Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (72)
  • Open Access

    ARTICLE

    Securing Internet of Things Devices with Federated Learning: A Privacy-Preserving Approach for Distributed Intrusion Detection

    Sulaiman Al Amro*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4623-4658, 2025, DOI:10.32604/cmc.2025.063734 - 19 May 2025

    Abstract The rapid proliferation of Internet of Things (IoT) devices has heightened security concerns, making intrusion detection a pivotal challenge in safeguarding these networks. Traditional centralized Intrusion Detection Systems (IDS) often fail to meet the privacy requirements and scalability demands of large-scale IoT ecosystems. To address these challenges, we propose an innovative privacy-preserving approach leveraging Federated Learning (FL) for distributed intrusion detection. Our model eliminates the need for aggregating sensitive data on a central server by training locally on IoT devices and sharing only encrypted model updates, ensuring enhanced privacy and scalability without compromising detection accuracy.… More >

  • Open Access

    ARTICLE

    Securing Electronic Health Records with Cryptography and Lion Optimization

    Arkan Kh Shakr Sabonchi*

    Journal of Cyber Security, Vol.7, pp. 21-43, 2025, DOI:10.32604/jcs.2025.059645 - 18 February 2025

    Abstract With the internet and modern mobile technologies, health-related information is readily available, and thus, the security aspect of health information is at great risk. Confidentiality and protection of medical information regarding patients are of prime concern in the context of sharing such data with different healthcare providers. On one hand, Electronic Health Record Systems (EHRS) and online sites have proved to be hassle-free ways of exchanging medical information between health professionals. On the other hand, data security issues remain a concern. The proposed paper presents an improvement in the security mechanism of EHRS by utilizing… More >

  • Open Access

    ARTICLE

    Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment

    Nazreen Banu A*, S.K.B. Sangeetha

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 579-607, 2025, DOI:10.32604/cmc.2024.059805 - 03 January 2025

    Abstract The increasing use of cloud-based devices has reached the critical point of cybersecurity and unwanted network traffic. Cloud environments pose significant challenges in maintaining privacy and security. Global approaches, such as IDS, have been developed to tackle these issues. However, most conventional Intrusion Detection System (IDS) models struggle with unseen cyberattacks and complex high-dimensional data. In fact, this paper introduces the idea of a novel distributed explainable and heterogeneous transformer-based intrusion detection system, named INTRUMER, which offers balanced accuracy, reliability, and security in cloud settings by multiple modules working together within it. The traffic captured… More >

  • Open Access

    ARTICLE

    Securing Web by Predicting Malicious URLs

    Imran Khan, Meenakshi Megavarnam*

    Journal of Cyber Security, Vol.6, pp. 117-130, 2024, DOI:10.32604/jcs.2024.048332 - 06 December 2024

    Abstract A URL (Uniform Resource Locator) is used to locate a digital resource. With this URL, an attacker can perform a variety of attacks, which can lead to serious consequences for both individuals and organizations. Therefore, attackers create malicious URLs to gain access to an organization’s systems or sensitive information. It is crucial to secure individuals and organizations against these malicious URLs. A combination of machine learning and deep learning was used to predict malicious URLs. This research contributes significantly to the field of cybersecurity by proposing a model that seamlessly integrates the accuracy of machine More >

  • Open Access

    PROCEEDINGS

    Reaction Characteristics of Low-Lime Calcium Silicate Cement Power in OPC Pastes

    Gwang Mok Kim1,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.32, No.1, pp. 1-1, 2024, DOI:10.32604/icces.2024.012583

    Abstract This study summarized a part of the research conducted by Kim et al. [1]. The utilization of low-lime calcium silicate cement presents a promising avenue for reducing CO2 emissions in construction fields. Ordinary Portland cement pastes with the type of calcium silicate cement powder were fabricated and solidified under carbonation curing conditions. The physicochemical characteristics of the pastes were examined via variable tests including initial setting and flow characteristics, compressive strength and so on. Limestone and silica fume were employed for the synthesis of the calcium silicate cement used here. The content of calcium silicate More >

  • Open Access

    PROCEEDINGS

    Radio Frequency-Assisted Curing of On-Chip Printed Carbon Nanotube/silicone Heatsinks Produced by Material Extrusion 3D Printing

    Thang Q. Tran1,2, Anubhav Sarmah1, Ethan M. Harkin1, Smita Shivraj Dasari1, Kailash Arole1, Matthew Cupich1, Aniela J. K. Wright1, Hang Li Seet2, Sharon Mui Ling Nai2, Micah J. Green1,3,*

