Search

Journal Menu

Journal Browser

Results (19)

Search Parameters:

Keyword: Security
Order results
Results per page
Open AccessArticle
12 Pages, 1,083 KB Download PDF
Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures

by Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Abstract: This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using… Read More

(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
12 Pages, 1,935 KB Download PDF
A Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis

by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 11-22, 2024; DOI: 10.55708/js0307002
Abstract: In today's digital age, individuals extensively engage with virtual environments hosting a plethora of public and private services alongside social platforms. As a consequence, safeguarding these environments from potential cyber threats such as data breaches and system disruptions becomes paramount. Cybersecurity encompasses a suite of technical, organizational, and managerial measures aimed at thwarting unauthorized access… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
13 Pages, 428 KB Download PDF
An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review

by Roberto Mazzolin and Asad Madni
Journal of Engineering Research and Sciences, Volume 1, Issue 4, Page # 09-21, 2022; DOI: 10.55708/js0104002
Abstract: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need… Read More

(This article belongs to the Section Electronic Engineering (EEE))

Open AccessArticle
6 Pages, 1,489 KB Download PDF
AI-Enhanced Endpoint Compliance and Automated Vulnerability Management Framework for Essential Government Infrastructure

by Harshavardhan Malla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 18-23, 2025; DOI: 10.55708/js0408002
Abstract: Public sector IT infrastructures that underpin essential services, such as transportation and law enforcement, are becoming progressively susceptible to advanced cyber attacks and encounter heightened regulatory demands, especially in accordance with CJIS and NIST standards. Regrettably, existing methods for compliance enforcement and patch management are primarily manual or only slightly automated, thereby constraining their scalability,… Read More

(This article belongs to the Section Information Systems – Computer Science (ISC))

Open AccessArticle
7 Pages, 468 KB Download PDF
Secure Anonymous Acknowledgments in a Delay-Tolerant Network

by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
16 Pages, 440 KB Download PDF
Navigating the Autonomous Era: A Detailed Survey of Driverless Cars

by Vaibhavi Tiwari
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 21-36, 2024; DOI: 10.55708/js0310003
Abstract: The incorporation of cutting-edge technologies like sensor networks, artificial intelligence (AI), and vehicle-to everything (V2X) communication has hastened the rollout of autonomous vehicles (AVs), offering significant possibilities for the future of transportation. This document offers an extensive overview of AV technology, covering essential elements such as technological infrastructure, degrees of automation, cybersecurity threats, societal impacts,… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Transportation Science & Technology (TST))

Open AccessArticle
35 Pages, 3,100 KB Download PDF
Fingerprint Bio-metric: Confronting Challenges, Embracing Evolution, and Extending Utility – A Review

by Diptadip Maiti, Madhuchhanda Basak and Debashis Das
Journal of Engineering Research and Sciences, Volume 3, Issue 9, Page # 26-60, 2024; DOI: 10.55708/js0309003
Abstract: As documented in recent research, this review offers a thorough examination of the intricate subject of fingerprint authentication, including a wide range of issues and applications. Addressing problems like non-linear deformations and enhancing picture quality, which are frequently reduced by sophisticated improvement and alignment techniques are important components of fingerprint image authentication. Countering security concerns… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
14 Pages, 3,329 KB Download PDF
Analyzing the Impact of Optical Wireless Communication Technologies on 5G/6G and IoT Solutions: Prospects, Developments, and Challenges

by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 5, Page # 23-36, 2024; DOI: 10.55708/js0305003
Abstract: The imminent 5G and 6G communication systems are projected to exhibit substantial advancements in comparison to the current 4G communication system. Several critical and prevalent concerns pertaining to the service quality of 5G and 6G communication systems encompass elevated capacity, extensive connectivity, minimal latency, robust security measures, energy efficiency, superior quality of user experience, and… Read More

(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Telecommunications (TEL))

Open AccessArticle
8 Pages, 1,288 KB Download PDF
Smart Monitoring System for Housing Societies based on Deep Learning and IoT

by Neha Koppikar and Nidhi Koppikar
Journal of Engineering Research and Sciences, Volume 2, Issue 12, Page # 15-22, 2023; DOI: 10.55708/js0212003
Abstract: Since 2020, people have been getting their body temperatures checked at every public location, social distancing has become a norm, and it has become essential to know who has been in contact with whom. Therefore, we needed a system that helped us solve these challenges, especially in housing societies, as most of the general public… Read More

(This article belongs to the Section Artificial Intelligence – Computer Science (AIC))

