Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    REVIEW

    Unveiling Zero-Click Attacks: Mapping MITRE ATT&CK Framework for Enhanced Cybersecurity

    Md Shohel Rana1,2,3,4,*, Tonmoy Ghosh3, Mohammad Nur Nobi5, Anichur Rahman1,6,*, Andrew H. Sung4

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-38, 2026, DOI:10.32604/cmc.2025.069212 - 10 November 2025

    Abstract Zero-click attacks represent an advanced cybersecurity threat, capable of compromising devices without user interaction. High-profile examples such as Pegasus, Simjacker, Bluebugging, and Bluesnarfing exploit hidden vulnerabilities in software and communication protocols to silently gain access, exfiltrate data, and enable long-term surveillance. Their stealth and ability to evade traditional defenses make detection and mitigation highly challenging. This paper addresses these threats by systematically mapping the tactics and techniques of zero-click attacks using the MITRE ATT&CK framework, a widely adopted standard for modeling adversarial behavior. Through this mapping, we categorize real-world attack vectors and better understand how… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Layered Encryption and Steganography Model for Protecting Secret Messages in MPEG Video Frames

    Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 4995-5013, 2025, DOI:10.32604/cmc.2025.068429 - 23 October 2025

    Abstract Ensuring the secure transmission of secret messages, particularly through video—one of the most widely used media formats—is a critical challenge in the field of information security. Relying on a single-layered security approach is often insufficient for safeguarding sensitive data. This study proposes a triple-lightweight cryptographic and steganographic model that integrates the Hill Cipher Technique (HCT), Rotation Left Digits (RLD), and Discrete Wavelet Transform (DWT) to embed secret messages within video frames securely. The approach begins with encrypting the secret text using a private key matrix (PK1) of size 2 × 2 up to 6 × 6… More >

  • Open Access

    ARTICLE

    Growth Dilatory Effects of PEG and Sucrose on Geranium wallichianum: An In Vitro Approach for Conservation

    Zubair Ashraf1, Yasar Sajjad1,*, Sabaz Ali Khan1, Gulzar Akhtar2, Ahmed Mahmoud Ismail3,4,*, Tarek A. Shalaby3, Bader Alsubaie5, Othman Al-Dossary5

    Phyton-International Journal of Experimental Botany, Vol.94, No.3, pp. 987-1006, 2025, DOI:10.32604/phyton.2025.062351 - 31 March 2025

    Abstract The medicinal herb Geranium wallichianum belongs to the family Geraniaceae. The East Asian Himalayas are its primary habitat. Overexploitation and overharvesting pose a threat to this plant, given its extensive ethnomedical utilization in the community. In Pakistan, its population has already declined by over 75%. Given its critical medicinal importance, urgent conservation efforts are needed to prevent extinction. The aim of the current research was to determine the effectiveness of sucrose and polyethylene glycol (PEG) in decelerating the growth of this medicinally important species. Nodal segments were utilized as explant with varying levels of polyethylene glycol… More >

  • Open Access

    ARTICLE

    Comparison of pegaspargase with concurrent radiation vs. P-GEMOX with sequential radiation in early-stage NK/T-cell lymphoma

    DEMEI FENG1,#, SHENRUI BAI1,#, GUANJUN CHEN1, BIBO FU1, CAILU SONG1, HAILIN TANG1, LIANG WANG2,*, HUA WANG1,*

    Oncology Research, Vol.33, No.4, pp. 965-974, 2025, DOI:10.32604/or.2024.057065 - 19 March 2025

    Abstract Objectives: The optimal treatment strategy for early-stage natural killer/T-cell lymphoma (NKTCL) remains unclear. This study aimed to evaluate and compare the clinical outcomes and adverse events (AEs) associated with two treatment regimens for early-stage NKTCL: pegaspargase with concurrent radiation therapy (P+CCRT) and pegaspargase, gemcitabine, and oxaliplatin (P-GEMOX) with sequential radiation therapy (SERT). Propensity score matching (PSM) was employed to ensure balanced comparison between these regimens. Methods: We assessed the efficacy of P+CCRT from a phase II trial and P-GEMOX combined with SERT using real-world data. PSM was conducted at a 1:1 ratio with a caliper… More >

  • Open Access

    ARTICLE

    Exogenous Alpha-Ketoglutarate (AKG) Modulate Physiological Characteristics, Photosynthesis, Secondary Metabolism and Antioxidant Defense System in Peganum Harmala L. under Nickel Stress

    Marwa Rezgui1,#,*, Wided Ben Ammar1, Muhammad Nazim2,3,#, Walid Soufan4, Chiraz Chaffei Haouari1

    Phyton-International Journal of Experimental Botany, Vol.94, No.1, pp. 137-155, 2025, DOI:10.32604/phyton.2025.058851 - 24 January 2025

