Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3,302)
  • Open Access

    ARTICLE

    Innovative Lightweight Encryption Schemes Leveraging Chaotic Systems for Secure Data Transmission

    Haider H. Al-Mahmood1,*, Saad N. Alsaad2

    Intelligent Automation & Soft Computing, Vol.40, pp. 53-74, 2025, DOI:10.32604/iasc.2024.059691 - 10 January 2025

    Abstract In secure communications, lightweight encryption has become crucial, particularly for resource-constrained applications such as embedded devices, wireless sensor networks, and the Internet of Things (IoT). As these systems proliferate, cryptographic approaches that provide robust security while minimizing computing overhead, energy consumption, and memory usage are becoming increasingly essential. This study examines lightweight encryption techniques utilizing chaotic maps to ensure secure data transmission. Two algorithms are proposed, both employing the Logistic map; the first approach utilizes two logistic chaotic maps, while the second algorithm employs a single logistic chaotic map. Algorithm 1, including a two-stage mechanism… More >

  • Open Access

    ARTICLE

    Enhancing Vehicle Overtaking System via LoRa-Enabled Vehicular Communication Approach

    Kwang Chee Seng, Siti Fatimah Abdul Razak*, Sumendra Yogarayan

    Computer Systems Science and Engineering, Vol.49, pp. 239-258, 2025, DOI:10.32604/csse.2024.056582 - 10 January 2025

    Abstract Vehicle overtaking poses significant risks and leads to injuries and losses on Malaysia’s roads. In most scenarios, insufficient and untimely information available to drivers for accessing road conditions and their surrounding environment is the primary factor that causes these incidents. To address these issues, a comprehensive system is required to provide real-time assistance to drivers. Building upon our previous research on a LoRa-based lane change decision-aid system, this study proposes an enhanced Vehicle Overtaking System (VOS). This system utilizes long-range (LoRa) communication for reliable real-time data exchange between vehicles (V2V) and the cloud (V2C). By More >

  • Open Access

    ARTICLE

    5DGWO-GAN: A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems

    Sarvenaz Sadat Khatami1, Mehrdad Shoeibi2, Anita Ershadi Oskouei3, Diego Martín4,*, Maral Keramat Dashliboroun5

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 881-911, 2025, DOI:10.32604/cmc.2024.059999 - 03 January 2025

    Abstract The Internet of Things (IoT) is integral to modern infrastructure, enabling connectivity among a wide range of devices from home automation to industrial control systems. With the exponential increase in data generated by these interconnected devices, robust anomaly detection mechanisms are essential. Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns. This paper presents a novel approach utilizing generative adversarial networks (GANs) for anomaly detection in IoT systems. However, optimizing GANs involves tuning hyper-parameters such as learning rate, batch size, and optimization algorithms,… More >

  • Open Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025

    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open Access

    ARTICLE

    A Latency-Aware and Fault-Tolerant Framework for Resource Scheduling and Data Management in Fog-Enabled Smart City Transportation Systems

    Ibrar Afzal1, Noor ul Amin1,*, Zulfiqar Ahmad1,*, Abdulmohsen Algarni2

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1377-1399, 2025, DOI:10.32604/cmc.2024.057755 - 03 January 2025

    Abstract The deployment of the Internet of Things (IoT) with smart sensors has facilitated the emergence of fog computing as an important technology for delivering services to smart environments such as campuses, smart cities, and smart transportation systems. Fog computing tackles a range of challenges, including processing, storage, bandwidth, latency, and reliability, by locally distributing secure information through end nodes. Consisting of endpoints, fog nodes, and back-end cloud infrastructure, it provides advanced capabilities beyond traditional cloud computing. In smart environments, particularly within smart city transportation systems, the abundance of devices and nodes poses significant challenges related… More >

