Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (291)
  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser… More >

  • Open Access

    ARTICLE

    CFD-Based Optimization of a Shell-and-Tube Heat Exchanger

    Juanjuan Wang*, Jiangping Nan, Yanan Wang

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.11, pp. 2761-2775, 2023, DOI:10.32604/fdmp.2023.021175

    Abstract The main objective of this study is the technical optimization of a Shell-and-Tube Heat Exchanger (STHE). In order to do so, a simulation model is introduced that takes into account the related gas-phase circulation. Then, simulation verification experiments are designed in order to validate the model. The results show that the temperature field undergoes strong variations in time when an inlet wind speed of 6 m/s is considered, while the heat transfer error reaches a minimum of 5.1%. For an inlet velocity of 9 m/s, the heat transfer drops to the lowest point, while the heat transfer error reaches a… More >

  • Open Access

    REVIEW

    Phishing Attacks in Social Engineering: A Review

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable, Justice Kwame Appati, Ebenezer Essel Mensah

    Journal of Cyber Security, Vol.4, No.4, pp. 239-267, 2022, DOI:10.32604/jcs.2023.041095

    Abstract Organisations closed their offices and began working from home online to prevent the spread of the COVID-19 virus. This shift in work culture coincided with increased online use during the same period. As a result, the rate of cybercrime has skyrocketed. This study examines the approaches, techniques, and countermeasures of Social Engineering and phishing in this context. The study discusses recent trends in the existing approaches for identifying phishing assaults. We explore social engineering attacks, categorise them into types, and offer both technical and social solutions for countering phishing attacks which makes this paper different from similar works that mainly… More >

  • Open Access

    ARTICLE

    Evaluation of IoT Measurement Solutions from a Metrology Perspective

    Donatien Koulla Moulla1,2,*, Ernest Mnkandla1, Alain Abran3

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2455-2479, 2023, DOI:10.32604/csse.2023.039736

    Abstract To professionally plan and manage the development and evolution of the Internet of Things (IoT), researchers have proposed several IoT performance measurement solutions. IoT performance measurement solutions can be very valuable for managing the development and evolution of IoT systems, as they provide insights into performance issues, resource optimization, predictive maintenance, security, reliability, and user experience. However, there are several issues that can impact the accuracy and reliability of IoT performance measurements, including lack of standardization, complexity of IoT systems, scalability, data privacy, and security. While previous studies proposed several IoT measurement solutions in the literature, they did not evaluate… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    TUTORIAL

    Loss Factors and their Effect on Resonance Peaks in Mechanical Systems

    Roman Vinokur*

    Sound & Vibration, Vol.57, pp. 1-13, 2023, DOI:10.32604/sv.2023.041784

    Abstract The loss factors and their effects on the magnitude and frequency of resonance peaks in various mechanical systems are reviewed for acoustic, vibration, and vibration fatigue applications. The main trends and relationships were obtained for linear mechanical models with hysteresis damping. The well-known features (complex module of elasticity, total loss factor, etc.) are clarified for practical engineers and students, and new results are presented (in particular, for 2-DOF in-series models with hysteresis friction). The results are of both educational and practical interest and may be applied for NVH analysis and testing, mechanical and aeromechanical design, and noise and vibration control… More >

  • Open Access

    EDITORIAL

    Bio-Inspired Optimization in Engineering and Sciences

    Yudong Zhang1,*, Huiling Chen2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1065-1067, 2023, DOI:10.32604/cmes.2023.029710

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    New Configurations of the Fuzzy Fractional Differential Boussinesq Model with Application in Ocean Engineering and Their Analysis in Statistical Theory

    Yu-Ming Chu1, Saima Rashid2,*, Shazia Karim3, Anam Sultan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 1573-1611, 2023, DOI:10.32604/cmes.2023.027724

    Abstract The fractional-order Boussinesq equations (FBSQe) are investigated in this work to see if they can effectively improve the situation where the shallow water equation cannot directly handle the dispersion wave. The fuzzy forms of analytical FBSQe solutions are first derived using the Adomian decomposition method. It also occurs on the sea floor as opposed to at the functionality. A set of dynamical partial differential equations (PDEs) in this article exemplify an unconfined aquifer flow implication. This methodology can accurately simulate climatological intrinsic waves, so the ripples are spread across a large demographic zone. The Aboodh transform merged with the mechanism… More >

  • Open Access

    ARTICLE

    Experimental Study on the Thermal Performances of a Tube-Type Indirect Evaporative Cooler

    Tiezhu Sun*, Huan Sun, Tingzheng Tang, Yongcheng Yan, Peixuan Li

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.10, pp. 2519-2531, 2023, DOI:10.32604/fdmp.2023.027118

    Abstract The so-called indirect evaporative cooling technology is widely used in air conditioning applications. The thermal characterization of tube-type indirect evaporative coolers, however, still presents challenges which need to be addressed to make this technology more reliable and easy to implement. This experimental study deals with the performances of a tube-type indirect evaporative cooler based on an aluminum tube with a 10 mm diameter. In particular, the required tests were carried out considering a range of dry-bulb temperatures between 16°C and 18°C and a temperature difference between the wet-bulb and dry-bulb temperature of 2°C∼4°C. The integrated convective heat transfer coefficient inside the… More > Graphic Abstract

    Experimental Study on the Thermal Performances of a Tube-Type Indirect Evaporative Cooler

  • Open Access

    ARTICLE

    EXERGY ANALYSIS IN ENERGY SYSTEMS: FUNDAMENTALS AND APPLICATION

    Hamidreza Shabgarda,* , Amir Faghrib

    Frontiers in Heat and Mass Transfer, Vol.12, pp. 1-16, 2019, DOI:10.5098/hmt.12.9

    Abstract Fundamentals of exergy analysis in energy systems are reviewed and presented in a cohesive and general manner for the study of energy systems. The exergy analysis is applied to several engineering systems and processes, namely fuel cells, latent heat thermal energy storage, heat exchangers and thermal desalination systems to obtain insight on the best optimization strategies as well as the theoretical limits of performance. The various sources of irreversibility and optimal operating conditions are presented for relevant applications. It is also shown that for some systems the exergy efficiency as a function of a given parameter may have opposite trend… More >

Displaying 21-30 on page 3 of 291. Per Page