Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,101)
  • Open Access

    ARTICLE

    Backdoor Malware Detection in Industrial IoT Using Machine Learning

    Maryam Mahsal Khan1, Attaullah Buriro2, Tahir Ahmad3,*, Subhan Ullah4

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4691-4705, 2024, DOI:10.32604/cmc.2024.057648 - 19 December 2024

    Abstract With the ever-increasing continuous adoption of Industrial Internet of Things (IoT) technologies, security concerns have grown exponentially, especially regarding securing critical infrastructures. This is primarily due to the potential for backdoors to provide unauthorized access, disrupt operations, and compromise sensitive data. Backdoors pose a significant threat to the integrity and security of Industrial IoT setups by exploiting vulnerabilities and bypassing standard authentication processes. Hence its detection becomes of paramount importance. This paper not only investigates the capabilities of Machine Learning (ML) models in identifying backdoor malware but also evaluates the impact of balancing the dataset More >

  • Open Access

    ARTICLE

    Modeling and Predictive Analytics of Breast Cancer Using Ensemble Learning Techniques: An Explainable Artificial Intelligence Approach

    Avi Deb Raha1, Fatema Jannat Dihan2, Mrityunjoy Gain1, Saydul Akbar Murad3, Apurba Adhikary2, Md. Bipul Hossain2, Md. Mehedi Hassan1, Taher Al-Shehari4, Nasser A. Alsadhan5, Mohammed Kadrie4, Anupam Kumar Bairagi1,*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4033-4048, 2024, DOI:10.32604/cmc.2024.057415 - 19 December 2024

    Abstract Breast cancer stands as one of the world’s most perilous and formidable diseases, having recently surpassed lung cancer as the most prevalent cancer type. This disease arises when cells in the breast undergo unregulated proliferation, resulting in the formation of a tumor that has the capacity to invade surrounding tissues. It is not confined to a specific gender; both men and women can be diagnosed with breast cancer, although it is more frequently observed in women. Early detection is pivotal in mitigating its mortality rate. The key to curbing its mortality lies in early detection.… More >

  • Open Access

    ARTICLE

    ML-SPAs: Fortifying Healthcare Cybersecurity Leveraging Varied Machine Learning Approaches against Spear Phishing Attacks

    Saad Awadh Alanazi*

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4049-4080, 2024, DOI:10.32604/cmc.2024.057211 - 19 December 2024

    Abstract Spear Phishing Attacks (SPAs) pose a significant threat to the healthcare sector, resulting in data breaches, financial losses, and compromised patient confidentiality. Traditional defenses, such as firewalls and antivirus software, often fail to counter these sophisticated attacks, which target human vulnerabilities. To strengthen defenses, healthcare organizations are increasingly adopting Machine Learning (ML) techniques. ML-based SPA defenses use advanced algorithms to analyze various features, including email content, sender behavior, and attachments, to detect potential threats. This capability enables proactive security measures that address risks in real-time. The interpretability of ML models fosters trust and allows security… More >

  • Open Access

    ARTICLE

    CHART: Intelligent Crime Hotspot Detection and Real-Time Tracking Using Machine Learning

    Rashid Ahmad1, Asif Nawaz1,*, Ghulam Mustafa1, Tariq Ali1, Mehdi Tlija2, Mohammed A. El-Meligy3,4, Zohair Ahmed5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4171-4194, 2024, DOI:10.32604/cmc.2024.056971 - 19 December 2024

    Abstract Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively, predict potential criminal activities, and ensure public safety. Traditional methods of crime analysis often rely on manual, time-consuming processes that may overlook intricate patterns and correlations within the data. While some existing machine learning models have improved the efficiency and accuracy of crime prediction, they often face limitations such as overfitting, imbalanced datasets, and inadequate handling of spatiotemporal dynamics. This research proposes an advanced machine learning framework, CHART (Crime Hotspot Analysis and Real-time Tracking), designed to overcome these challenges. The proposed methodology… More >

  • Open Access

    ARTICLE

    Fake News Detection on Social Media Using Ensemble Methods

    Muhammad Ali Ilyas1, Abdul Rehman2, Assad Abbas1, Dongsun Kim3,*, Muhammad Tahir Naseem4,*, Nasro Min Allah5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4525-4549, 2024, DOI:10.32604/cmc.2024.056291 - 19 December 2024

    Abstract In an era dominated by information dissemination through various channels like newspapers, social media, radio, and television, the surge in content production, especially on social platforms, has amplified the challenge of distinguishing between truthful and deceptive information. Fake news, a prevalent issue, particularly on social media, complicates the assessment of news credibility. The pervasive spread of fake news not only misleads the public but also erodes trust in legitimate news sources, creating confusion and polarizing opinions. As the volume of information grows, individuals increasingly struggle to discern credible content from false narratives, leading to widespread… More >

