Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (17,377)
  • Open Access

    ARTICLE

    APU-D* Lite: Attack Planning under Uncertainty Based on D* Lite

    Tairan Hu1, Tianyang Zhou1, Yichao Zang1, *, Qingxian Wang1, Hang Li2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1795-1807, 2020, DOI:10.32604/cmc.2020.011071 - 20 August 2020

    Abstract With serious cybersecurity situations and frequent network attacks, the demands for automated pentests continue to increase, and the key issue lies in attack planning. Considering the limited viewpoint of the attacker, attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach, but it also poses some challenges. To address the efficiency problem in uncertainty planning, we propose the APU-D* Lite algorithm in this paper. First, the pentest framework is mapped to the planning problem with the Planning Domain Definition Language (PDDL). Next, we develop the pentest information graph… More >

  • Open Access

    ARTICLE

    A Hybrid Path Planning Method Based on Articulated Vehicle Model

    Zhongping Chen1, Dong Wang1, *, Gang Chen2, Yanxi Ren3, Danjie Du4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1781-1793, 2020, DOI:10.32604/cmc.2020.010902 - 20 August 2020

    Abstract Due to the unique steering mechanism and driving characteristics of the articulated vehicle, a hybrid path planning method based on the articulated vehicle model is proposed to meet the demand of obstacle avoidance and searching the path back and forth of the articulated vehicle. First, Support Vector Machine (SVM) theory is used to obtain the two-dimensional optimal zero potential curve and the maximum margin, and then, several key points are selected from the optimal zero potential curves by using Longest Accessible Path (LAP) method. Next, the Cubic Bezier (CB) curve is adopted to connect the More >

  • Open Access

    ARTICLE

    Tissue Segmentation in Nasopharyngeal CT Images Using TwoStage Learning

    Yong Luo1, Xiaojie Li2, Chao Luo2, Feng Wang1, Xi Wu2, Imran Mumtaz3, Cheng Yi1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1771-1780, 2020, DOI:10.32604/cmc.2020.010069 - 20 August 2020

    Abstract Tissue segmentation is a fundamental and important task in nasopharyngeal images analysis. However, it is a challenging task to accurately and quickly segment various tissues in the nasopharynx region due to the small difference in gray value between tissues in the nasopharyngeal image and the complexity of the tissue structure. In this paper, we propose a novel tissue segmentation approach based on a two-stage learning framework and U-Net. In the proposed methodology, the network consists of two segmentation modules. The first module performs rough segmentation and the second module performs accurate segmentation. Considering the training… More >

  • Open Access

    ARTICLE

    Identifying Honeypots from ICS Devices Using Lightweight Fuzzy Testing

    Yanbin Sun1, Xiaojun Pan1, Chao Xu2, Penggang Sun2, Quanlong Guan3, Mohan Li1, *, Men Han4

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1723-1737, 2020, DOI:10.32604/cmc.2020.010593 - 20 August 2020

    Abstract The security issues of industrial control systems (ICSs) have become increasingly prevalent. As an important part of ICS security, honeypots and antihoneypots have become the focus of offensive and defensive confrontation. However, research on ICS honeypots still lacks breakthroughs, and it is difficult to simulate real ICS devices perfectly. In this paper, we studied ICS honeypots to identify and address their weaknesses. First, an intelligent honeypot identification framework is proposed, based on which feature data type requirements and feature data acquisition for honeypot identification is studied. Inspired by vulnerability mining, we propose a feature acquisition More >

  • Open Access

    ARTICLE

    Paillier-Based Fuzzy Multi-Keyword Searchable Encryption Scheme with Order-Preserving

    Xiehua Li1,*, Fang Li1, Jie Jiang1, Xiaoyu Mei2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1707-1721, 2020, DOI:10.32604/cmc.2020.011227 - 20 August 2020

    Abstract Efficient multi-keyword fuzzy search over encrypted data is a desirable technology for data outsourcing in cloud storage. However, the current searchable encryption solutions still have deficiencies in search efficiency, accuracy and multiple data owner support. In this paper, we propose an encrypted data searching scheme that can support multiple keywords fuzzy search with order preserving (PMS). First, a new spelling correction algorithm-(Possibility-Levenshtein based Spelling Correction) is proposed to correct user input errors, so that fuzzy keywords input can be supported. Second, Paillier encryption is introduced to calculate encrypted relevance score of multiple keywords for order More >

