Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (688)
  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were used to… More >

  • Open Access

    ARTICLE

    Adaptive Network Sustainability and Defense Based on Artificial Bees Colony Optimization Algorithm for Nature Inspired Cyber Security

    Chirag Ganguli1, Shishir Kumar Shandilya2, Michal Gregus3, Oleh Basystiuk4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 739-758, 2024, DOI:10.32604/csse.2024.042607

    Abstract Cyber Defense is becoming a major issue for every organization to keep business continuity intact. The presented paper explores the effectiveness of a meta-heuristic optimization algorithm-Artificial Bees Colony Algorithm (ABC) as an Nature Inspired Cyber Security mechanism to achieve adaptive defense. It experiments on the Denial-Of-Service attack scenarios which involves limiting the traffic flow for each node. Businesses today have adapted their service distribution models to include the use of the Internet, allowing them to effectively manage and interact with their customer data. This shift has created an increased reliance on online services to store vast amounts of confidential customer… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Framework for Security Intrusion Detection

    Fatimah Mudhhi Alanazi*, Bothina Abdelmeneem Elsobky, Shaimaa Aly Elmorsy

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 835-851, 2024, DOI:10.32604/csse.2024.042401

    Abstract Proliferation of technology, coupled with networking growth, has catapulted cybersecurity to the forefront of modern security concerns. In this landscape, the precise detection of cyberattacks and anomalies within networks is crucial, necessitating the development of efficient intrusion detection systems (IDS). This article introduces a framework utilizing the fusion of fuzzy sets with support vector machines (SVM), named FSVM. The core strategy of FSVM lies in calculating the significance of network features to determine their relative importance. Features with minimal significance are prudently disregarded, a method akin to feature selection. This process not only curtails the computational burden of the classification… More >

  • Open Access

    ARTICLE

    A New Malicious Code Classification Method for the Security of Financial Software

    Xiaonan Li1,2, Qiang Wang1, Conglai Fan2,3, Wei Zhan1, Mingliang Zhang4,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 773-792, 2024, DOI:10.32604/csse.2024.039849

    Abstract The field of finance heavily relies on cybersecurity to safeguard its systems and clients from harmful software. The identification of malevolent code within financial software is vital for protecting both the financial system and individual clients. Nevertheless, present detection models encounter limitations in their ability to identify malevolent code and its variations, all while encompassing a multitude of parameters. To overcome these obstacles, we introduce a lean model for classifying families of malevolent code, formulated on Ghost-DenseNet-SE. This model integrates the Ghost module, DenseNet, and the squeeze-and-excitation (SE) channel domain attention mechanism. It substitutes the standard convolutional layer in DenseNet… More >

  • Open Access

    ARTICLE

    Digital Text Document Watermarking Based Tampering Attack Detection via Internet

    Manal Abdullah Alohali1, Muna Elsadig1, Fahd N. Al-Wesabi2, Mesfer Al Duhayyim3, Anwer Mustafa Hilal4,*, Abdelwahed Motwakel4

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 759-771, 2024, DOI:10.32604/csse.2023.037305

    Abstract Owing to the rapid increase in the interchange of text information through internet networks, the reliability and security of digital content are becoming a major research problem. Tampering detection, Content authentication, and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies. The authors’ difficulties were tampering detection, authentication, and integrity verification of the digital contents. This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection (ADMDTW-TAD) via the Internet. The DM concept is exploited in the presented ADMDTW-TAD technique to identify the… More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security and Privacy Architecture for IoT Networks with the Integration of Blockchain

    Sohaib Latif1,*, M. Saad Bin Ilyas1, Azhar Imran2, Hamad Ali Abosaq3, Abdulaziz Alzubaidi4, Vincent Karovič Jr.5

    Intelligent Automation & Soft Computing, Vol.39, No.2, pp. 353-379, 2024, DOI:10.32604/iasc.2024.047080