Open AccessArticle
8 Pages, 1,306 KB Download PDF
Device Authentication using Homomorphic Encryption

by Supriya Yadav and Gareth Howells
Journal of Engineering Research and Sciences, Volume 2, Issue 10, Page # 1-8, 2023; DOI: 10.55708/js0210001
Abstract: In the digital era, data security in files, databases, accounts, and networks is of utmost importance. Due to the sensitive, private, or protected information they contain, databases are a common target for cyber attacks. To assess threats to data and lower the risk involved with data processing and storage, data security is crucial. Therefore, it… Read More

(This article belongs to the Special Issue on SP3 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2023) and the Section Software Engineering – Computer Science (SEC))

Open AccessArticle
7 Pages, 2,573 KB Download PDF
Applied Salt Technique to Secure Steganographic Algorithm

by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More

(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
11 Pages, 1,249 KB Download PDF
CAPEF: Context-Aware Policy Enforcement Framework for Android Applications

by Saad Inshi, Mahdi Elarbi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Journal of Engineering Research and Sciences, Volume 2, Issue 1, Page # 13-23, 2023; DOI: 10.55708/js0201002
Abstract: The notion of Context-Awareness of mobile applications is drawing more attention, where many applications need to adapt to physical environments of users and devices, such as location, time, connectivity, resources, etc. While these adaptive features can facilitate better communication and help users to access their information anywhere at any time, this however bring risks caused… Read More

(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Electrical Engineering (ELE))

Open AccessArticle
13 Pages, 1,689 KB Download PDF
The Current Trends of Deep Learning in Autonomous Vehicles: A Review

by Raymond Ning Huang, Jing Ren and Hossam A. Gabbar
Journal of Engineering Research and Sciences, Volume 1, Issue 10, Page # 56-68, 2022; DOI: 10.55708/js0110008
Abstract: Autonomous vehicles are the future of road traffic. In addition to improving safety and efficiency from reduced errors compared to conventional vehicles, autonomous vehicles can also be implemented in applications that may be inconvenient or dangerous to a human driver. To realize this vision, seven essential technologies need to be evolved and refined including path… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))

Open AccessArticle
9 Pages, 1,622 KB Download PDF
Acceleration of Image Processing with SHA-3 (Keccak) Algorithm using FPGA

by Argyrios Sideris, Theodora Sanida, Dimitris Tsiktsiris and Minas Dasygenis
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 20-28, 2022; DOI: 10.55708/js0107004
Abstract: In our digital world, the transmission of images between people has played an essential part in every cedures to ensure the integrity and accuracy of the communicated data are required. Today, hashing is the most popular and secure way. This article focuses on the SHA-3 for hashing images dimensions 256 256 pixels with our custom… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Telecommunications (TEL))

Open AccessArticle
6 Pages, 1,924 KB Download PDF
Histogram Based Visible Image Encryption for Real Time Applications

by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
10 Pages Download PDF
Blockchain Based Framework for Securing Students’ Records

by Omega Sarjiyus and Israel Isaiah
Journal of Engineering Research and Sciences, Volume 1, Issue 6, Page # 45-54, 2022; DOI: 10.55708/js0106006
Abstract: Right now, colleges, as focuses of exploration and development, coordinate in their cycles different advances that permit further developing administrations and cycles for their individuals. Among the inventive innovations is the Web of Things that permits getting information from the climate and individuals through various gadgets. Security of information on college grounds is expected to… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
10 Pages, 1,643 KB Download PDF
Model for Assessing Mobile Business Intelligence Readiness within South African Telecommunications Industry

by Philip Marothi Lemekwane and Nkqubela Ruxwana
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 213-222, 2022; DOI: 10.55708/js0105022
Abstract: To determine what needs to be done, organisations throughout the world need the capability to find out quickly, what is happening and why it happened. Therefore, having the intelligence to make informed decisions at the right time and place is the key to success in today's dynamic environment. As mobile systems become increasingly available, more… Read More

(This article belongs to the Section Information Systems – Computer Science (ISC))

Open AccessArticle
14 Pages, 5,235 KB Download PDF
Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network

by Yubaraj Gautam, Kazuhiko Sato and Bishnu Prasad Gautam
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 88-101, 2022; DOI: 10.55708/js0105010
Abstract: Software-Defined Networking (SDN) is an emerging Network technology that can augment the data plane with control plane by using programming technique. However, there are a numbers of security challenges which are required to address to achieve secured communication. Flooding attack is one of the most common threats on the internet for the last decades which… Read More

(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))

Open AccessArticle
20 Pages, 3,659 KB Download PDF
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges

by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More

(This article belongs to the Section Multidisciplinary – Sciences (MLS))

Share Link