Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    FPSblo: A Blockchain Network Transmission Model Utilizing Farthest Point Sampling

    Longle Cheng1,2, Xiru Li1, Shiyu Fang2, Wansu Pan1, He Zhao1,*, Haibo Tan1, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2491-2509, 2024, DOI:10.32604/cmc.2024.047166

    Abstract Peer-to-peer (P2P) overlay networks provide message transmission capabilities for blockchain systems. Improving data transmission efficiency in P2P networks can greatly enhance the performance of blockchain systems. However, traditional blockchain P2P networks face a common challenge where there is often a mismatch between the upper-layer traffic requirements and the underlying physical network topology. This mismatch results in redundant data transmission and inefficient routing, severely constraining the scalability of blockchain systems. To address these pressing issues, we propose FPSblo, an efficient transmission method for blockchain networks. Our inspiration for FPSblo stems from the Farthest Point Sampling (FPS) algorithm, a well-established technique widely… More >

  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More >

Displaying 1-10 on page 1 of 5. Per Page