  • Open Access

    ARTICLE

    An Improved Deep Fusion CNN for Image Recognition

    Rongyu Chen1, Lili Pan1, *, Cong Li1, Yan Zhou1, Aibin Chen1, Eric Beckman2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1691-1706, 2020, DOI:10.32604/cmc.2020.011706 - 20 August 2020

    Abstract With the development of Deep Convolutional Neural Networks (DCNNs), the extracted features for image recognition tasks have shifted from low-level features to the high-level semantic features of DCNNs. Previous studies have shown that the deeper the network is, the more abstract the features are. However, the recognition ability of deep features would be limited by insufficient training samples. To address this problem, this paper derives an improved Deep Fusion Convolutional Neural Network (DF-Net) which can make full use of the differences and complementarities during network learning and enhance feature expression under the condition of limited… More >

  • Open Access

    ARTICLE

    A Novel Method for Node Connectivity with Adaptive Dragonfly Algorithm and Graph-Based m-Connection Establishment in MANET

    S. B. Manoojkumaar1, *, C. Poongodi2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1649-1670, 2020, DOI:10.32604/cmc.2020.010781 - 20 August 2020

    Abstract Maximizing network lifetime is measured as the primary issue in Mobile Adhoc Networks (MANETs). In geographically routing based models, packet transmission seems to be more appropriate in dense circumstances. The involvement of the Heuristic model directly is not appropriate to offer an effectual solution as it becomes NP-hard issues; therefore investigators concentrate on using Meta-heuristic approaches. Dragonfly Optimization (DFO) is an effective meta-heuristic approach to resolve these problems by providing optimal solutions. Moreover, Meta-heuristic approaches (DFO) turn to be slower in convergence problems and need proper computational time while expanding network size. Thus, DFO is More >

  • Open Access

    ARTICLE

    An Adjust Duty Cycle Method for Optimized Congestion Avoidance and Reducing Delay for WSNs

    Ting Xu1, Ming Zhao1, Xin Yao1, *, Kun He2

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1605-1624, 2020, DOI:10.32604/cmc.2020.011458 - 20 August 2020

    Abstract With the expansion of the application range and network scale of wireless sensor networks in recent years, WSNs often generate data surges and delay queues during the transmission process, causing network paralysis, even resulting in local or global congestion. In this paper, a dynamically Adjusted Duty Cycle for Optimized Congestion based on a real-time Queue Length (ADCOC) scheme is proposed. In order to improve the resource utilization rate of network nodes, we carried out optimization analysis based on the theory and applied it to the adjustment of the node’s duty cycle strategy. Using this strategy… More >

  • Open Access

    ARTICLE

    A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies

    Ning Liu1, Fan Yang1, *, Xi Xiong1, 2, Yan Chang1, Shibin Zhang1

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1559-1570, 2020, DOI:10.32604/cmc.2020.010562 - 20 August 2020

    Abstract Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system. The trust management system evaluates, manages, and shares users’ trust values. The service provider (SP) members of the federation system rely on users’ trust values to determine which type and quality of service will be provided to the users. While identity federation systems have the potential to help federated users save time and energy and improve service experience, the benefits also come with significant privacy risks. So far, there has been little discussion about the privacy protection of… More >

  • Open Access

    ARTICLE

    Blockzone: A Decentralized and Trustworthy Data Plane for DNS

    Ning Hu1, Shi Yin1, Shen Su1, *, Xudong Jia1, Qiao Xiang2, Hao Liu3

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1531-1557, 2020, DOI:10.32604/cmc.2020.010949 - 20 August 2020

    Abstract The domain name system (DNS) provides a mapping service between memorable names and numerical internet protocol addresses, and it is a critical infrastructure of the Internet. The authenticity of DNS resolution results is crucial for ensuring the accessibility of Internet services. Hundreds of supplementary specifications of protocols have been proposed to compensate for the security flaws of DNS. However, DNS security incidents still occur frequently. Although DNS is a distributed system, for a specified domain name, only authorized authoritative servers can resolve it. Other servers must obtain the resolution result through a recursive or iterative… More >

Displaying 12191-12200 on page 1220 of 17377. Per Page