Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (132)
  • Open Access

    ARTICLE

    Proposing a High-Robust Approach for Detecting the Tampering Attacks on English Text Transmitted via Internet

    Fahd N. Al-Wesabi1,*, Huda G. Iskandar2, Mohammad Alamgeer3, Mokhtar M. Ghilan2

    Intelligent Automation & Soft Computing, Vol.26, No.6, pp. 1267-1283, 2020, DOI:10.32604/iasc.2020.013782

    Abstract In this paper, a robust approach INLPETWA (an Intelligent Natural Language Processing and English Text Watermarking Approach) is proposed to tampering detection of English text by integrating zero text watermarking and hidden Markov model as a soft computing and natural language processing techniques. In the INLPETWA approach, embedding and detecting the watermark key logically conducted without altering the plain text. Second-gram and word mechanism of hidden Markov model is used as a natural text analysis technique to extracts English text features and use them as a watermark key and embed them logically and validates them during detection process to detect… More >

  • Open Access

    ARTICLE

    Multiparty Quantum Key Agreement With Strong Fairness Property

    Vankamamidi S. Naresh1,∗, Sivaranjani Reddi2

    Computer Systems Science and Engineering, Vol.35, No.6, pp. 457-465, 2020, DOI:10.32604/csse.2020.35.457

    Abstract Multiparty Key Agreement (MKA) is the backbone for secure multiparty communication. Although numerous efficient MKA-cryptosystems are available in the classical field, their security relies on the assumption that some computational issues are infeasible. To overcome this dependency, a new area, quantum cryptography, evolves to support key agreement among two or more participants securely. In this paper, first, we present a two-part quantum key agreement with Strong Fairness Property (SFP) and extends it to a Multiparty Quantum Key Agreement (MQKA) protocol. In the first round of proposed MQKA, a participant will act as a group controller (GC) and establishes two-party groups… More >

  • Open Access

    ARTICLE

    Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization Algorithm for Secured Free Scale Networks against Malicious Attacks

    Ganeshan Keerthana1,*, Panneerselvam Anandan2, Nandhagopal Nachimuthu3

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 903-917, 2021, DOI:10.32604/cmc.2020.012255

    Abstract Due to the recent proliferation of cyber-attacks, highly robust wireless sensor networks (WSN) become a critical issue as they survive node failures. Scale-free WSN is essential because they endure random attacks effectively. But they are susceptible to malicious attacks, which mainly targets particular significant nodes. Therefore, the robustness of the network becomes important for ensuring the network security. This paper presents a Robust Hybrid Artificial Fish Swarm Simulated Annealing Optimization (RHAFS-SA) Algorithm. It is introduced for improving the robust nature of free scale networks over malicious attacks (MA) with no change in degree distribution. The proposed RHAFS-SA is an enhanced… More >

  • Open Access

    ARTICLE

    Multilayer Self-Defense System to Protect Enterprise Cloud

    Shailendra Mishra, Sunil Kumar Sharma*, Majed A. Alowaidi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 71-85, 2021, DOI:10.32604/cmc.2020.012475

    Abstract A data breach can seriously impact organizational intellectual property, resources, time, and product value. The risk of system intrusion is augmented by the intrinsic openness of commonly utilized technologies like TCP/IP protocols. As TCP relies on IP addresses, an attacker may easily trace the IP address of the organization. Given that many organizations run the risk of data breach and cyber-attacks at a certain point, a repeatable and well-developed incident response framework is critical to shield them. Enterprise cloud possesses the challenges of security, lack of transparency, trust and loss of controls. Technology eases quickens the processing of information but… More >

  • Open Access

    ARTICLE

    Adversarial Attacks on License Plate Recognition Systems

    Zhaoquan Gu1, Yu Su1, Chenwei Liu1, Yinyu Lyu1, Yunxiang Jian1, Hao Li2, Zhen Cao3, Le Wang1, *

    CMC-Computers, Materials & Continua, Vol.65, No.2, pp. 1437-1452, 2020, DOI:10.32604/cmc.2020.011834

