Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (465)
  • Open Access

    REVIEW

    A Detailed Review of Current AI Solutions for Enhancing Security in Internet of Things Applications

    Arshiya Sajid Ansari1,*, Ghadir Altuwaijri2, Fahad Alodhyani1, Moulay Ibrahim El-Khalil Ghembaza3, Shahabas Manakunnath Devasam Paramb3, Mohammad Sajid Mohammadi3

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 3713-3752, 2025, DOI:10.32604/cmc.2025.064027 - 19 May 2025

    Abstract IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication, processing, and real-time monitoring across diverse applications. Due to their heterogeneous nature and constrained resources, as well as the growing trend of using smart gadgets, there are privacy and security issues that are not adequately managed by conventional security measures. This review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT ecosystems. The intersection of AI technologies, including ML, and blockchain, with IoT privacy and security is systematically examined, focusing on their efficacy in addressing… More >

  • Open Access

    ARTICLE

    A Multi-Layers Information Fused Deep Architecture for Skin Cancer Classification in Smart Healthcare

    Veena Dillshad1, Muhammad Attique Khan2,*, Muhammad Nazir1, Jawad Ahmad2, Dina Abdulaziz AlHammadi3, Taha Houda2, Hee-Chan Cho4, Byoungchol Chang5,*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5299-5321, 2025, DOI:10.32604/cmc.2025.063851 - 19 May 2025

    Abstract Globally, skin cancer is a prevalent form of malignancy, and its early and accurate diagnosis is critical for patient survival. Clinical evaluation of skin lesions is essential, but several challenges, such as long waiting times and subjective interpretations, make this task difficult. The recent advancement of deep learning in healthcare has shown much success in diagnosing and classifying skin cancer and has assisted dermatologists in clinics. Deep learning improves the speed and precision of skin cancer diagnosis, leading to earlier prediction and treatment. In this work, we proposed a novel deep architecture for skin cancer… More >

  • Open Access

    ARTICLE

    Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection

    Sulaiman Al Amro*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4623-4658, 2025, DOI:10.32604/cmc.2025.063734 - 19 May 2025

    Abstract The rapid proliferation of Internet of Things (IoT) devices has heightened security concerns, making intrusion detection a pivotal challenge in safeguarding these networks. Traditional centralized Intrusion Detection Systems (IDS) often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems. To address these challenges, we propose an innovative privacy-preserving approach leveraging Federated Learning (FL) for distributed intrusion detection. Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates, ensuring enhanced privacy and scalability without compromising detection accuracy.… More >

  • Open Access

    REVIEW

    Blockchain Integration in IoT: Applications, Opportunities, and Challenges

    Mozhgan Gholami1, Ali Ghaffari1,2,3,*, Nahideh Derakhshanfard1, Nadir iBRAHIMOĞLU4, Ali Asghar Pourhaji Kazem2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1561-1605, 2025, DOI:10.32604/cmc.2025.063304 - 16 April 2025

    Abstract The Internet has been enhanced recently by blockchain and Internet of Things (IoT) networks. The Internet of Things is a network of various sensor-equipped devices. It gradually integrates the Internet, sensors, and cloud computing. Blockchain is based on encryption algorithms, which are shared database technologies on the Internet. Blockchain technology has grown significantly because of its features, such as flexibility, support for integration, anonymity, decentralization, and independent control. Computational nodes in the blockchain network are used to verify online transactions. However, this integration creates scalability, interoperability, and security challenges. Over the last decade, several advancements… More >

  • Open Access

    ARTICLE

    A Tolerant and Energy Optimization Approach for Internet of Things to Enhance the QoS Using Adaptive Blended Marine Predators Algorithm

    Vijaya Krishna Akula1,*, Tan Kuan Tak2, Pravin Ramdas Kshirsagar3, Shrikant Vijayrao Sonekar4, Gopichand Ginnela5

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2449-2479, 2025, DOI:10.32604/cmc.2025.061486 - 16 April 2025

    Abstract The rapid expansion of Internet of Things (IoT) networks has introduced challenges in network management, primarily in maintaining energy efficiency and robust connectivity across an increasing array of devices. This paper introduces the Adaptive Blended Marine Predators Algorithm (AB-MPA), a novel optimization technique designed to enhance Quality of Service (QoS) in IoT systems by dynamically optimizing network configurations for improved energy efficiency and stability. Our results represent significant improvements in network performance metrics such as energy consumption, throughput, and operational stability, indicating that AB-MPA effectively addresses the pressing needs of modern IoT environments. Nodes are More >

