Search

Journal Menu

Journal Browser

Results (4)

Search Parameters:

Keyword: Mitigation
Order results
Results per page
Open AccessArticle
14 Pages, 5,235 KB Download PDF
Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network

by Yubaraj Gautam, Kazuhiko Sato and Bishnu Prasad Gautam
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 88-101, 2022; DOI: 10.55708/js0105010
Abstract: Software-Defined Networking (SDN) is an emerging Network technology that can augment the data plane with control plane by using programming technique. However, there are a numbers of security challenges which are required to address to achieve secured communication. Flooding attack is one of the most common threats on the internet for the last decades which… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))

Open AccessReview
13 Pages, 428 KB Download PDF
An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review

by Roberto Mazzolin and Asad Madni
Journal of Engineering Research and Sciences, Volume 1, Issue 4, Page # 09-21, 2022; DOI: 10.55708/js0104002
Abstract: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need… Read More

(This article belongs to the Section Electronic Engineering (EEE))

Open AccessArticle
12 Pages, 2,064 KB Download PDF
Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures

by Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Abstract: This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using… Read More

(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
9 Pages, 1,068 KB Download PDF
AI-Powered Decision Support in SAP: Elevating Purchase Order Approvals for Optimized Life Sciences Supply Chain Performance

by Vinil Apelagunta and Vishnuvardhan Reddy Tatavandla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 41-49, 2025; DOI: 10.55708/js0408005
Abstract: Resilient and compliant supply chains, while essential to the Life Sciences, depend heavily upon SAP systems to manage the complexities involved. The standard Purchase Order (PO) approval process in SAP is an important upstream control point in the supply chain, but seldom has the required intelligence needed to manage endorsed compliance (e.g., GxP) or to… Read More

(This article belongs to the Section Artificial Intelligence – Computer Science (AIC))

Share Link