Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (42)
  • Open Access

    ARTICLE

    Hybrid Runtime Detection of Malicious Containers Using eBPF

    Jeongeun Ryu1, Riyeong Kim2, Soomin Lee1, Sumin Kim1, Hyunwoo Choi1,2, Seongmin Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.074871 - 12 January 2026

    Abstract As containerized environments become increasingly prevalent in cloud-native infrastructures, the need for effective monitoring and detection of malicious behaviors has become critical. Malicious containers pose significant risks by exploiting shared host resources, enabling privilege escalation, or launching large-scale attacks such as cryptomining and botnet activities. Therefore, developing accurate and efficient detection mechanisms is essential for ensuring the security and stability of containerized systems. To this end, we propose a hybrid detection framework that leverages the extended Berkeley Packet Filter (eBPF) to monitor container activities directly within the Linux kernel. The framework simultaneously collects flow-based network… More >

  • Open Access

    ARTICLE

    A Real Time YOLO Based Container Grapple Slot Detection and Classification System

    Chen-Chiung Hsieh1,*, Chun-An Chen1, Wei-Hsin Huang2

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072514 - 12 January 2026

    Abstract Container transportation is pivotal in global trade due to its efficiency, safety, and cost-effectiveness. However, structural defects—particularly in grapple slots—can result in cargo damage, financial loss, and elevated safety risks, including container drops during lifting operations. Timely and accurate inspection before and after transit is therefore essential. Traditional inspection methods rely heavily on manual observation of internal and external surfaces, which are time-consuming, resource-intensive, and prone to subjective errors. Container roofs pose additional challenges due to limited visibility, while grapple slots are especially vulnerable to wear from frequent use. This study proposes a two-stage automated… More >

  • Open Access

    ARTICLE

    Enhancing Ransomware Resilience in Cloud-Based HR Systems through Moving Target Defense

    Jay Barach*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-23, 2026, DOI:10.32604/cmc.2025.071705 - 09 December 2025

    Abstract Human Resource (HR) operations increasingly rely on cloud-based platforms that provide hiring, payroll, employee management, and compliance services. These systems, typically built on multi-tenant microservice architectures, offer scalability and efficiency but also expand the attack surface for adversaries. Ransomware has emerged as a leading threat in this domain, capable of halting workflows and exposing sensitive employee records. Traditional defenses such as static hardening and signature-based detection often fail to address the dynamic requirements of HR Software as a Service (SaaS), where continuous availability and privacy compliance are critical. This paper presents a Moving Target Defense… More >

  • Open Access

    ARTICLE

    Manufacturing a Biodegradable Container for Planting Plants Based on an Innovative Wood-Polymer Composite

    Ksenia Anikeeva*, Ruslan Safin

    Journal of Renewable Materials, Vol.13, No.11, pp. 2235-2252, 2025, DOI:10.32604/jrm.2025.02025-0128 - 24 November 2025

    Abstract The use of wood-polymer composites (WPC) based on a polymer matrix and wood filler is a modern, environmentally friendly direction in material science. However, untreated wood filler exhibits poor adhesion to hydrophobic polymers due to its hydrophilic lignocellulose fibers. To address this, ozone treatment is employed to enhance compatibility, reduce water absorption, and regulate biodegradation rates. This study investigates the hypothesis that ozone modification of wood filler improves adhesion to thermoplastic starch, thereby enhancing the physico-mechanical properties and controlled biodegradation of WPCs under compost conditions. A comprehensive analysis was conducted on composites containing untreated and… More >

  • Open Access

    REVIEW

    A Comprehensive Review on File Containers-Based Image and Video Forensics

    Pengpeng Yang1,2,*, Chen Zhou1, Dasara Shullani2, Lanxi Liu1, Daniele Baracchi2

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 2487-2526, 2025, DOI:10.32604/cmc.2025.069129 - 23 September 2025

    Abstract Images and videos play an increasingly vital role in daily life and are widely utilized as key evidentiary sources in judicial investigations and forensic analysis. Simultaneously, advancements in image and video processing technologies have facilitated the widespread availability of powerful editing tools, such as Deepfakes, enabling anyone to easily create manipulated or fake visual content, which poses an enormous threat to social security and public trust. To verify the authenticity and integrity of images and videos, numerous approaches have been proposed, which are primarily based on content analysis and their effectiveness is susceptible to interference… More >