    Abstract The Internet of Things (IoT) is growing rapidly and impacting almost every aspect of our lives, from wearables and healthcare to security, traffic management, and fleet management systems. This has generated massive volumes of data and security, and data privacy risks are increasing with the advancement of technology and network connections. Traditional access control solutions are inadequate for establishing access control in IoT systems to provide data protection owing to their vulnerability to single-point OF failure. Additionally, conventional privacy preservation methods have high latency costs and overhead for resource-constrained devices. Previous machine learning approaches were also unable to detect denial-of-service… More >

  • Open Access

    ARTICLE

    Monocular Distance Estimated Based on PTZ Camera

    Qirui Zhong1, Xiaogang Cheng2,*, Yuxin Song3, Han Wang2

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3417-3433, 2024, DOI:10.32604/cmc.2024.049992

    Abstract This paper introduces an intelligent computational approach for extracting salient objects from images and estimating their distance information with PTZ (Pan-Tilt-Zoom) cameras. PTZ cameras have found wide applications in numerous public places, serving various purposes such as public security management, natural disaster monitoring, and crisis alarms, particularly with the rapid development of Artificial Intelligence and global infrastructural projects. In this paper, we combine Gauss optical principles with the PTZ camera’s capabilities of horizontal and pitch rotation, as well as optical zoom, to estimate the distance of the object. We present a novel monocular object distance estimation model based on the… More >

  • Open Access

    REVIEW

    Towards Blockchain-Based Secure BGP Routing, Challenges and Future Research Directions

    Qiong Yang1, Li Ma1,2,*, Shanshan Tu1, Sami Ullah3, Muhammad Waqas4,5, Hisham Alasmary6

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2035-2062, 2024, DOI:10.32604/cmc.2024.049970

    Abstract Border Gateway Protocol (BGP) is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations. The BGP protocol exhibits security design defects, such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes, easily triggering prefix hijacking, path forgery, route leakage, and other BGP security threats. Meanwhile, the traditional BGP security mechanism, relying on a public key infrastructure, faces issues like a single point of failure and a single point of trust. The decentralization, anti-tampering, and traceability advantages of blockchain offer… More >

  • Open Access

    ARTICLE

    Enhancing Security and Privacy in Distributed Face Recognition Systems through Blockchain and GAN Technologies

    Muhammad Ahmad Nawaz Ul Ghani1, Kun She1,*, Muhammad Arslan Rauf1, Shumaila Khan2, Javed Ali Khan3, Eman Abdullah Aldakheel4, Doaa Sami Khafaga4

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2609-2623, 2024, DOI:10.32604/cmc.2024.049611

    Abstract The use of privacy-enhanced facial recognition has increased in response to growing concerns about data security and privacy in the digital age. This trend is spurred by rising demand for face recognition technology in a variety of industries, including access control, law enforcement, surveillance, and internet communication. However, the growing usage of face recognition technology has created serious concerns about data monitoring and user privacy preferences, especially in context-aware systems. In response to these problems, this study provides a novel framework that integrates sophisticated approaches such as Generative Adversarial Networks (GANs), Blockchain, and distributed computing to solve privacy concerns while… More >

  • Open Access

    ARTICLE

    Predicting Age and Gender in Author Profiling: A Multi-Feature Exploration

    Aiman1, Muhammad Arshad1,*, Bilal Khan1, Sadique Ahmad2,*, Muhammad Asim2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3333-3353, 2024, DOI:10.32604/cmc.2024.049254

    Abstract Author Profiling (AP) is a subsection of digital forensics that focuses on the detection of the author’s personal information, such as age, gender, occupation, and education, based on various linguistic features, e.g., stylistic, semantic, and syntactic. The importance of AP lies in various fields, including forensics, security, medicine, and marketing. In previous studies, many works have been done using different languages, e.g., English, Arabic, French, etc. However, the research on Roman Urdu is not up to the mark. Hence, this study focuses on detecting the author’s age and gender based on Roman Urdu text messages. The dataset used in this… More >

Displaying 1-10 on page 1 of 688. Per Page