  • Open Access

    ARTICLE

    GMS: A Novel Method for Detecting Reentrancy Vulnerabilities in Smart Contracts

    Dawei Xu1,2, Fan Huang1, Jiaxin Zhang1, Yunfang Liang1, Baokun Zheng3,*, Jian Zhao1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2207-2220, 2025, DOI:10.32604/cmc.2025.061455 - 16 April 2025

    Abstract With the rapid proliferation of Internet of Things (IoT) devices, ensuring their communication security has become increasingly important. Blockchain and smart contract technologies, with their decentralized nature, provide strong security guarantees for IoT. However, at the same time, smart contracts themselves face numerous security challenges, among which reentrancy vulnerabilities are particularly prominent. Existing detection tools for reentrancy vulnerabilities often suffer from high false positive and false negative rates due to their reliance on identifying patterns related to specific transfer functions. To address these limitations, this paper proposes a novel detection method that combines pattern matching… More >

  • Open Access

    ARTICLE

    Intrusion Detection in NSL-KDD Dataset Using Hybrid Self-Organizing Map Model

    Noveela Iftikhar1, Mujeeb Ur Rehman1, Mumtaz Ali Shah2, Mohammed J. F. Alenazi3, Jehad Ali4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 639-671, 2025, DOI:10.32604/cmes.2025.062788 - 11 April 2025

    Abstract Intrusion attempts against Internet of Things (IoT) devices have significantly increased in the last few years. These devices are now easy targets for hackers because of their built-in security flaws. Combining a Self-Organizing Map (SOM) hybrid anomaly detection system for dimensionality reduction with the inherited nature of clustering and Extreme Gradient Boosting (XGBoost) for multi-class classification can improve network traffic intrusion detection. The proposed model is evaluated on the NSL-KDD dataset. The hybrid approach outperforms the baseline line models, Multilayer perceptron model, and SOM-KNN (k-nearest neighbors) model in precision, recall, and F1-score, highlighting the proposed More >

  • Open Access

    ARTICLE

    Privacy-Aware Federated Learning Framework for IoT Security Using Chameleon Swarm Optimization and Self-Attentive Variational Autoencoder

    Saad Alahmari1,*, Abdulwhab Alkharashi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 849-873, 2025, DOI:10.32604/cmes.2025.062549 - 11 April 2025

    Abstract The Internet of Things (IoT) is emerging as an innovative phenomenon concerned with the development of numerous vital applications. With the development of IoT devices, huge amounts of information, including users’ private data, are generated. IoT systems face major security and data privacy challenges owing to their integral features such as scalability, resource constraints, and heterogeneity. These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data, creating an attractive opportunity for cyberattacks. To address these challenges, artificial intelligence (AI) techniques, such as machine learning (ML) and deep learning (DL),… More >

  • Open Access

    ARTICLE

    A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations

    Sungbum Kim1, Gwangsik Lee2, Jian Song2, Insoo Lee2, Taeshik Shon3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 661-683, 2025, DOI:10.32604/cmc.2025.063687 - 26 March 2025

    Abstract The smart home platform integrates with Internet of Things (IoT) devices, smartphones, and cloud servers, enabling seamless and convenient services. It gathers and manages extensive user data, including personal information, device operations, and patterns of user behavior. Such data plays an essential role in criminal investigations, highlighting the growing importance of specialized smart home forensics. Given the rapid advancement in smart home software and hardware technologies, many companies are introducing new devices and services that expand the market. Consequently, scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home… More >

  • Open Access

    ARTICLE

    Software Defined Range-Proof Authentication Mechanism for Untraceable Digital ID

    So-Eun Jeon1, Yeon-Ji Lee2, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3213-3228, 2025, DOI:10.32604/cmes.2025.062082 - 03 March 2025

    Abstract The Internet of Things (IoT) is extensively applied across various industrial domains, such as smart homes, factories, and intelligent transportation, becoming integral to daily life. Establishing robust policies for managing and governing IoT devices is imperative. Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols. Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations, which are impractical for lightweight devices. To address this, our study introduces the privacy-preserving software-defined range proof (SDRP) model, which achieves secure authentication with low complexity. SDRP minimizes the More >

Displaying 1-10 on page 1 of 465. Per Page