  • Open Access

    ARTICLE

    AGV Scheduling and Bidirectional Conflict-Free Routing Problem with Battery Swapping in Automated Container Terminals

    He Huang, Jin Zhu*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1717-1748, 2025, DOI:10.32604/cmes.2025.068384 - 31 August 2025

    Abstract Automated guided vehicles (AGVs) are key equipment in automated container terminals (ACTs), and their operational efficiency can be impacted by conflicts and battery swapping. Additionally, AGVs have bidirectional transportation capabilities, allowing them to move in the opposite direction without turning around, which helps reduce transportation time. This paper aims at the problem of AGV scheduling and bidirectional conflict-free routing with battery swapping in automated terminals. A bi-level mixed integer programming (MIP) model is proposed, taking into account task assignment, bidirectional conflict-free routing, and battery swapping. The upper model focuses on container task assignment and AGV… More >

  • Open Access

    ARTICLE

    Preventing IP Spoofing in Kubernetes Using eBPF

    Absar Hussain1, Abdul Aziz1, Hassan Jamil Syed2,*, Shoaib Raza1

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3105-3124, 2025, DOI:10.32604/cmc.2025.062628 - 03 July 2025

    Abstract Kubernetes has become the dominant container orchestration platform, with widespread adoption across industries. However, its default pod-to-pod communication mechanism introduces security vulnerabilities, particularly IP spoofing attacks. Attackers can exploit this weakness to impersonate legitimate pods, enabling unauthorized access, lateral movement, and large-scale Distributed Denial of Service (DDoS) attacks. Existing security mechanisms such as network policies and intrusion detection systems introduce latency and performance overhead, making them less effective in dynamic Kubernetes environments. This research presents PodCA, an eBPF-based security framework designed to detect and prevent IP spoofing in real time while minimizing performance impact. PodCA… More >

  • Open Access

    ARTICLE

    GPU Usage Time-Based Ordering Management Technique for Tasks Execution to Prevent Running Failures of GPU Tasks in Container Environments

    Joon-Min Gil1, Hyunsu Jeong1, Jihun Kang2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2199-2213, 2025, DOI:10.32604/cmc.2025.061182 - 17 February 2025

    Abstract In a cloud environment, graphics processing units (GPUs) are the primary devices used for high-performance computation. They exploit flexible resource utilization, a key advantage of cloud environments. Multiple users share GPUs, which serve as coprocessors of central processing units (CPUs) and are activated only if tasks demand GPU computation. In a container environment, where resources can be shared among multiple users, GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single GPU. However, unlike CPUs and memory, GPUs cannot logically multiplex their resources. Additionally, GPU memory… More >

  • Open Access

    ARTICLE

    NCCMF: Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status

    Tao Zheng1, Wenyi Tang1,2,4,*, Xingshu Chen1,3,4, Changxiang Shen1,3,4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1687-1701, 2024, DOI:10.32604/cmc.2024.056141 - 15 October 2024

    Abstract The security performance of cloud services is a key factor influencing users’ selection of Cloud Service Providers (CSPs). Continuous monitoring of the security status of cloud services is critical. However, existing research lacks a practical framework for such ongoing monitoring. To address this gap, this paper proposes the first Non-Collaborative Container-Based Cloud Service Operation State Continuous Monitoring Framework (NCCMF), based on relevant standards. NCCMF operates without the CSP’s collaboration by: 1) establishing a scalable supervisory index system through the identification of security responsibilities for each role, and 2) designing a Continuous Metrics Supervision Protocol (CMA) More >

  • Open Access

    ARTICLE

    A Pre-Selection-Based Ant Colony System for Integrated Resources Scheduling Problem at Marine Container Terminal

    Rong Wang1, Xinxin Xu2, Zijia Wang3,*, Fei Ji1, Nankun Mu4

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2363-2385, 2024, DOI:10.32604/cmc.2024.053564 - 15 August 2024

    Abstract Marine container terminal (MCT) plays a key role in the marine intelligent transportation system and international logistics system. However, the efficiency of resource scheduling significantly influences the operation performance of MCT. To solve the practical resource scheduling problem (RSP) in MCT efficiently, this paper has contributions to both the problem model and the algorithm design. Firstly, in the problem model, different from most of the existing studies that only consider scheduling part of the resources in MCT, we propose a unified mathematical model for formulating an integrated RSP. The new integrated RSP model allocates and… More >

Displaying 1-10 on page 1 of 42. Per Page