  • Open Access

    REVIEW

    Review of Techniques for Integrating Security in Software Development Lifecycle

    Hassan Saeed1, Imran Shafi1, Jamil Ahmad2, Adnan Ahmed Khan3, Tahir Khurshaid4,*, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 139-172, 2025, DOI:10.32604/cmc.2024.057587 - 03 January 2025

    Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >

  • Open Access

    ARTICLE

    Occluded Gait Emotion Recognition Based on Multi-Scale Suppression Graph Convolutional Network

    Yuxiang Zou1, Ning He2,*, Jiwu Sun1, Xunrui Huang1, Wenhua Wang1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1255-1276, 2025, DOI:10.32604/cmc.2024.055732 - 03 January 2025

    Abstract In recent years, gait-based emotion recognition has been widely applied in the field of computer vision. However, existing gait emotion recognition methods typically rely on complete human skeleton data, and their accuracy significantly declines when the data is occluded. To enhance the accuracy of gait emotion recognition under occlusion, this paper proposes a Multi-scale Suppression Graph Convolutional Network (MS-GCN). The MS-GCN consists of three main components: Joint Interpolation Module (JI Moudle), Multi-scale Temporal Convolution Network (MS-TCN), and Suppression Graph Convolutional Network (SGCN). The JI Module completes the spatially occluded skeletal joints using the (K-Nearest Neighbors)… More >

  • Open Access

    ARTICLE

    A Verifiable Trust-Based CP-ABE Access Control Scheme for Cloud-Assisted Renewable Energy Systems

    Jiyu Zhang1,*, Kehe Wu1, Ruomeng Yan1, Zheng Tian2, Yizhen Sun2, Yuxi Wu2, Yaogong Guo3

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1211-1232, 2025, DOI:10.32604/cmc.2024.055243 - 03 January 2025

    Abstract Renewable Energy Systems (RES) provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers (ES). However, securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic. Additionally, managing attributes, including addition, deletion, and modification, is a crucial issue in the access control scheme for RES. To address these security concerns, a trust-based ciphertext-policy attribute-based encryption (CP-ABE) device access control scheme is proposed for RES (TB-CP-ABE). This… More >

  • Open Access

    ARTICLE

    XGBoost Based Multiclass NLOS Channels Identification in UWB Indoor Positioning System

    Ammar Fahem Majeed1,2,*, Rashidah Arsat1, Muhammad Ariff Baharudin1, Nurul Mu’azzah Abdul Latiff1, Abbas Albaidhani3

    Computer Systems Science and Engineering, Vol.49, pp. 159-183, 2025, DOI:10.32604/csse.2024.058741 - 03 January 2025

    Abstract Accurate non-line of sight (NLOS) identification technique in ultra-wideband (UWB) location-based services is critical for applications like drone communication and autonomous navigation. However, current methods using binary classification (LOS/NLOS) oversimplify real-world complexities, with limited generalisation and adaptability to varying indoor environments, thereby reducing the accuracy of positioning. This study proposes an extreme gradient boosting (XGBoost) model to identify multi-class NLOS conditions. We optimise the model using grid search and genetic algorithms. Initially, the grid search approach is used to identify the most favourable values for integer hyperparameters. In order to achieve an optimised model configuration,… More >

  • Open Access

    ARTICLE

    A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs

    Sameh Zarif1,2,*, Hadier Moawad2, Khalid Amin2, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5, Marian Wagdy6

    Computer Systems Science and Engineering, Vol.49, pp. 79-98, 2025, DOI:10.32604/csse.2024.057439 - 03 January 2025

    Abstract Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity. Cloud computing provides a shared electronic device resource for users via the internet, and the authentication techniques used must protect data from attacks. Previous approaches failed to resolve the challenge of making passwords secure, memorable, usable, and time-saving. Graphical Password (GP) is still not widely utilized in reality because consumers suffer from multiple login stages. This paper proposes an Indexed Choice-Based Graphical Password (ICGP) scheme for improving the authentication part. ICGP consists of two stages: registration and authentication. At the… More >

Displaying 1-10 on page 1 of 3302. Per Page