Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (59)
  • Open Access

    ARTICLE

    CNN-Based RF Fingerprinting Method for Securing Passive Keyless Entry and Start System

    Hyeon Park1, SeoYeon Kim2, Seok Min Ko1, TaeGuen Kim2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1891-1909, 2023, DOI:10.32604/cmc.2023.039464

    Abstract The rapid growth of modern vehicles with advanced technologies requires strong security to ensure customer safety. One key system that needs protection is the passive key entry system (PKES). To prevent attacks aimed at defeating the PKES, we propose a novel radio frequency (RF) fingerprinting method. Our method extracts the cepstral coefficient feature as a fingerprint of a radio frequency signal. This feature is then analyzed using a convolutional neural network (CNN) for device identification. In evaluation, we conducted experiments to determine the effectiveness of different cepstral coefficient features and the convolutional neural network-based model. Our experimental results revealed that… More >

  • Open Access

    ARTICLE

    Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi

    Doaa Sami Khafaga1, Sarah M. Alhammad1,*, Amal Magdi2, Osama ElKomy2, Nabil A. Lashin2, Khalid M. Hosny2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1967-1986, 2023, DOI:10.32604/csse.2023.040345

    Abstract Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access. Due to the wide use of the Internet nowadays, the need to ensure data integrity and authentication increases. Many techniques, such as watermarking and encryption, are used for securing images transmitted via the Internet. The majority of watermarking systems are PC-based, but they are not very portable. Hardware-based watermarking methods need to be developed to accommodate real-time applications and provide portability. This paper presents hybrid data security techniques using a zero watermarking method to provide copyright protection for the transmitted color images using multi-channel… More >

  • Open Access

    ARTICLE

    Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion

    Musheer Ahmad1, Reem Ibrahim Alkanhel2,*, Naglaa F. Soliman2, Abeer D. Algarni2, Fathi E. Abd El-Samie3, Walid El-Shafai3,4

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2361-2380, 2023, DOI:10.32604/csse.2023.038439

    Abstract Patient privacy and data protection have been crucial concerns in E-healthcare systems for many years. In modern-day applications, patient data usually holds clinical imagery, records, and other medical details. Lately, the Internet of Medical Things (IoMT), equipped with cloud computing, has come out to be a beneficial paradigm in the healthcare field. However, the openness of networks and systems leads to security threats and illegal access. Therefore, reliable, fast, and robust security methods need to be developed to ensure the safe exchange of healthcare data generated from various image sensing and other IoMT-driven devices in the IoMT network. This paper… More >

  • Open Access

    ARTICLE

    Effect of CSH Crystal Nucleus on Steam-Free Cured Fly Ash Precast Concrete Components

    Ruyi Luo, Yanyan Hu*, Tingshu He*, Xiaodong Ma, Yongdong Xu

    Journal of Renewable Materials, Vol.11, No.9, pp. 3485-3500, 2023, DOI:10.32604/jrm.2023.027592

    Abstract The measures of steam curing and early-strengthening agents to promote the precast components to reach the target strength quickly can bring different degrees of damage to the concrete. Based on this, the new nanomaterial CSH-the hydration product of cement effectively solves these measures’ disadvantages, such as excessive energy consumption, thermal stress damage, and the introduction of external ions. In this paper, the effect of CSH on the early strength of precast fly ash concrete components was investigated in terms of setting time, workability, and mechanical properties and analyzed at the microscopic level using hydration temperature, XRD, and SEM. The results… More >

  • Open Access

    ARTICLE

    Curing Process of Phenol Formaldehyde Resin for Plywood under Vacuum Conditions

    Guobing Xiong1, Lu Hong2, Zehui Ju3, Xiaoning Lu3,*, Juwan Jin3,*

    Journal of Renewable Materials, Vol.11, No.9, pp. 3447-3461, 2023, DOI:10.32604/jrm.2023.027430