  • Open Access

    ARTICLE

    Air-Side Heat Transfer Performance Prediction for Microchannel Heat Exchangers Using Data-Driven Models with Dimensionless Numbers

    Long Huang1,2,3,*, Junjia Zou3, Baoqing Liu1, Zhijiang Jin1,2, Jinyuan Qian1

    Frontiers in Heat and Mass Transfer, Vol.22, No.6, pp. 1613-1643, 2024, DOI:10.32604/fhmt.2024.058231 - 19 December 2024

    Abstract This study explores the effectiveness of machine learning models in predicting the air-side performance of microchannel heat exchangers. The data were generated by experimentally validated Computational Fluid Dynamics (CFD) simulations of air-to-water microchannel heat exchangers. A distinctive aspect of this research is the comparative analysis of four diverse machine learning algorithms: Artificial Neural Networks (ANN), Support Vector Machines (SVM), Random Forest (RF), and Gaussian Process Regression (GPR). These models are adeptly applied to predict air-side heat transfer performance with high precision, with ANN and GPR exhibiting notably superior accuracy. Additionally, this research further delves into… More >

  • Open Access

    ARTICLE

    Data-Efficient Image Transformers for Robust Malware Family Classification

    Boadu Nkrumah1,*, Michal Asante1, Gaddafi Adbdul-Salam1, Wofa K. Adu-Gyamfi2

    Journal of Cyber Security, Vol.6, pp. 131-153, 2024, DOI:10.32604/jcs.2024.053954 - 17 December 2024

    Abstract The changing nature of malware poses a cybersecurity threat, resulting in significant financial losses each year. However, traditional antivirus tools for detecting malware based on signatures are ineffective against disguised variations as they have low levels of accuracy. This study introduces Data Efficient Image Transformer-Malware Classifier (DeiT-MC), a system for classifying malware that utilizes Data-Efficient Image Transformers. DeiT-MC treats malware samples as visual data and integrates a newly developed Hybrid GridBay Optimizer (HGBO) for hyperparameter optimization and better model performance under varying malware scenarios. With HGBO, DeiT-MC outperforms the state-of-the-art techniques with a strong accuracy More >

  • Open Access

    PROCEEDINGS

    Deep-Potential Enabled Multiscale Simulation of Interfacial Thermal Transport in Boron Arsenide Heterostructures

    Jing Wu1, E Zhou1, An Huang1, Hongbin Zhang2, Ming Hu3, Guangzhao Qin1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.32, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.012552

    Abstract High thermal conductivity substrate plays a significant role for efficient heat dissipation of electronic devices, and it is urgent to optimize the interfacial thermal resistance. As a novel material with ultra-high thermal conductivity second only to diamond, boron arsenide (BAs) shows promising applications in electronics cooling [1,2]. By adopting multi-scale simulation method driven by machine learning potential, we systematically study the thermal transport properties of boron arsenide, and further investigate the interfacial thermal transport in the GaN-BAs heterostructures. Ultrahigh interfacial thermal conductance of 260 MW m-2K-1 is achieved, which agrees well with experimental measurements, and the More >

  • Open Access

    REVIEW

    Enhancing Cyber Security through Artificial Intelligence and Machine Learning: A Literature Review

    Carlos Merlano*

    Journal of Cyber Security, Vol.6, pp. 89-116, 2024, DOI:10.32604/jcs.2024.056164 - 06 December 2024

    Abstract The constantly increasing degree and frequency of cyber threats require the emergence of flexible and intelligent approaches to systems’ protection. Despite the calls for the use of artificial intelligence (AI) and machine learning (ML) in strengthening cyber security, there needs to be more literature on an integrated view of the application areas, open issues or trends in AI and ML for cyber security. Based on 90 studies, in the following literature review, the author categorizes and systematically analyzes the current research field to fill this gap. The review evidences that, in contrast to rigid rule-based… More >

  • Open Access

    ARTICLE

    Securing Web by Predicting Malicious URLs

    Imran Khan, Meenakshi Megavarnam*

    Journal of Cyber Security, Vol.6, pp. 117-130, 2024, DOI:10.32604/jcs.2024.048332 - 06 December 2024

    Abstract A URL (Uniform Resource Locator) is used to locate a digital resource. With this URL, an attacker can perform a variety of attacks, which can lead to serious consequences for both individuals and organizations. Therefore, attackers create malicious URLs to gain access to an organization’s systems or sensitive information. It is crucial to secure individuals and organizations against these malicious URLs. A combination of machine learning and deep learning was used to predict malicious URLs. This research contributes significantly to the field of cybersecurity by proposing a model that seamlessly integrates the accuracy of machine More >

Displaying 21-30 on page 3 of 1101. Per Page