website application has become important in the last decades. According to the Open Web Application Security Project (OWASP), the SQL Injection is classified as one of the major vulnerabilities found in web application security. This research is focused on improving website security in dealing with SQL Injection attacks by stopping, monitoring, and…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
9 Pages, 592 KB Download PDF

A Novel Way to Design ADS-B using UML and TLA+ with Security as a Focus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1657–1665, 2020; DOI: 10.25046/aj0506197
Abstract:

Automatic Dependent Surveillance-Broadcast (ADS-B) is the future of aviation. It is a vast system that provides situational awareness for the aviator and regulator at a very low cost and does so with the aid of multiple disparate systems working closely together and communicating with one another. ADS-B uses the Global Navigation Satellite System (GNSS/ GPS)…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
8 Pages, 886 KB Download PDF

Time Granularity-based Privacy Protection for Cloud Metering Systems

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1278–1285, 2020; DOI: 10.25046/aj0506152
Abstract:

Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…

Read More
(This article belongs to Section Network Engineering (ENW))
Open AccessArticle
11 Pages, 1,095 KB Download PDF

Decision Making System for Improving Firewall Rule Anomaly Based on Evidence and Behavior

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 505–515, 2020; DOI: 10.25046/aj050460
Abstract:

Firewalls are controlled by rules which often incur anomalies. The anomalies are considered serious problems that administrators do not desire to happen over their firewalls because they cause more vulnerabilities and decrease the overall performance of the firewall. Resolving anomaly rules that have already occurred on the firewall is difficult and mainly depends on the…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
11 Pages, 959 KB Download PDF

Securing Hybrid SDN-based Geographic Routing Protocol using a Distributed Trust Model

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 567–577, 2020; DOI: 10.25046/aj050271
Abstract:

In this paper, the vulnerabilities and the security attacks against vehicular networks, SDN architecture and some security solutions for SDVN are studied. Secondly, a complete and improved version of the secure HSDN-GRA routing protocol based on a distributed trust model is proposed where public keys of the vehicles are managed in a distributed way. Besides,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
10 Pages, 435 KB Download PDF

Enhancing an SDN Architecture with DoS Attack Detection Mechanisms

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 215–224, 2020; DOI: 10.25046/aj050228
Abstract:

A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 678 KB Download PDF

An Immutable Algorithm Approach to Improve the Information Security of a Process for a Public Organization of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 25–30, 2019; DOI: 10.25046/aj040304
Abstract:

Currently, information security is among the main characteristics that must be achieved within the security of private and public organizations worldwide. For this reason, globally recognized algorithms such as the AES, IDEA, RC5, DES, RSA are researched with the aim of identifying the most suitable and obtaining a greater degree of security and speed of…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Web Authentication: no Password; Listen and Touch

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 84–92, 2019; DOI: 10.25046/aj040109
Abstract:

Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…

Read More
(This article belongs to the SP6 (Special Issue on Recent Advances in Engineering Systems 2018-19) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
10 Pages, 992 KB Download PDF

Holistic Access Control and Privacy Infrastructure in Distributed Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 6, Page # 46–55, 2018; DOI: 10.25046/aj030604
Abstract:

This article discusses IoT security in situations whereby devices do not share the same security domains, which raises security, privacy and safety concerns. It then presents an Access Control and Privacy infrastructure for addressing these concerns in the context of distributed environments. IoT deployments allow billions of connected physical devices to collect, process and share…

Read More
(This article belongs to the SP5 (Special Issue on Multidisciplinary Sciences and Engineering 2018) & Section Interdisciplinary Applications of Computer Science (CSI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026