Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (28)
  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    ARTICLE

    Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory

    S. Kanmani1,*, M. Murali2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2583-2598, 2023, DOI:10.32604/csse.2023.037265

    Abstract The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks (DCN). As the network has the characteristics like decentralized and dynamic, few nodes in the network may not associate with other nodes. These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes. Namely, the nodes cause congestion, high delay, security concerns, and resource depletion. This study presents an effective selfish node detection method to address these problems. The Price of Anarchy (PoA) and the Price of Stability (PoS) in Game Theory with the Presence of… More >

  • Open Access

    ARTICLE

    The Cloud Manufacturing Resource Scheduling Optimization Method Based on Game Theory

    Xiaoxuan Yang*, Zhou Fang

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 229-243, 2022, DOI:10.32604/jai.2022.035368

    Abstract In order to optimize resource integration and optimal scheduling problems in the cloud manufacturing environment, this paper proposes to use load balancing, service cost and service quality as optimization goals for resource scheduling, however, resource providers have resource utilization requirements for cloud manufacturing platforms. In the process of resource optimization scheduling, the interests of all parties have conflicts of interest, which makes it impossible to obtain better optimization results for resource scheduling. Therefore, a multithreaded auto-negotiation method based on the Stackelberg game is proposed to resolve conflicts of interest in the process of resource scheduling. The cloud manufacturing platform first… More >

  • Open Access

    ARTICLE

    Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’ Dilemma

    Khaled M. Suwais*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2685-2704, 2023, DOI:10.32604/cmc.2023.036161

    Abstract Data encryption is essential in securing exchanged data between connected parties. Encryption is the process of transforming readable text into scrambled, unreadable text using secure keys. Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption. Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological, social or physical behaviours. One technique is to utilise the behavioural aspects of game theory in a stream cipher. In this paper, we introduce an enhanced Deoxyribonucleic acid (DNA)-coded stream cipher based on an iterated n-player… More >

  • Open Access

    ARTICLE

    Energy-Efficient Clustering Using Optimization with Locust Game Theory

    P. Kavitha Rani1, Hee-Kwon Chae2, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2591-2605, 2023, DOI:10.32604/iasc.2023.033697

    Abstract Wireless sensor networks (WSNs) are made up of several sensors located in a specific area and powered by a finite amount of energy to gather environmental data. WSNs use sensor nodes (SNs) to collect and transmit data. However, the power supplied by the sensor network is restricted. Thus, SNs must store energy as often as to extend the lifespan of the network. In the proposed study, effective clustering and longer network lifetimes are achieved using multi-swarm optimization (MSO) and game theory based on locust search (LS-II). In this research, MSO is used to improve the optimum routing, while the LS-II… More >

  • Open Access

    ARTICLE

    Behavioral Decision-Making of Key Stakeholders in Public-Private Partnerships: A Hybrid Method and Benefit Distribution Study

    Guoshuai Sun1,2,3, Wanyi Zhang1, Jiuying Dong4,*, Shuping Wan2, Jiao Feng5

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2895-2934, 2023, DOI:10.32604/cmes.2023.025652

    Abstract Public-private partnerships (PPPs) have been used by governments around the world to procure and construct infrastructural amenities. It relies on private sector expertise and funding to achieve this lofty objective. However, given the uncertainties of project management, transparency, accountability, and expropriation, this phenomenon has gained tremendous attention in recent years due to the important role it plays in curbing infrastructural deficits globally. Interestingly, the reasonable benefit distribution scheme in a PPP project is related to the behavior decision-making of the government and social capital, as well as the performance of the project. In this paper, the government and social capital… More >

  • Open Access

    ARTICLE

    Edge-Cloud Computing for Scheduling the Energy Consumption in Smart Grid

    Abdulaziz Alorf*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 273-286, 2023, DOI:10.32604/csse.2023.035437

    Abstract Nowadays, smart electricity grids are managed through advanced tools and techniques. The advent of Artificial Intelligence (AI) and network technology helps to control the energy demand. These advanced technologies can resolve common issues such as blackouts, optimal energy generation costs, and peak-hours congestion. In this paper, the residential energy demand has been investigated and optimized to enhance the Quality of Service (QoS) to consumers. The energy consumption is distributed throughout the day to fulfill the demand in peak hours. Therefore, an Edge-Cloud computing-based model is proposed to schedule the energy demand with reward-based energy consumption. This model gives priority to… More >

  • Open Access

    ARTICLE

    Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems: A Zero-Sum Game Approach

    Yanqiu Chen, Xiaopeng Ji*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 531-553, 2023, DOI:10.32604/cmes.2023.024531

    Abstract Non-orthogonal multiple access technology (NOMA), as a potentially promising technology in the 5G/B5G era, suffers from ubiquitous security threats due to the broadcast nature of the wireless medium. In this paper, we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security, respectively. To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper, their interactions are modeled as a two-person zero-sum game. The existence of the Nash equilibrium of the proposed game models is proved, and the pure strategy Nash equilibrium and mixed-strategy Nash… More >

  • Open Access

    ARTICLE

    Efficient Power Control for UAV Based on Trajectory and Game Theory

    Fadhil Mukhlif1,*, Ashraf Osman Ibrahim2, Norafida Ithnin1, Roobaea Alroobaea3, Majed Alsafyani3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5589-5606, 2023, DOI:10.32604/cmc.2023.034323

    Abstract Due to the fact that network space is becoming more limited, the implementation of ultra-dense networks (UDNs) has the potential to enhance not only network coverage but also network throughput. Unmanned Aerial Vehicle (UAV) communications have recently garnered a lot of attention due to the fact that they are extremely versatile and may be applied to a wide variety of contexts and purposes. A cognitive UAV is proposed as a solution for the Internet of Things ground terminal’s wireless nodes in this article. In the IoT system, the UAV is utilised not only to determine how the resources should be… More >

  • Open Access

    REVIEW

    A Review of the Current Task Offloading Algorithms, Strategies and Approach in Edge Computing Systems

    Abednego Acheampong1, Yiwen Zhang1,*, Xiaolong Xu2, Daniel Appiah Kumah2

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.1, pp. 35-88, 2023, DOI:10.32604/cmes.2022.021394

    Abstract Task offloading is an important concept for edge computing and the Internet of Things (IoT) because computationintensive tasks must be offloaded to more resource-powerful remote devices. Task offloading has several advantages, including increased battery life, lower latency, and better application performance. A task offloading method determines whether sections of the full application should be run locally or offloaded for execution remotely. The offloading choice problem is influenced by several factors, including application properties, network conditions, hardware features, and mobility, influencing the offloading system’s operational environment. This study provides a thorough examination of current task offloading and resource allocation in edge… More >

Displaying 1-10 on page 1 of 28. Per Page