Search Results

Results (9)

Search Parameters:

Keyword: Vulnerability
Order results
Results per page
Open AccessArticle
6 Pages, 2,622 KB Download PDF

Operating Systems Vulnerability – An Examination of Windows 10, macOS, and Ubuntu from 2015 to 2021

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 6, Page # 230–235, 2022; DOI: 10.25046/aj070625
Abstract:

This study investigated the vulnerabilities of three operating systems: Windows 10, macOS, and Ubuntu. The analysis of secondary data obtained from the CVE and NVD databases for the study period demonstrates varying OS vulnerability. Quantitative assessment of the vulnerability (using the vulnerability score) for the investigated operating systems found consistent results in the security vulnerability…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
15 Pages, 1,031 KB Download PDF

Investigating the Expertise Indicators of Vulnerability Discovery Professionals

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 1784–1798, 2017; DOI: 10.25046/aj0203218
Abstract:

In crowdsourcing, selecting the person with suitable expertise is very important; especially since the task requester is not always in direct contact with the worker. Recently, this has become increasingly important particularly when the crowdsourced tasks are complex and require skillful workers (e.g. software development, software testing, vulnerability discovery, and open innovation). In this paper,…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Software Engineering in Computer Science (CSE))
Open AccessArticle
17 Pages, 1,660 KB Download PDF

On Adversarial Robustness of Quantized Neural Networks Against Direct Attacks

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 6, Page # 30–46, 2024; DOI: 10.25046/aj090604
Abstract:

Deep Neural Networks (DNNs) prove to be susceptible to synthetically generated samples, so-called adversarial examples. Such adversarial examples aim at generating misclassifications by specifically optimizing input data for a matching perturbation. With the increasing use of deep learning on embedded devices and the resulting use of quantization techniques to compress deep neural networks, it is…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
7 Pages, 758 KB Download PDF

Integration Information Systems Design of Material Planning in the Manufacturing Industry using Service Oriented Architecture

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 3, Page # 100–106, 2021; DOI: 10.25046/aj060311
Abstract:

PT XYZ has an Enterprise Resource Planning application that is used by the Planning Department to view stocks and plan production materials. Currently calculation of production materials takes more than 30 seconds just to export to Excel then a few minutes to adjust the data format to the planning form and the data used is…

Read More
(This article belongs to Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
12 Pages, 813 KB Download PDF

On the Combination of Static Analysis for Software Security Assessment – A Case Study of an Open-Source e-Government Project

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 921–932, 2021; DOI: 10.25046/aj0602105
Abstract:

Static Application Security Testing (SAST) is a popular quality assurance technique in software engineering. However, integrating SAST tools into industry-level product development and security assessment poses various technical and managerial challenges. In this work, we reported a longitudinal case study of adopting SAST as a part of a human-driven security assessment for an open-source e-government…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
10 Pages, 796 KB Download PDF

Analysis of Vulnerabilities, Risks and Threats in the Process of Quota Allocation for the State University of Ecuador

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 673–682, 2020; DOI: 10.25046/aj050283
Abstract:

Different models and standards of information security were analyzed, to adopt a model that mitigates vulnerabilities, risks and threats in the quota allocation process for the State University in Ecuador. The main objective is defining a prototype for the management of processes and information security in this type of organization. It was used the deductive…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
13 Pages, 811 KB Download PDF

Computer Security as an Engineering Practice: A System Engineering Discussion

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 2, Page # 357–369, 2019; DOI: 10.25046/aj040245
Abstract:

We examine design principles from more than 20 years of experience in the implementation and protection of mission critical flight systems used by the Mission Design and Navigation Section at NASA’s Jet Propulsion Laboratory. Spacecraft navigation has rigorous requirements for completeness and accuracy, often under critical and uncompromising time pressure. Fault tolerant and robust design…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
7 Pages, 1,799 KB Download PDF

Spatial Modeling of Flood Risk in Karawang

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 5, Page # 200–206, 2018; DOI: 10.25046/aj030524
Abstract:

Conceptually, flood modeling can be done based on process and data availability (data driven model). The implementation of flood mitigation requires accurate data, which can be obtained from high resolution satellite imagery, vertical air photos and high-resolution Digital Elevation Model (DEM). Modeling using high accuracy DEM data can detect landforms in more detail. The objective…

Read More
(This article belongs to Section Remote Sensing (RMS))
Open AccessArticle
6 Pages, 700 KB Download PDF

Intrusion detection in cloud computing based attack patterns and risk assessment

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 479–484, 2017; DOI: 10.25046/aj020361
Abstract:

This paper is an extension of work originally presented in SYSCO CONF.We extend our previous work by presenting the initial results of the implementation of intrusion detection based on risk assessment on cloud computing. The idea focuses on a novel approach for detecting cyber-attacks on the cloud environment by analyzing attacks pattern using risk assessment…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Indigenous Knowledge Systems of the Tribal Communities of the Asia Pacific
Guest Editors: Dr. Anurag Hazarika
Deadline: 31 October 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026