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.3, pp. 1-2, 2024, DOI:10.32604/icces.2024.012057

    Abstract With the rapid development of high-power integrated electronic devices, many polymer-based thermal management devices have been developed to address the problem of overheating and to improve the reliability and lifetime of electronic devices. Here we demonstrate the material extrusion 3D printing of carbon nanotube (CNT)/silicone heatsinks directly onto electronic devices. CNTs were used as a conductive nanofiller and a rheological modifier to improve thermal and electrical conductivities and the printability of the silicone inks, respectively. Additionally, CNTs are also a radio frequency (RF) susceptor, so the integration of CNTs into the silicone matrix allowed for… More >

  • Open Access

    PROCEEDINGS

    Developing Two-Wavelength Digital Light Processing-Based Vat Photopolymerization for Multi-Material/High-Resolution 3D Printing

    Xiayun Zhao1,*, Yue Zhang1, Heyang Zhang1, Yousra Bensouda1, Md Jahangir Alam1, Haolin Zhang1, Yiquan Wang1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.2, pp. 1-2, 2024, DOI:10.32604/icces.2024.011485

    Abstract Vat photopolymerization (VPP) among other additive manufacturing (AM) processes have a great potential to rapidly print complex 3D components out of a matrix of photo-curable resin. Current VPP processes utilize single-wavelength light exposure, imposing limitations on print speed and throughput, especially in multi-material AM. This is attributed to delays in material switch-over mechanisms. Additionally, the resolution of conventional single-wavelength VPP is constrained by over-curing. Despite ongoing efforts and progress in VPP, there remains a need for effective approaches to address these persistent issues. In this work, we report our development of two-wavelength digital light processing-based… More >

  • Open Access

    PROCEEDINGS

    Research on Impact Behavior of Diagonal Gradient Lattice Structure

    Yifan Zhu1,2, Fengxiang Xu1,2,*, Zhen Zou1,2, Xiaoqiang Niu1,2

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.31, No.1, pp. 1-2, 2024, DOI:10.32604/icces.2024.011085

    Abstract Functionally graded lattice structures have garnered significant interest in impact research in recent years as novel structures because of the exceptional properties, including lightweight, high specific strength, and high specific stiffness. Aiming at the problem that the current functionally graded lattice structure incorporates gradient characteristics in the longitudinal or transverse direction, with no research on the diagonal gradient characteristics, this paper proposes a diagonal gradient lattice structure (DGLS) based on the body centered cubic (BCC) lattice structure. The quasi-static compression experiments were carried out on the resin samples manufactured through the photocuring molding technique. Besides,… More >

  • Open Access

    ARTICLE

    Slag Characteristics of Biomass Pellet Fuels with Different Additives to Tobacco-Stalk for Tobacco Curing Heating

    Jianan Wang1,*, Yikuan Fan2, Weidong Duan3, Zhaopeng Song1

    Energy Engineering, Vol.121, No.11, pp. 3401-3415, 2024, DOI:10.32604/ee.2024.055158 - 21 October 2024

    Abstract Since pure tobacco stalk (TS) biomass pellet fuels tend to slag, five anti-slagging agents were added to the crushed TS to obtain a pellet fuel that could be used in biomass burners to provide heat for tobacco curing. The obtained results revealed that the main component of TS pellet fuel was K2Si2O5. During fuel combustion process, additives generated higher melting point silicate compounds by Al–K, Ca–K, and Ca–K elemental structures to replace single K elemental structure of TS, enhancing the anti-slagging efficiency of the pellet fuel from 21.63% to 78.29% and promoting the precipitation of K, More >

  • Open Access

    ARTICLE

    Securing the Internet of Health Things with Certificateless Anonymous Authentication Scheme

    Nisreen Innab*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2237-2258, 2024, DOI:10.32604/cmc.2024.049608 - 15 August 2024

    Abstract Internet of Health Things (IoHT) is a subset of Internet of Things (IoT) technology that includes interconnected medical devices and sensors used in medical and healthcare information systems. However, IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication. In this article, we intend to address this shortcoming, and as a result, we propose a new scheme called, the certificateless anonymous authentication (CAA) scheme. The proposed scheme is based on hyperelliptic curve cryptography (HECC), an enhanced variant of elliptic curve cryptography (ECC)… More >

Displaying 1-10 on page 1 of 72. Per Page