Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (683)
  • Open Access

    ARTICLE

    A Hybrid Encryption Algorithm for Security Enhancement of Wireless Sensor Networks: A Supervisory Approach to Pipelines

    Omid Mahdi Ebadati E.1, *, Farshad Eshghi2, Amin Zamani1

    CMES-Computer Modeling in Engineering & Sciences, Vol.122, No.1, pp. 323-349, 2020, DOI:10.32604/cmes.2020.08079

    Abstract Transmission pipelines are vulnerable to various accidents and acts of vandalism. Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A wireless sensor network is a wireless network consisting of distributed devices distributed at various distances, which monitors the physical and environmental conditions using sensors. Wireless sensor networks have many uses, including the built-in sensor on the outside of the pipeline or installed to support bridge structures, robotics, healthcare, environmental monitoring, etc. Wireless Sensor networks could be used to monitor the temperature, pressure, leak detection and sabotage of transmission lines. Wireless sensor networks are vulnerable to various… More >

  • Open Access

    ARTICLE

    Increasing Distance Increasing Bits Substitution (IDIBS) Algorithm for Implementation of VTVB Steganography

    Sahib Khan1, *, Arslan Arif1, Syed Tahir Hussain Rizvi2, Nasir Ahmad3

    CMES-Computer Modeling in Engineering & Sciences, Vol.117, No.1, pp. 1-16, 2018, DOI:10.31614/cmes.2018.04141

    Abstract Cryptography and steganography are two important and related fields of infor- mation security. But, steganography is slightly different in the sense that it hides the ex- istence of secret information from unauthorized users. It is one of the most appealing research domains, have applications like copyright protection, data integrity protection and manipulation detection. Several steganography techniques have been proposed in literature. But, in this work a new information hiding algorithm is presented. The proposed technique de-correlates frequency components of cover image using discrete cosine transform and uses the least significant bits of frequency components for hiding secret information. The tech-nique… More >

  • Open Access

    ARTICLE

    A Convolution-Based System for Malicious URLs Detection

    Chaochao Luo1, Shen Su2, *, Yanbin Sun2, Qingji Tan3, Meng Han4, Zhihong Tian2, *

    CMC-Computers, Materials & Continua, Vol.62, No.1, pp. 399-411, 2020, DOI:10.32604/cmc.2020.06507

    Abstract Since the web service is essential in daily lives, cyber security becomes more and more important in this digital world. Malicious Uniform Resource Locator (URL) is a common and serious threat to cybersecurity. It hosts unsolicited content and lure unsuspecting users to become victim of scams, such as theft of private information, monetary loss, and malware installation. Thus, it is imperative to detect such threats. However, traditional approaches for malicious URLs detection that based on the blacklists are easy to be bypassed and lack the ability to detect newly generated malicious URLs. In this paper, we propose a novel malicious… More >

  • Open Access

    ARTICLE

    Detecting Domain Generation Algorithms with Bi-LSTM

    Liang Ding1,*, Lunjie Li1, Jianghong Han1, Yuqi Fan2,*, Donghui Hu1

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1285-1304, 2019, DOI:10.32604/cmc.2019.06160

    Abstract Botnets often use domain generation algorithms (DGA) to connect to a command and control (C2) server, which enables the compromised hosts connect to the C2 server for accessing many domains. The detection of DGA domains is critical for blocking the C2 server, and for identifying the compromised hosts as well. However, the detection is difficult, because some DGA domain names look normal. Much of the previous work based on statistical analysis of machine learning relies on manual features and contextual information, which causes long response time and cannot be used for real-time detection. In addition, when a new family of… More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack… More >

  • Open Access

    ARTICLE

    Evolved Algorithm and Vibration Stability for Nonlinear Disturbed Security Systems

    Tcw Chen1, Wray Marriott2, Ann Nicholson3, Tim Chen4, Mars Kmieckowiak5, Jcy Chen6,*

    Sound & Vibration, Vol.53, No.2, pp. 29-37, 2019, DOI:10.32604/sv.2019.04224

    Abstract In this paper, a method sustaining system stability after decomposition is proposed. Based on the stability criterion derived from the energy function, a set of intelligent controllers is synthesized which is used to maintain the stability of the system. The sustainable stability problem can be reformulated as a Linear Matrix Inequalities (LMI) problem. The key to guaranteeing the stability of the system as a whole is to find a common symmetrically positive definite matrix for all subsystems. Furthermore, the Evolved Bat Algorithm (EBA) is employed to replace the pole assignment method and the conventional mathematical methods for solving the LMI.… More >

  • Open Access

    ARTICLE

    Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network

    Weidong Fang1, Wuxiong Zhang1,2,*, QianQian Zhao1,2, Xiaohong Ji3, Wei Chen4, Biruk Assefa5

    CMC-Computers, Materials & Continua, Vol.61, No.2, pp. 583-599, 2019, DOI:10.32604/cmc.2019.05237

    Abstract As an Industrial Wireless Sensor Network (IWSN) is usually deployed in a harsh or unattended environment, the privacy security of data aggregation is facing more and more challenges. Currently, the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating, alternately, the aim at enhancing the security of data. The performances of the secure data aggregation protocols are the trade-off of several metrics, which involves the transmission/fusion, the energy efficiency and the security in Wireless Sensor Network (WSN). Unfortunately, there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether… More >

  • Open Access

    ABSTRACT

    Iris Biometrics Recognition Application in Security Management

    S.S. Chowhan1, G.N. Shinde2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.6, No.1, pp. 1-12, 2008, DOI:10.3970/icces.2008.006.001

    Abstract Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. Biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. This paper overview best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. This paper focus Iris is the… More >

  • Open Access

    ARTICLE

    A Block Compressed Sensing for Images Selective Encryption in Cloud

    Xingting Liu1, Jianming Zhang2,*, Xudong Li2, Siwang Zhou1, Siyuan Zhou2, Hye-JinKim3

    Journal of Cyber Security, Vol.1, No.1, pp. 29-41, 2019, DOI:10.32604/jcs.2019.06013

    Abstract The theory of compressed sensing (CS) has been proposed to reduce the processing time and accelerate the scanning process. In this paper, the image recovery task is considered to outsource to the cloud server for its abundant computing and storage resources. However, the cloud server is untrusted then may pose a considerable amount of concern for potential privacy leakage. How to protect data privacy and simultaneously maintain management of the image remains challenging. Motivated by the above challenge, we propose an image encryption algorithm based on chaotic system, CS and image saliency. In our scheme, we outsource the image CS… More >

  • Open Access

    ARTICLE

    Research on Protecting Information Security Based on the Method of Hierarchical Classification in the Era of Big Data

    Guangyong Yang1,*, Mengke Yang2,*, Shafaq Salam3, Jianqiu Zeng4

    Journal of Cyber Security, Vol.1, No.1, pp. 19-28, 2019, DOI:10.32604/jcs.2019.05947

    Abstract Big data is becoming increasingly important because of the enormous information generation and storage in recent years. It has become a challenge to the data mining technique and management. Based on the characteristics of geometric explosion of information in the era of big data, this paper studies the possible approaches to balance the maximum value and privacy of information, and disposes the Nine-Cells information matrix, hierarchical classification. Furthermore, the paper uses the rough sets theory to proceed from the two dimensions of value and privacy, establishes information classification method, puts forward the countermeasures for information security. Taking spam messages for… More >

Displaying 641-650 on page 65 of 683. Per Page