    Abstract Nickel (Ni) toxicity significantly impairs plant growth, photosynthesis, and metabolism by inducing oxidative stress. This study evaluates the potential of exogenous Alpha-Ketoglutarate (AKG) in mitigating Ni-induced stress in Peganum harmala L. Seedlings were exposed to 0, 200, 500, and 750 μM NiCl2, with or without AKG supplementation. Under 750 μM Ni stress, dry weight (DW) decreased by 33.7%, tissue water content (TWC) by 39.9%, and chlorophyll a and total chlorophyll levels were reduced by 17% and 15%, respectively. Ni exposure also significantly increased secondary metabolite production, with leaf anthocyanin content rising by 131%, and superoxide dismutase (SOD)… More >

  • Open Access

    ARTICLE

    Restoration of the JPEG Maximum Lossy Compressed Face Images with Hourglass Block-GAN

    Jongwook Si1, Sungyoung Kim2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2893-2908, 2024, DOI:10.32604/cmc.2023.046081 - 26 March 2024

    Abstract In the context of high compression rates applied to Joint Photographic Experts Group (JPEG) images through lossy compression techniques, image-blocking artifacts may manifest. This necessitates the restoration of the image to its original quality. The challenge lies in regenerating significantly compressed images into a state in which these become identifiable. Therefore, this study focuses on the restoration of JPEG images subjected to substantial degradation caused by maximum lossy compression using Generative Adversarial Networks (GAN). The generator in this network is based on the U-Net architecture. It features a new hourglass structure that preserves the characteristics… More >

  • Open Access

    ARTICLE

    Improved Data Stream Clustering Method: Incorporating KD-Tree for Typicality and Eccentricity-Based Approach

    Dayu Xu1,#, Jiaming Lü1,#, Xuyao Zhang2, Hongtao Zhang1,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2557-2573, 2024, DOI:10.32604/cmc.2024.045932 - 27 February 2024

    Abstract Data stream clustering is integral to contemporary big data applications. However, addressing the ongoing influx of data streams efficiently and accurately remains a primary challenge in current research. This paper aims to elevate the efficiency and precision of data stream clustering, leveraging the TEDA (Typicality and Eccentricity Data Analysis) algorithm as a foundation, we introduce improvements by integrating a nearest neighbor search algorithm to enhance both the efficiency and accuracy of the algorithm. The original TEDA algorithm, grounded in the concept of “Typicality and Eccentricity Data Analytics”, represents an evolving and recursive method that requires… More >

  • Open Access

    ARTICLE

    High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification

    Li Liu1, Jing Li1, Yingchun Wu1, Chin-Chen Chang2,*, Anhong Wang1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1415-1432, 2023, DOI:10.32604/csse.2023.040039 - 28 July 2023

    Abstract Data hiding (DH) is an important technology for securely transmitting secret data in networks, and has increasing become a research hotspot throughout the world. However, for Joint photographic experts group (JPEG) images, it is difficult to balance the contradiction among embedded capacity, visual quality and the file size increment in existing data hiding schemes. Thus, to deal with this problem, a high-imperceptibility data hiding for JPEG images is proposed based on direction modification. First, this proposed scheme sorts all of the quantized discrete cosine transform (DCT) block in ascending order according to the number of… More >

  • Open Access

    ARTICLE

    A Deep Learning Driven Feature Based Steganalysis Approach

    Yuchen Li1, Baohong Ling1,2,*, Donghui Hu1, Shuli Zheng1, Guoan Zhang3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2213-2225, 2023, DOI:10.32604/iasc.2023.029983 - 21 June 2023

    Abstract The goal of steganalysis is to detect whether the cover carries the secret information which is embedded by steganographic algorithms. The traditional steganalysis detector is trained on the stego images created by a certain type of steganographic algorithm, whose detection performance drops rapidly when it is applied to detect another type of steganographic algorithm. This phenomenon is called as steganographic algorithm mismatch in steganalysis. To resolve this problem, we propose a deep learning driven feature-based approach. An advanced steganalysis neural network is used to extract steganographic features, different pairs of training images embedded with steganographic More >

  • Open Access

    ARTICLE

    Effect of PEG Incorporation on Physicochemical and in vitro Degradation of PLLA/PDLLA Blends: Application in Biodegradable Implants

    Mochamad Chalid1,*, Gifrandy Gustiraharjo1, Azizah Intan Pangesty1, Alyssa Adyandra1, Yudan Whulanza2, Sugeng Supriadi2

    Journal of Renewable Materials, Vol.11, No.7, pp. 3043-3056, 2023, DOI:10.32604/jrm.2023.026788 - 05 June 2023

    Abstract Polyethylene glycol (PEG) was added at different concentrations to the blend of poly(L-lactic acid) (PLLA) and poly(D,L-lactic acid)(PDLLA) to tailor the properties. The differential scanning calorimetry (DSC) measurement showed that all blends were miscible due to shifting a single glass transition temperature into a lower temperature for increasing PEG content. The DSC, FTIR, and XRD results implied the crystallinity enhancement for PEG content until 8 wt%, then decreased at 12 wt% PEG. The XRD result indicated the homo crystalline phase formation in all blends and no stereocomplex crystal. The in vitro degradation study indicated that… More > Graphic Abstract

    Effect of PEG Incorporation on Physicochemical and <i>in vitro</i> Degradation of PLLA/PDLLA Blends: Application in Biodegradable Implants

Displaying 1-10 on page 1 of 31. Per Page