Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4,403)
  • Open Access

    ARTICLE

    An Intelligent Multi-Stage GA–SVM Hybrid Optimization Framework for Feature Engineering and Intrusion Detection in Internet of Things Networks

    Isam Bahaa Aldallal1, Abdullahi Abdu Ibrahim1,*, Saadaldeen Rashid Ahmed2,3

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075212 - 10 February 2026

    Abstract The rapid growth of IoT networks necessitates efficient Intrusion Detection Systems (IDS) capable of addressing dynamic security threats under constrained resource environments. This paper proposes a hybrid IDS for IoT networks, integrating Support Vector Machine (SVM) and Genetic Algorithm (GA) for feature selection and parameter optimization. The GA reduces the feature set from 41 to 7, achieving a 30% reduction in overhead while maintaining an attack detection rate of 98.79%. Evaluated on the NSL-KDD dataset, the system demonstrates an accuracy of 97.36%, a recall of 98.42%, and an F1-score of 96.67%, with a low false More >

  • Open Access

    ARTICLE

    An Overall Optimization Model Using Metaheuristic Algorithms for the CNN-Based IoT Attack Detection Problem

    Le Thi Hong Van1,*, Le Duc Thuan1, Pham Van Huong1, Nguyen Hieu Minh2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.075027 - 10 February 2026

    Abstract Optimizing convolutional neural networks (CNNs) for IoT attack detection remains a critical yet challenging task due to the need to balance multiple performance metrics beyond mere accuracy. This study proposes a unified and flexible optimization framework that leverages metaheuristic algorithms to automatically optimize CNN configurations for IoT attack detection. Unlike conventional single-objective approaches, the proposed method formulates a global multi-objective fitness function that integrates accuracy, precision, recall, and model size (speed/model complexity penalty) with adjustable weights. This design enables both single-objective and weighted-sum multi-objective optimization, allowing adaptive selection of optimal CNN configurations for diverse deployment… More >

  • Open Access

    ARTICLE

    A Knowledge-Distilled CharacterBERT-BiLSTM-ATT Framework for Lightweight DGA Detection in IoT Devices

    Chengqi Liu1, Yongtao Li2, Weiping Zou3,*, Deyu Lin4,5,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074975 - 10 February 2026

    Abstract With the large-scale deployment of the Internet of Things (IoT) devices, their weak security mechanisms make them prime targets for malware attacks. Attackers often use Domain Generation Algorithm (DGA) to generate random domain names, hiding the real IP of Command and Control (C&C) servers to build botnets. Due to the randomness and dynamics of DGA, traditional methods struggle to detect them accurately, increasing the difficulty of network defense. This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments. Specifically, a teacher model combining CharacterBERT, a bidirectional long short-term memory More >

  • Open Access

    ARTICLE

    A Comparative Benchmark of Machine and Deep Learning for Cyberattack Detection in IoT Networks

    Enzo Hoummady*, Fehmi Jaafar

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074897 - 10 February 2026

    Abstract With the proliferation of Internet of Things (IoT) devices, securing these interconnected systems against cyberattacks has become a critical challenge. Traditional security paradigms often fail to cope with the scale and diversity of IoT network traffic. This paper presents a comparative benchmark of classic machine learning (ML) and state-of-the-art deep learning (DL) algorithms for IoT intrusion detection. Our methodology employs a two-phased approach: a preliminary pilot study using a custom-generated dataset to establish baselines, followed by a comprehensive evaluation on the large-scale CICIoTDataset2023. We benchmarked algorithms including Random Forest, XGBoost, CNN, and Stacked LSTM. The… More >

  • Open Access

    ARTICLE

    VIF-YOLO: A Visible-Infrared Fusion YOLO Model for Real-Time Human Detection in Dense Smoke Environments

    Wenhe Chen1, Yue Wang1, Shuonan Shen1, Leer Hua1, Caixia Zheng2, Qi Pu1,*, Xundiao Ma3,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074682 - 10 February 2026

    Abstract In fire rescue scenarios, traditional manual operations are highly dangerous, as dense smoke, low visibility, extreme heat, and toxic gases not only hinder rescue efficiency but also endanger firefighters’ safety. Although intelligent rescue robots can enter hazardous environments in place of humans, smoke poses major challenges for human detection algorithms. These challenges include the attenuation of visible and infrared signals, complex thermal fields, and interference from background objects, all of which make it difficult to accurately identify trapped individuals. To address this problem, we propose VIF-YOLO, a visible–infrared fusion model for real-time human detection in… More >

