Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (229)
  • Open Access

    ARTICLE

    Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network

    Yuting Zhu1, Yanfang Fu2,*, Yang Ce3, Pan Deng1, Jianpeng Zhu1, Huankun Su1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3867-3894, 2023, DOI:10.32604/cmc.2023.046772

    Abstract In light of the escalating demand and intricacy of services in contemporary terrestrial, maritime, and aerial combat operations, there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks. Software-Defined Networking (SDN) proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts, due to its intrinsic ability to flexibly allocate and centrally administer network resources. This study pivots around the optimization of SDN controller deployment within airborne data link clusters. A collaborative multi-controller architecture predicated on airborne data link clusters is thus proposed.… More >

  • Open Access

    ARTICLE

    Software Coupling and Cohesion Model for Measuring the Quality of Software Components

    Zakarya Abdullah Alzamil*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3139-3161, 2023, DOI:10.32604/cmc.2023.042711

    Abstract Measuring software quality requires software engineers to understand the system’s quality attributes and their measurements. The quality attribute is a qualitative property; however, the quantitative feature is needed for software measurement, which is not considered during the development of most software systems. Many research studies have investigated different approaches for measuring software quality, but with no practical approaches to quantify and measure quality attributes. This paper proposes a software quality measurement model, based on a software interconnection model, to measure the quality of software components and the overall quality of the software system. Unlike most of the existing approaches, the… More >

  • Open Access

    ARTICLE

    Shadow Extraction and Elimination of Moving Vehicles for Tracking Vehicles

    Kalpesh Jadav1, Vishal Sorathiya1,*, Walid El-Shafai2, Torki Altameem3, Moustafa H. Aly4, Vipul Vekariya5, Kawsar Ahmed6, Francis M. Bui6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2009-2030, 2023, DOI:10.32604/cmc.2023.043168

    Abstract Shadow extraction and elimination is essential for intelligent transportation systems (ITS) in vehicle tracking application. The shadow is the source of error for vehicle detection, which causes misclassification of vehicles and a high false alarm rate in the research of vehicle counting, vehicle detection, vehicle tracking, and classification. Most of the existing research is on shadow extraction of moving vehicles in high intensity and on standard datasets, but the process of extracting shadows from moving vehicles in low light of real scenes is difficult. The real scenes of vehicles dataset are generated by self on the Vadodara–Mumbai highway during periods… More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can classify the DDoS attack traffic… More >

  • Open Access

    ARTICLE

    Data Analysis of Network Parameters for Secure Implementations of SDN-Based Firewall

    Rizwan Iqbal1,*, Rashid Hussain2, Sheeraz Arif3, Nadia Mustaqim Ansari4, Tayyab Ahmed Shaikh2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1575-1598, 2023, DOI:10.32604/cmc.2023.042432

    Abstract Software-Defined Networking (SDN) is a new network technology that uses programming to complement the data plane with a control plane. To enable safe connection, however, numerous security challenges must be addressed. Flooding attacks have been one of the most prominent risks on the internet for decades, and they are now becoming challenging difficulties in SDN networks. To solve these challenges, we proposed a unique firewall application built on multiple levels of packet filtering to provide a flooding attack prevention system and a layer-based packet detection system. This study offers a systematic strategy for wrapping up the examination of SDN operations.… More >

  • Open Access

    ARTICLE

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

    Laila M. Halman, Mohammed J. F. Alenazi*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1469-1483, 2024, DOI:10.32604/cmes.2023.028077

    Abstract The healthcare sector holds valuable and sensitive data. The amount of this data and the need to handle, exchange, and protect it, has been increasing at a fast pace. Due to their nature, software-defined networks (SDNs) are widely used in healthcare systems, as they ensure effective resource utilization, safety, great network management, and monitoring. In this sector, due to the value of the data, SDNs face a major challenge posed by a wide range of attacks, such as distributed denial of service (DDoS) and probe attacks. These attacks reduce network performance, causing the degradation of different key performance indicators (KPIs)… More > Graphic Abstract

    Threshold-Based Software-Defined Networking (SDN) Solution for Healthcare Systems against Intrusion Attacks

  • Open Access

    ARTICLE

    Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0

    Cheng Wang1,2,*, Zhuowei Zheng1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1563-1592, 2024, DOI:10.32604/cmes.2023.031103

    Abstract The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software to enhance production efficiency. In this rapidly evolving market, software development is an ongoing process that must be tailored to meet the dynamic needs of enterprises. However, internal research and development can be prohibitively expensive, driving many enterprises to outsource software development and upgrades to external service providers. This paper presents a software upgrade outsourcing model for enterprises and service providers that accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverse selection due to asymmetric information about the… More >

  • Open Access

    ARTICLE

    Graph-Based Feature Learning for Cross-Project Software Defect Prediction

    Ahmed Abdu1, Zhengjun Zhai1,2, Hakim A. Abdo3, Redhwan Algabri4,*, Sungon Lee5,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 161-180, 2023, DOI:10.32604/cmc.2023.043680

    Abstract Cross-project software defect prediction (CPDP) aims to enhance defect prediction in target projects with limited or no historical data by leveraging information from related source projects. The existing CPDP approaches rely on static metrics or dynamic syntactic features, which have shown limited effectiveness in CPDP due to their inability to capture higher-level system properties, such as complex design patterns, relationships between multiple functions, and dependencies in different software projects, that are important for CPDP. This paper introduces a novel approach, a graph-based feature learning model for CPDP (GB-CPDP), that utilizes NetworkX to extract features and learn representations of program entities… More >

  • Open Access

    ARTICLE

    Binary Oriented Feature Selection for Valid Product Derivation in Software Product Line

    Muhammad Fezan Afzal1, Imran Khan1, Javed Rashid1,2,3, Mubbashar Saddique4,*, Heba G. Mohamed5

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3653-3670, 2023, DOI:10.32604/cmc.2023.041627

    Abstract Software Product Line (SPL) is a group of software-intensive systems that share common and variable resources for developing a particular system. The feature model is a tree-type structure used to manage SPL’s common and variable features with their different relations and problem of Crosstree Constraints (CTC). CTC problems exist in groups of common and variable features among the sub-tree of feature models more diverse in Internet of Things (IoT) devices because different Internet devices and protocols are communicated. Therefore, managing the CTC problem to achieve valid product configuration in IoT-based SPL is more complex, time-consuming, and hard. However, the CTC… More >

  • Open Access

    ARTICLE

    A Smart Obfuscation Approach to Protect Software in Cloud

    Lei Yu1, Yucong Duan2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3949-3965, 2023, DOI:10.32604/cmc.2023.038970

    Abstract Cloud computing and edge computing brought more software, which also brought a new danger of malicious software attacks. Data synchronization mechanisms of software can further help reverse data modifications. Based on the mechanisms, attackers can cover themselves behind the network and modify data undetected. Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks, when attackers intrude cloud server to access the source or binary codes. Therefore, we proposed a novel method to resist this kind of reverse engineering by breaking these rules. Our method is based on software obfuscations and encryptions to enhance the… More >

Displaying 11-20 on page 2 of 229. Per Page