Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    Machine Learning Techniques for Detecting Phishing URL Attacks

    Diana T. Mosa1,2, Mahmoud Y. Shams3,*, Amr A. Abohany2, El-Sayed M. El-kenawy4, M. Thabet5

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1271-1290, 2023, DOI:10.32604/cmc.2023.036422 - 06 February 2023

    Abstract Cyber Attacks are critical and destructive to all industry sectors. They affect social engineering by allowing unapproved access to a Personal Computer (PC) that breaks the corrupted system and threatens humans. The defense of security requires understanding the nature of Cyber Attacks, so prevention becomes easy and accurate by acquiring sufficient knowledge about various features of Cyber Attacks. Cyber-Security proposes appropriate actions that can handle and block attacks. A phishing attack is one of the cybercrimes in which users follow a link to illegal websites that will persuade them to divulge their private information. One… More >

  • Open Access

    ARTICLE

    Enhanced Clustering Based OSN Privacy Preservation to Ensure k-Anonymity, t-Closeness, l-Diversity, and Balanced Privacy Utility

    Rupali Gangarde1,2,*, Amit Sharma3, Ambika Pawar4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2171-2190, 2023, DOI:10.32604/cmc.2023.035559 - 06 February 2023

    Abstract Online Social Networks (OSN) sites allow end-users to share a great deal of information, which may also contain sensitive information, that may be subject to commercial or non-commercial privacy attacks. As a result, guaranteeing various levels of privacy is critical while publishing data by OSNs. The clustering-based solutions proved an effective mechanism to achieve the privacy notions in OSNs. But fixed clustering limits the performance and scalability. Data utility degrades with increased privacy, so balancing the privacy utility trade-off is an open research issue. The research has proposed a novel privacy preservation model using the… More >

  • Open Access

    ARTICLE

    Identifying Influential Communities Using IID for a Multilayer Networks

    C. Suganthini*, R. Baskaran

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1715-1731, 2023, DOI:10.32604/iasc.2023.034019 - 05 January 2023

    Abstract In online social networks (OSN), they generate several specific user activities daily, corresponding to the billions of data points shared. However, although users exhibit significant interest in social media, they are uninterested in the content, discussions, or opinions available on certain sites. Therefore, this study aims to identify influential communities and understand user behavior across networks in the information diffusion process. Social media platforms, such as Facebook and Twitter, extract data to analyze the information diffusion process, based on which they cascade information among the individuals in the network. Therefore, this study proposes an influential… More >

  • Open Access

    ARTICLE

    A Query-Based Greedy Approach for Authentic Influencer Discovery in SIoT

    Farah Batool1, Abdul Rehman2, Dongsun Kim2,*, Assad Abbas1, Raheel Nawaz3, Tahir Mustafa Madni1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6535-6553, 2023, DOI:10.32604/cmc.2023.033832 - 28 December 2022

    Abstract The authors propose an informed search greedy approach that efficiently identifies the influencer nodes in the social Internet of Things with the ability to provide legitimate information. Primarily, the proposed approach minimizes the network size and eliminates undesirable connections. For that, the proposed approach ranks each of the nodes and prioritizes them to identify an authentic influencer. Therefore, the proposed approach discards the nodes having a rank (α) lesser than 0.5 to reduce the network complexity. α is the variable value represents the rank of each node that varies between 0 to 1. Node with… More >

  • Open Access

    ARTICLE

    Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Lubna A. Alharbi4, Mohamed K. Nour5, Abdullah Mohamed6, Ahmed S. Almasoud7, Abdelwahed Motwakel2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2033-2047, 2023, DOI:10.32604/csse.2023.031181 - 03 November 2022

    Abstract Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification More >

  • Open Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328 - 03 November 2022

    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for… More >

  • Open Access

    ARTICLE

    Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network

    Swarna Sudha Muppudathi1, Valarmathi Krishnasamy2,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1027-1042, 2023, DOI:10.32604/iasc.2023.031165 - 29 September 2022

    Abstract Social Networking Sites (SNSs) are nowadays utilized by the whole world to share ideas, images, and valuable contents by means of a post to reach a group of users. The use of SNS often inflicts the physical and the mental health of the people. Nowadays, researchers often focus on identifying the illegal behaviors in the SNS to reduce its negative influence. The state-of-art Natural Language processing techniques for anomaly detection have utilized a wide annotated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum accuracy. To overcome… More >

  • Open Access

    ARTICLE

    Malicious Activities Prediction Over Online Social Networking Using Ensemble Model

    S. Sadhasivam1, P. Valarmathie2, K. Dinakaran3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 461-479, 2023, DOI:10.32604/iasc.2023.028650 - 29 September 2022

    Abstract With the vast advancements in Information Technology, the emergence of Online Social Networking (OSN) has also hit its peak and captured the attention of the young generation people. The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user. However, the attackers also target this height of OSN utilization, explicitly creating the clones of the user’s account. Various clone detection mechanisms are designed based on social-network activities. For instance, monitoring the occurrence of clone edges is done to restrict the generation of clone activities.… More >

  • Open Access

    ARTICLE

    Big Data Analytics Using Graph Signal Processing

    Farhan Amin1, Omar M. Barukab2, Gyu Sang Choi1,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 489-502, 2023, DOI:10.32604/cmc.2023.030615 - 22 September 2022

    Abstract The networks are fundamental to our modern world and they appear throughout science and society. Access to a massive amount of data presents a unique opportunity to the researcher’s community. As networks grow in size the complexity increases and our ability to analyze them using the current state of the art is at severe risk of failing to keep pace. Therefore, this paper initiates a discussion on graph signal processing for large-scale data analysis. We first provide a comprehensive overview of core ideas in Graph signal processing (GSP) and their connection to conventional digital signal… More >

  • Open Access

    ARTICLE

    Improved Key Node Recognition Method of Social Network Based on PageRank Algorithm

    Lei Hong1, Yiji Qian1,*, Chaofan Gong2, Yurui Zhang1, Xin Zhou3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1887-1903, 2023, DOI:10.32604/cmc.2023.029180 - 22 September 2022

    Abstract The types and functions of social networking sites are becoming more abundant with the prevalence of self-media culture, and the number of daily active users of social networking sites represented by Weibo and Zhihu continues to expand. There are key node users in social networks. Compared with ordinary users, their influence is greater, their radiation range is wider, and their information transmission capabilities are better. The key node users playimportant roles in public opinion monitoring and hot event prediction when evaluating the criticality of nodes in social networking sites. In order to solve the problems… More >

Displaying 21-30 on page 3 of 78. Per Page