  • Open Access

    ARTICLE

    A Robust Image Encryption Method Based on the Randomness Properties of DNA Nucleotides

    Bassam Al-Shargabi1,*, Mohammed Abbas Fadhil Al-Husainy2, Abdelrahman Abuarqoub1, Omar Albahbouh Aldabbas3

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074550 - 10 February 2026

    Abstract The advent of 5G technology has significantly enhanced the transmission of images over networks, expanding data accessibility and exposure across various applications in digital technology and social media. Consequently, the protection of sensitive data has become increasingly critical. Regardless of the complexity of the encryption algorithm used, a robust and highly secure encryption key is essential, with randomness and key space being crucial factors. This paper proposes a new Robust Deoxyribonucleic Acid (RDNA) nucleotide-based encryption method. The RDNA encryption method leverages the unique properties of DNA nucleotides, including their inherent randomness and extensive key space,… More >

  • Open Access

    ARTICLE

    A Ransomware Detection Approach Based on LLM Embedding and Ensemble Learning

    Abdallah Ghourabi1,*, Hassen Chouaib2

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2026.074505 - 10 February 2026

    Abstract In recent years, ransomware attacks have become one of the most common and destructive types of cyberattacks. Their impact is significant on the operations, finances and reputation of affected companies. Despite the efforts of researchers and security experts to protect information systems from these attacks, the threat persists and the proposed solutions are not able to significantly stop the spread of ransomware attacks. The latest remarkable achievements of large language models (LLMs) in NLP tasks have caught the attention of cybersecurity researchers to integrate these models into security threat detection. These models offer high embedding… More >

  • Open Access

    ARTICLE

    DFT Insights into the Detection of NH3, AsH3, PH3, CO2, and CH4 Gases with Pristine and Monovacancy Phosphorene Sheets

    Naresh Kumar1, Anuj Kumar1,*, Abhishek K. Mishra2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074430 - 10 February 2026

    Abstract Density functional theory (DFT) calculations were employed to investigate the adsorption behavior of NH3, AsH3, PH3, CO2, and CH4 molecules on both pristine and mono-vacancy phosphorene sheets. The pristine phosphorene surface shows weak physisorption with all the gas molecules, inducing only minor changes in its structural and electronic properties. However, the introduction of mono-vacancies significantly enhances the interaction strength with NH3, PH3, CO2, and CH4. These variations are attributed to substantial charge redistribution and orbital hybridization in the presence of defects. The defective phosphorene sheet also exhibits enhanced adsorption energies, along with favorable sensitivity and recovery characteristics, highlighting its potential More >

  • Open Access

    ARTICLE

    Detecting and Mitigating Cyberattacks on Load Frequency Control with Battery Energy Storage System

    Yunhao Yu1, Fuhua Luo1, Zhenyong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074277 - 10 February 2026

    Abstract This paper investigates the detection and mitigation of coordinated cyberattacks on Load Frequency Control (LFC) systems integrated with Battery Energy Storage Systems (BESS). As renewable energy sources gain greater penetration, power grids are becoming increasingly vulnerable to cyber threats, potentially leading to frequency instability and widespread disruptions. We model two significant attack vectors: load-altering attacks (LAAs) and false data injection attacks (FDIAs) that corrupt frequency measurements. These are analyzed for their impact on grid frequency stability in both linear and nonlinear LFC models, incorporating generation rate constraints and nonlinear loads. A coordinated attack strategy is… More >

  • Open Access

    ARTICLE

    A Quantum-Inspired Algorithm for Clustering and Intrusion Detection

    Gang Xu1,2, Lefeng Wang1, Yuwei Huang2, Yong Lu3, Xin Liu4, Weijie Tan5, Zongpeng Li6, Xiu-Bo Chen2,*

    CMC-Computers, Materials & Continua, Vol.87, No.1, 2026, DOI:10.32604/cmc.2025.074256 - 10 February 2026

    Abstract The Intrusion Detection System (IDS) is a security mechanism developed to observe network traffic and recognize suspicious or malicious activities. Clustering algorithms are often incorporated into IDS; however, conventional clustering-based methods face notable drawbacks, including poor scalability in handling high-dimensional datasets and a strong dependence of outcomes on initial conditions. To overcome the performance limitations of existing methods, this study proposes a novel quantum-inspired clustering algorithm that relies on a similarity coefficient-based quantum genetic algorithm (SC-QGA) and an improved quantum artificial bee colony algorithm hybrid K-means (IQABC-K). First, the SC-QGA algorithm is constructed based on… More >

Displaying 1-10 on page 1 of 4403. Per Page