Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    REVIEW

    Survey on Deep Learning Approaches for Detection of Email Security Threat

    Mozamel M. Saeed1,*, Zaher Al Aghbari2

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 325-348, 2023, DOI:10.32604/cmc.2023.036894

    Abstract Emailing is among the cheapest and most easily accessible platforms, and covers every idea of the present century like banking, personal login database, academic information, invitation, marketing, advertisement, social engineering, model creation on cyber-based technologies, etc. The uncontrolled development and easy access to the internet are the reasons for the increased insecurity in email communication. Therefore, this review paper aims to investigate deep learning approaches for detecting the threats associated with e-mail security. This study compiles the literature related to the deep learning methodologies, which are applicable for providing safety in the field of cyber security of email in different… More >

  • Open Access

    ARTICLE

    Detection of Attackers in Cognitive Radio Network Using Optimized Neural Networks

    V. P. Ajay1,*, M. Nesasudha2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 193-204, 2022, DOI:10.32604/iasc.2022.024839

    Abstract Cognitive radio network (CRN) is a growing technology targeting more resourcefully exploiting the available spectrum for opportunistic network usage. By the concept of cognitive radio, the wastage of available spectrum reduced about 30% worldwide. The key operation of CRN is spectrum sensing. The sensing results about the spectrum are directly proportional to the performance of the network. In CRN, the final result about the available spectrum is decided by combing the local sensing results. The presence or participation of attackers in the network leads to false decisions and the performance of the network will be degraded. In this work, an… More >

  • Open Access

    ARTICLE

    Design of Logically Obfuscated Memory and Arithmetic Logic Unit for Improved Hardware Security

    M. Usharani1,*, B. Sakthivel2, K. Jayaram3, R. Renugadevi4

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1665-1675, 2022, DOI:10.32604/iasc.2022.023284

    Abstract In any kind of digital system, the processor and memories are used to play a vital role in today’s trend. The processors and memories are done many critical tasks in the system. Whereas the processor used to do several functions and memories used to store and retrieve the data. But these processors and memories are more vulnerable to various hardware attacks. By using several new devices may lead to many security issues which the attackers can leverage to introduce a new hardware attack. Various hardware security (HS) studies have been presented to prevent hardware from a security issue. Some of… More >

  • Open Access

    ARTICLE

    Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation

    T. Kowsalya1, R. Ganesh Babu2, B. D. Parameshachari3, Anand Nayyar4, Raja Majid Mehmood5,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 1447-1465, 2021, DOI:10.32604/cmc.2021.014606

    Abstract Lightweight Cryptography (LWC) is widely used to provide integrity, secrecy and authentication for the sensitive applications. However, the LWC is vulnerable to various constraints such as high-power consumption, time consumption, and hardware utilization and susceptible to the malicious attackers. In order to overcome this, a lightweight block cipher namely PRESENT architecture is proposed to provide the security against malicious attacks. The True Random Number Generator-Pseudo Random Number Generator (TRNG-PRNG) based key generation is proposed to generate the unpredictable keys, being highly difficult to predict by the hackers. Moreover, the hardware utilization of PRESENT architecture is optimized using the Dual port… More >

Displaying 1-10 on page 1 of 4. Per Page