    Abstract The license plate recognition system (LPRS) has been widely adopted in daily life due to its efficiency and high accuracy. Deep neural networks are commonly used in the LPRS to improve the recognition accuracy. However, researchers have found that deep neural networks have their own security problems that may lead to unexpected results. Specifically, they can be easily attacked by the adversarial examples that are generated by adding small perturbations to the original images, resulting in incorrect license plate recognition. There are some classic methods to generate adversarial examples, but they cannot be adopted on LPRS directly. In this paper,… More >

  • Open Access

    ARTICLE

    Protecting Android Applications with Multiple DEX Files Against Static Reverse Engineering Attacks

    Kyeonghwan Lim1, Nak Young Kim1, Younsik Jeong1, Seong-je Cho1, Sangchul Han2, Minkyu Park2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 143-153, 2019, DOI:10.31209/2018.100000051

    Abstract The Android application package (APK) uses the DEX format as an executable file format. Since DEX files are in Java bytecode format, you can easily get Java source code using static reverse engineering tools. This feature makes it easy to steal Android applications. Tools such as ijiami, liapp, alibaba, etc. can be used to protect applications from static reverse engineering attacks. These tools typically save encrypted classes.dex in the APK file, and then decrypt and load dynamically when the application starts. However, these tools do not protect multidex Android applications. A multidex Android application is an APK that contains multiple… More >

  • Open Access

    ARTICLE

    Adversarial Attacks on Content-Based Filtering Journal Recommender Systems

    Zhaoquan Gu1, Yinyin Cai1, Sheng Wang1, Mohan Li1, *, Jing Qiu1, Shen Su1, Xiaojiang Du1, Zhihong Tian1

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1755-1770, 2020, DOI:10.32604/cmc.2020.010739

    Abstract Recommender systems are very useful for people to explore what they really need. Academic papers are important achievements for researchers and they often have a great deal of choice to submit their papers. In order to improve the efficiency of selecting the most suitable journals for publishing their works, journal recommender systems (JRS) can automatically provide a small number of candidate journals based on key information such as the title and the abstract. However, users or journal owners may attack the system for their own purposes. In this paper, we discuss about the adversarial attacks against content-based filtering JRS. We… More >

  • Open Access

    ARTICLE

    Security Analysis of Smart Speaker: Security Attacks and Mitigation

    Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*

    CMC-Computers, Materials & Continua, Vol.61, No.3, pp. 1075-1090, 2019, DOI:10.32604/cmc.2019.08520

    Abstract The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack… More >

  • Open Access

    ARTICLE

    Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model

    Wen Tian1, Xiaopeng Ji1,*, Weiwei Liu1, Guangjie Liu1, Rong Lin1,2, Jiangtao Zhai3, Yuewei Dai3

    CMC-Computers, Materials & Continua, Vol.60, No.1, pp. 193-211, 2019, DOI:10.32604/cmc.2019.05290

    Abstract Cyber-physical system (CPS) is an advanced system that integrats physical processes, computation and communication resources. The security of cyber-physical systems has become an active research area in recent years. In this paper, we focus on defensive strategies against network attacks in CPS. We introduce both low- and highinteraction honeypots into CPS as a security management tool deliberately designed to be probed, attacked and compromised. In addition, an analysis resource constraint is introduced for the purpose of optimizing defensive strategies against network attacks in CPS. We study the offensive and defensive interactions of CPS and model the offensive and defensive process… More >

  • Open Access

    ARTICLE

    DPIF: A Framework for Distinguishing Unintentional Quality Problems From Potential Shilling Attacks

    Mohan Li1, Yanbin Sun1, *, Shen Su1, Zhihong Tian1, Yuhang Wang1, *, Xianzhi Wang2

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 331-344, 2019, DOI:10.32604/cmc.2019.05379

    Abstract Maliciously manufactured user profiles are often generated in batch for shilling attacks. These profiles may bring in a lot of quality problems but not worthy to be repaired. Since repairing data always be expensive, we need to scrutinize the data and pick out the data that really deserves to be repaired. In this paper, we focus on how to distinguish the unintentional data quality problems from the batch generated fake users for shilling attacks. A two-steps framework named DPIF is proposed for the distinguishment. Based on the framework, the metrics of homology and suspicious degree are proposed. The homology can… More >

Displaying 121-130 on page 13 of 132. Per Page