Search Results

Results (16)

Search Parameters:

Section: ccy
Order results
Results per page
Open AccessArticle
12 Pages, 1,016 KB Download PDF

Enhancing the Network Anomaly Detection using CNN-Bidirectional LSTM Hybrid Model and Sampling Strategies for Imbalanced Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 9, Issue 1, Page # 67–78, 2024; DOI: 10.25046/aj090107
Abstract:

The cybercriminal utilized the skills and freely available tools to breach the networks of internet-connected devices by exploiting confidentiality, integrity, and availability. Network anomaly detection is crucial for ensuring the security of information resources. Detecting abnormal network behavior poses challenges because of the extensive data, imbalanced attack class nature, and the abundance of features in…

Read More
(This article belongs to the SP16 (Special Issue on Computing, Engineering and Multidisciplinary Sciences 2024) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
11 Pages, 1,143 KB Download PDF

Optimizing the Performance of Network Anomaly Detection Using Bidirectional Long Short-Term Memory (Bi-LSTM) and Over-sampling for Imbalance Network Traffic Data

Advances in Science, Technology and Engineering Systems Journal, Volume 8, Issue 6, Page # 144–154, 2023; DOI: 10.25046/aj080614
Abstract:

Cybercriminal exploits integrity, confidentiality, and availability of information resources. Cyberattacks are typically invisible to the naked eye, even though they target a wide range of our digital assets, such as internet-connected smart devices, computers, and networking devices. Implementing network anomaly detection proves to be an effective method for identifying these malicious activities. The traditional anomaly…

Read More
(This article belongs to the SP15 (Special Issue on Innovation in Computing, Engineering Science & Technology 2023) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 1,013 KB Download PDF

Ontology Based Privacy Preservation over Encrypted Data using Attribute-Based Encryption Technique

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 378–386, 2021; DOI: 10.25046/aj060244
Abstract:

The web documents are automatically interacting to discover the information by web mining, which is one of the applications of Cloud Computing (CC) technologies. These documents may be in the form of structured, semi-structured, or unstructured formats. In current web technologies, the Semantic Web is an extension for better enabling the people and computers to…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 591 KB Download PDF

Improved Detection of Advanced Persistent Threats Using an Anomaly Detection Ensemble Approach

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 2, Page # 295–302, 2021; DOI: 10.25046/aj060234
Abstract:

Rated a high-risk cyber-attack type, Advanced Persistent Threat (APT) has become a cause for concern to cyber security experts. Detecting the presence of APT in order to mitigate this attack has been a major challenge as successful attacks to large organizations still abound. Our approach combines static rule anomaly detection through pattern recognition and machine…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 815 KB Download PDF

Cognitive Cybernetics in the Foresight of Globalitarianism

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 718–723, 2020; DOI: 10.25046/aj050686
Abstract:

This paper presents the results of the research conducted with the help of cognitive cybernetics about the “mass” factor from the theory of totalitarianism. According to the expert system model, “big data” analysis sought to discover knowledge for assessing the future status of digital social connectivity. Originally developed models and methods of cognitive and computer…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 1,207 KB Download PDF

Electronic Warfare Methods Combatting UAVs

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 447–454, 2020; DOI: 10.25046/aj050653
Abstract:

This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) non-destructively, using Electronic Warfare Methods. The aim is to introduce certain methods of UAV detection and elimination in a complex environment and terrain, e.g., in an urban and battlefield environment, that will result in finding the control device position and the UAV itself. Neural networks,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 900 KB Download PDF

Performance Analysis of Go-Back-N ARQ Protocol Used in Data Transmission Over Noisy Channels

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 4, Page # 612–617, 2020; DOI: 10.25046/aj050472
Abstract:

Automatic Repeat reQuest (ARQ) protocols are used to control transmission errors in data communications. They are used at Data Link Control (DLC) sublayer of Data Link Layer (DLL) of OSI (Open Systems Interconnection) network model to achieve flow and error control and provide smooth and reliable transmission between network nodes. ARQ protocols use acknowledgments and…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 883 KB Download PDF

A Comprehensive Study of Privacy Preserving Techniques in Cloud Computing Environment

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 419–424, 2020; DOI: 10.25046/aj050254
Abstract:

