Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    Monitoring Peer-to-Peer Botnets: Requirements, Challenges, and Future Works

    Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, Alwan Ahmed Abdulrahman Alwan, Shankar Karuppayah*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3375-3398, 2023, DOI:10.32604/cmc.2023.036587

    Abstract The cyber-criminal compromises end-hosts (bots) to configure a network of bots (botnet). The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer (P2P) networks. The P2P botnets leverage the privileges of the decentralized nature of P2P networks. Consequently, the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures. Some P2P botnets are smarter to be stealthy in their Command-and-Control mechanisms (C2) and elude the standard discovery mechanisms. Therefore, the other side of this cyberwar is the monitor. The P2P botnet monitoring is an exacting mission… More >

  • Open Access

    ARTICLE

    Peer-to-Peer Energy Trading Method of Multi-Virtual Power Plants Based on Non-Cooperative Game

    Jingjing Bai*, Hongyi Zhou, Zheng Xu, Yu Zhong

    Energy Engineering, Vol.120, No.5, pp. 1163-1183, 2023, DOI:10.32604/ee.2023.025553

    Abstract The current electricity market fails to consider the energy consumption characteristics of transaction subjects such as virtual power plants. Besides, the game relationship between transaction subjects needs to be further explored. This paper proposes a Peer-to-Peer energy trading method for multi-virtual power plants based on a non-cooperative game. Firstly, a coordinated control model of public buildings is incorporated into the scheduling framework of the virtual power plant, considering the energy consumption characteristics of users. Secondly, the utility functions of multiple virtual power plants are analyzed, and a non-cooperative game model is established to explore the game relationship between electricity sellers… More >

  • Open Access

    ARTICLE

    Integrated Privacy Preserving Healthcare System Using Posture-Based Classifier in Cloud

    C. Santhosh Kumar1, K. Vishnu Kumar2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2893-2907, 2023, DOI:10.32604/iasc.2023.029669

    Abstract Privacy-preserving online disease prediction and diagnosis are critical issues in the emerging edge-cloud-based healthcare system. Online patient data processing from remote places may lead to severe privacy problems. Moreover, the existing cloud-based healthcare system takes more latency and energy consumption during diagnosis due to offloading of live patient data to remote cloud servers. Solve the privacy problem. The proposed research introduces the edge-cloud enabled privacy-preserving healthcare system by exploiting additive homomorphic encryption schemes. It can help maintain the privacy preservation and confidentiality of patients’ medical data during diagnosis of Parkinson’s disease. In addition, the energy and delay aware computational offloading… More >

  • Open Access

    ARTICLE

    Windows 10's Browser Forensic Analysis for Tracing P2P Networks’ Anonymous Attacks

    Saima Kauser1, Tauqeer Safdar Malik1,*, Mohd Hilmi Hasan2, Emelia Akashah P. Akhir2, Syed Muhammad Husnain Kazmi3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1251-1273, 2022, DOI:10.32604/cmc.2022.022475

    Abstract A web browser is the most basic tool for accessing the internet from any of the machines/equipment. Recently, data breaches have been reported frequently from users who are concerned about their personal information, as well as threats from criminal actors. Giving loss of data and information to an innocent user comes under the jurisdiction of cyber-attack. These kinds of cyber-attacks are far more dangerous when it comes to the many types of devices employed in an internet of things (IoT) environment. Continuous surveillance of IoT devices and forensic tools are required to overcome the issues pertaining to secure data and… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Predictive Model for P2P Energy Trading in TEM

    Pudi Sekhar1, T. J. Benedict Jose2, Velmurugan Subbiah Parvathy3, E. Laxmi Lydia4, Seifedine Kadry5, Kuntha Pin6, Yunyoung Nam7,*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1473-1487, 2022, DOI:10.32604/cmc.2022.022110

    Abstract With the incorporation of distributed energy systems in the electric grid, transactive energy market (TEM) has become popular in balancing the demand as well as supply adaptively over the grid. The classical grid can be updated to the smart grid by the integration of Information and Communication Technology (ICT) over the grids. The TEM allows the Peer-to-Peer (P2P) energy trading in the grid that effectually connects the consumer and prosumer to trade energy among them. At the same time, there is a need to predict the load for effectual P2P energy trading and can be accomplished by the use of… More >

  • Open Access

    ARTICLE

    Optimal Load Forecasting Model for Peer-to-Peer Energy Trading in Smart Grids

    Lijo Jacob Varghese1, K. Dhayalini2, Suma Sira Jacob3, Ihsan Ali4,*, Abdelzahir Abdelmaboud5, Taiseer Abdalla Elfadil Eisa6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1053-1067, 2022, DOI:10.32604/cmc.2022.019435

    Abstract Peer-to-Peer (P2P) electricity trading is a significant research area that offers maximum fulfilment for both prosumer and consumer. It also decreases the quantity of line loss incurred in Smart Grid (SG). But, uncertainities in demand and supply of the electricity might lead to instability in P2P market for both prosumer and consumer. In recent times, numerous Machine Learning (ML)-enabled load predictive techniques have been developed, while most of the existing studies did not consider its implicit features, optimal parameter selection, and prediction stability. In order to overcome fulfill this research gap, the current research paper presents a new Multi-Objective Grasshopper… More >

  • Open Access

    ARTICLE

    Mathematical Model Validation of Search Protocols in MP2P Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Saeed Rubaiee5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1807-1829, 2021, DOI:10.32604/cmc.2021.016692

    Abstract Broadcasting is a basic technique in Mobile ad-hoc network (MANET), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique, floods the network with query messages, while the random walk technique operates by contacting the subsets of every node’s neighbors at each step, thereby restricting the search space. One of the key challenges in an ad-hoc network is the resource or content discovery problem which is about locating the queried resource. Many… More >

  • Open Access

    ARTICLE

    Analytical Comparison of Resource Search Algorithms in Non-DHT Mobile Peer-to-Peer Networks

    Ajay Arunachalam1,*, Vinayakumar Ravi2, Moez Krichen3, Roobaea Alroobaea4, Jehad Saad Alqurni5

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 983-1001, 2021, DOI:10.32604/cmc.2021.015371

    Abstract One of the key challenges in ad-hoc networks is the resource discovery problem. How efficiently & quickly the queried resource/object can be resolved in such a highly dynamic self-evolving network is the underlying question? Broadcasting is a basic technique in the Mobile Ad-hoc Networks (MANETs), and it refers to sending a packet from one node to every other node within the transmission range. Flooding is a type of broadcast where the received packet is retransmitted once by every node. The naive flooding technique floods the network with query messages, while the random walk scheme operates by contacting subsets of each… More >

  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and complexity, more research is necessary.… More >

Displaying 1-10 on page 1 of 11. Per Page