    Abstract The study characterized the curing behaviors of phenol formaldehyde (PF) resin under different vacuum degrees and explored the properties of 9-ply plywood panels hot-pressed under both vacuum and atmospheric conditions. The changes in core temperature and moisture content of the plywood mats during hot pressing were investigated as well. It was found that the gel times and gel temperatures of PF resin decreased with the increase of vacuum degree using a self-made device. FTIR spectra indicated the degree of polycondensation of hydroxymethyl gradually increased with the increase in temperature. It was also observed that a higher degree of vacuum led… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is mainly because it can imitate… More >

  • Open Access

    ARTICLE

    Effect of High Temperature Curing on the Frost Resistance of Recycled Aggregate Concrete and the Physical Properties of Second-Generation Recycled Coarse Aggregate under Freeze-Thaw Cycles

    Xintong Chen, Pinghua Zhu*, Xiancui Yan, Lei Yang, Huayu Wang

    Journal of Renewable Materials, Vol.11, No.6, pp. 2953-2967, 2023, DOI:10.32604/jrm.2023.027140

    Abstract With the emphasis on environmental issues, the recycling of waste concrete, even recycled concrete, has become a hot spot in the field of architecture. But the repeated recycling of waste concrete used in harsh environments is still a complex problem. This paper discusses the durability and recyclability of recycled aggregate concrete (RAC) as a prefabricated material in the harsh environment, the effect of high-temperature curing (60°C, 80°C, and 100°C) on the frost resistance of RAC and physical properties of the second generation recycled coarse aggregate (RCA2) of RAC after 300 freeze-thaw cycles were studied. The frost resistance of RAC was… More >

  • Open Access

    ARTICLE

    A Framework for Securing Saudi Arabian Hospital Industry: Vision-2030 Perspective

    Hosam Alhakami1,*, Abdullah Baz2, Mohammad Al-shareef3, Rajeev Kumar4, Alka Agrawal5, Raees Ahmad Khan5

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2773-2786, 2023, DOI:10.32604/iasc.2023.021560

    Abstract Recent transformation of Saudi Arabian healthcare sector into a revenue producing one has signaled several advancements in healthcare in the country. Transforming healthcare management into Smart hospital systems is one of them. Secure hospital management systems which are breach-proof only can be termed as effective smart hospital systems. Given the perspective of Saudi Vision-2030, many practitioners are trying to achieve a cost-effective hospital management system by using smart ideas. In this row, the proposed framework posits the main objectives for creating smart hospital management systems that can only be acknowledged by managing the security of healthcare data and medical practices.… More >

  • Open Access

    ARTICLE

    Hybrid Watermarking and Encryption Techniques for Securing Medical Images

    Amel Ali Alhussan1,*, Hanaa A. Abdallah2, Sara Alsodairi2, Abdelhamied A. Ateya3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 403-416, 2023, DOI:10.32604/csse.2023.035048

    Abstract Securing medical data while transmission on the network is required because it is sensitive and life-dependent data. Many methods are used for protection, such as Steganography, Digital Signature, Cryptography, and Watermarking. This paper introduces a novel robust algorithm that combines discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) digital image-watermarking algorithms. The host image is decomposed using a two-dimensional DWT (2D-DWT) to approximate low-frequency sub-bands in the embedding process. Then the sub-band low-high (LH) is decomposed using 2D-DWT to four new sub-bands. The resulting sub-band low-high (LH1) is decomposed using 2D-DWT to four new sub-bands.… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Architecture for Securing Industrial IoTs Data in Electric Smart Grid

    Samir M. Umran1,2, Songfeng Lu1,3, Zaid Ameen Abduljabbar1,4, Xueming Tang1,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5389-5416, 2023, DOI:10.32604/cmc.2023.034331

    Abstract There are numerous internet-connected devices attached to the industrial process through recent communication technologies, which enable machine-to-machine communication and the sharing of sensitive data through a new technology called the industrial internet of things (IIoTs). Most of the suggested security mechanisms are vulnerable to several cybersecurity threats due to their reliance on cloud-based services, external trusted authorities, and centralized architectures; they have high computation and communication costs, low performance, and are exposed to a single authority of failure and bottleneck. Blockchain technology (BC) is widely adopted in the industrial sector for its valuable features in terms of decentralization, security, and… More >

Displaying 11-20 on page 2 of 59. Per Page