Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,902)
  • Open Access

    ARTICLE

    The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device Identification

    Seung-Ju Han, Seong-Su Yoon, Ieck-Chae Euom*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1495-1518, 2024, DOI:10.32604/cmes.2024.053457 - 27 September 2024

    Abstract The rapid proliferation of Internet of Things (IoT) technology has facilitated automation across various sectors. Nevertheless, this advancement has also resulted in a notable surge in cyberattacks, notably botnets. As a result, research on network analysis has become vital. Machine learning-based techniques for network analysis provide a more extensive and adaptable approach in comparison to traditional rule-based methods. In this paper, we propose a framework for analyzing communications between IoT devices using supervised learning and ensemble techniques and present experimental results that validate the efficacy of the proposed framework. The results indicate that using the More >

  • Open Access

    ARTICLE

    Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical Intelligence

    Il Hwan Ji1, Ju Hyeon Lee1, Seungho Jeon2, Jung Taek Seo2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1519-1549, 2024, DOI:10.32604/cmes.2024.053437 - 27 September 2024

    Abstract In the early days of IoT’s introduction, it was challenging to introduce encryption communication due to the lack of performance of each component, such as computing resources like CPUs and batteries, to encrypt and decrypt data. Because IoT is applied and utilized in many important fields, a cyberattack on IoT can result in astronomical financial and human casualties. For this reason, the application of encrypted communication to IoT has been required, and the application of encrypted communication to IoT has become possible due to improvements in the computing performance of IoT devices and the development… More >

  • Open Access

    ARTICLE

    Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1447-1471, 2024, DOI:10.32604/cmes.2024.053379 - 27 September 2024

    Abstract As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality… More >

  • Open Access

    ARTICLE

    Ensemble Filter-Wrapper Text Feature Selection Methods for Text Classification

    Oluwaseun Peter Ige1,2, Keng Hoon Gan1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1847-1865, 2024, DOI:10.32604/cmes.2024.053373 - 27 September 2024

    Abstract Feature selection is a crucial technique in text classification for improving the efficiency and effectiveness of classifiers or machine learning techniques by reducing the dataset’s dimensionality. This involves eliminating irrelevant, redundant, and noisy features to streamline the classification process. Various methods, from single feature selection techniques to ensemble filter-wrapper methods, have been used in the literature. Metaheuristic algorithms have become popular due to their ability to handle optimization complexity and the continuous influx of text documents. Feature selection is inherently multi-objective, balancing the enhancement of feature relevance, accuracy, and the reduction of redundant features. This… More >

  • Open Access

    ARTICLE

    A Dynamical Study of Modeling the Transmission of Typhoid Fever through Delayed Strategies

    Muhammad Tashfeen1, Fazal Dayan1, Muhammad Aziz Ur Rehman1, Thabet Abdeljawad2,3,4,5,*, Aiman Mukheimer2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1419-1446, 2024, DOI:10.32604/cmes.2024.053242 - 27 September 2024

    Abstract This study analyzes the transmission of typhoid fever caused by Salmonella typhi using a mathematical model that highlights the significance of delay in its effectiveness. Time delays can affect the nature of patterns and slow down the emergence of patterns in infected population density. The analyzed model is expanded with the equilibrium analysis, reproduction number, and stability analysis. This study aims to establish and explore the non-standard finite difference (NSFD) scheme for the typhoid fever virus transmission model with a time delay. In addition, the forward Euler method and Runge-Kutta method of order 4 (RK-4)… More >

  • Open Access

    ARTICLE

    Far and Near Optimization: A New Simple and Effective Metaphor-Less Optimization Algorithm for Solving Engineering Applications

    Tareq Hamadneh1,2, Khalid Kaabneh3, Omar Alssayed4, Kei Eguchi5,*, Zeinab Monrazeri6, Mohammad Dehghani6

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1725-1808, 2024, DOI:10.32604/cmes.2024.053236 - 27 September 2024