The huge growth in cloud storage utilization over the past years has made a big demand for an advanced technique and strong tools to make services even more practical and secure. Data privacy in cloud computing has become one of the biggest concerns for both individuals and organizations which adds more pressure on cloud service…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 653 KB Download PDF

New Solution Implementation to Protect Encryption Keys Inside the Database Management System

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 2, Page # 87–94, 2020; DOI: 10.25046/aj050211
Abstract:

Due to the attacks’ growth on sensitive databases by deploying advanced tools, beyond access control and authentication mechanisms, the database encryption remains a useful and effective way to ensure robust security of data stored within it. Any database encryption solution is based on a specific encryption model that determines how data is encrypted inside it.…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 2,251 KB Download PDF

Monitoring System Using GPS for Logistic’s Key Performance Indicator

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 6, Page # 32–37, 2019; DOI: 10.25046/aj040604
Abstract:

Transportation vendors are important for distribution companies to deliver goods or products. Operational problems of logistic process in transportation vendors’ activities are difficult to track and monitor directly in the field, such as driver’s position, the delivery, and so forth. These problems result in the difficulty to measure the performance of vendors’ activities. The aim…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
9 Pages, 1,129 KB Download PDF

Artificial Bee Colony-Optimized LSTM for Bitcoin Price Prediction

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 375–383, 2019; DOI: 10.25046/aj040549
Abstract:

In recent years, deep learning has been widely used for time series prediction. Deep learning model that is most often used for time series prediction is LSTM. LSTM is widely used because of its excellence in remembering very long sequences. However, doing training on models that use LSTM requires a long time. Trying from one…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 977 KB Download PDF

Sentiment Analysis on Twitter for Predicting Stock Exchange Movement

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 3, Page # 244–250, 2019; DOI: 10.25046/aj040332
Abstract:

This paper is proposed to build a model by applying two methods, namely support vector machine and nonnegative matrix factorization in the process of predicting stock market movement using twitter and historical data. The stock exchange is based on the LQ 45 stock with period from August 2018 – January 2019. The features consist of…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
12 Pages, 700 KB Download PDF

Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 1, Page # 317–328, 2019; DOI: 10.25046/aj040131
Abstract:

Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
8 Pages, 716 KB Download PDF

Big Data Analytics for Healthcare Organization: A Study of BDA Process, Benefits and Challenges of BDA

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 4, Page # 189–196, 2017; DOI: 10.25046/aj020425
Abstract:

Day by day, data grows exponentially large using advanced technology and it requires effective analytical techniques to analyze the unknown and useful facts, patterns, associations and new trends which will provide new way for giving treatment to diseases and to provide good quality healthcare at low cost for everyone. This paper describes uncover valuable insights,…

Read More
(This article belongs to Section Cybernetics in Computer Science (CCY))
Open AccessArticle
7 Pages, 1,776 KB Download PDF

A Highly-Secured Arithmetic Hiding cum Look-Up Table (AHLUT) based S-Box for AES-128 Implementation

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 3, Page # 420–426, 2017; DOI: 10.25046/aj020354
Abstract:

Side-Channel Attack (SCA) is an effective method in extracting the secret key of cryptographic algorithms by correlating the physical leakage information with the processed data. In this paper, we propose an arithmetic hiding cum Look-up Table (AHLUT) based Substitution-Box (S-Box) in AES-128 cryptographic algorithm implementation to countermeasure against SCA. There are three key features in…

Read More
(This article belongs to the SP3 (Special issue on Recent Advances in Engineering Systems 2017) & Section Cybernetics in Computer Science (CCY))
Open AccessArticle
6 Pages, 734 KB Download PDF

Strong Authentication Protocol based on Java Crypto Chip as a Secure Element

Advances in Science, Technology and Engineering Systems Journal, Volume 1, Issue 5, Page # 21–26, 2016; DOI: 10.25046/aj010505
Abstract:

Smart electronic devices and gadgets and their applications are becoming more and more popular. Most of those devices and their applications handle personal, financial, medical and other sensitive data that require security and privacy protection. In this paper we describe one aspect of such protection – user authentication protocol based on the use of X.509…

Read More
(This article belongs to the Special issue on Recent Advances in Electrical and Electronics Engineering 2016 & Section Cybernetics in Computer Science (CCY))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026