    Abstract In this article, a novel metaheuristic technique named Far and Near Optimization (FNO) is introduced, offering versatile applications across various scientific domains for optimization tasks. The core concept behind FNO lies in integrating global and local search methodologies to update the algorithm population within the problem-solving space based on moving each member to the farthest and nearest member to itself. The paper delineates the theory of FNO, presenting a mathematical model in two phases: (i) exploration based on the simulation of the movement of a population member towards the farthest member from itself and (ii)… More >

  • Open Access

    ARTICLE

    A Non-Intrusive Stochastic Phase-Field for Fatigue Fracture in Brittle Materials with Uncertainty in Geometry and Material Properties

    Rajan Aravind1,2, Sundararajan Natarajan1, Krishnankutty Jayakumar2, Ratna Kumar Annabattula1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 997-1032, 2024, DOI:10.32604/cmes.2024.053047 - 27 September 2024

    Abstract Understanding the probabilistic nature of brittle materials due to inherent dispersions in their mechanical properties is important to assess their reliability and safety for sensitive engineering applications. This is all the more important when elements composed of brittle materials are exposed to dynamic environments, resulting in catastrophic fatigue failures. The authors propose the application of a non-intrusive polynomial chaos expansion method for probabilistic studies on brittle materials undergoing fatigue fracture when geometrical parameters and material properties are random independent variables. Understanding the probabilistic nature of fatigue fracture in brittle materials is crucial for ensuring the… More >

  • Open Access

    ARTICLE

    Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection Systems

    Ye-Seul Kil1,#, Yu-Ran Jeon1,#, Sun-Jin Lee1, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1473-1493, 2024, DOI:10.32604/cmes.2024.052637 - 27 September 2024

    Abstract With the rise of remote work and the digital industry, advanced cyberattacks have become more diverse and complex in terms of attack types and characteristics, rendering them difficult to detect with conventional intrusion detection methods. Signature-based intrusion detection methods can be used to detect attacks; however, they cannot detect new malware. Endpoint detection and response (EDR) tools are attracting attention as a means of detecting attacks on endpoints in real-time to overcome the limitations of signature-based intrusion detection techniques. However, EDR tools are restricted by the continuous generation of unnecessary logs, resulting in poor detection… More >

  • Open Access

    ARTICLE

    Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring System

    Bum-Sok Kim1, Hye-Won Suk1, Yong-Hoon Choi2, Dae-Sung Moon3, Min-Suk Kim2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1551-1574, 2024, DOI:10.32604/cmes.2024.052375 - 27 September 2024

    Abstract Currently, cybersecurity threats such as data breaches and phishing have been on the rise due to the many different attack strategies of cyber attackers, significantly increasing risks to individuals and organizations. Traditional security technologies such as intrusion detection have been developed to respond to these cyber threats. Recently, advanced integrated cybersecurity that incorporates Artificial Intelligence has been the focus. In this paper, we propose a response strategy using a reinforcement-learning-based cyber-attack-defense simulation tool to address continuously evolving cyber threats. Additionally, we have implemented an effective reinforcement-learning-based cyber-attack scenario using Cyber Battle Simulation, which is a… More >

  • Open Access

    ARTICLE

    Enhancing Arabic Cyberbullying Detection with End-to-End Transformer Model

    Mohamed A. Mahdi1, Suliman Mohamed Fati2,*, Mohamed A.G. Hazber1, Shahanawaj Ahamad3, Sawsan A. Saad4

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1651-1671, 2024, DOI:10.32604/cmes.2024.052291 - 27 September 2024

    Abstract Cyberbullying, a critical concern for digital safety, necessitates effective linguistic analysis tools that can navigate the complexities of language use in online spaces. To tackle this challenge, our study introduces a new approach employing Bidirectional Encoder Representations from the Transformers (BERT) base model (cased), originally pretrained in English. This model is uniquely adapted to recognize the intricate nuances of Arabic online communication, a key aspect often overlooked in conventional cyberbullying detection methods. Our model is an end-to-end solution that has been fine-tuned on a diverse dataset of Arabic social media (SM) tweets showing a notable… More >

Displaying 51-60 on page 6 of 3902. Per Page