Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol

    Waseem Ullah Khan*, Safdar Nawaz Khan Marwat, Salman Ahmed

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1297-1313, 2022, DOI:10.32604/csse.2022.024018 - 09 May 2022

    Abstract The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote… More >

  • Open Access

    ARTICLE

    Cyber Security Analysis and Evaluation for Intrusion Detection Systems

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1765-1783, 2022, DOI:10.32604/cmc.2022.025604 - 24 February 2022

    Abstract Machine learning is a technique that is widely employed in both the academic and industrial sectors all over the world. Machine learning algorithms that are intuitive can analyse risks and respond swiftly to breaches and security issues. It is crucial in offering a proactive security system in the field of cybersecurity. In real time, cybersecurity protects information, information systems, and networks from intruders. In the recent decade, several assessments on security and privacy estimates have noted a rapid growth in both the incidence and quantity of cybersecurity breaches. At an increasing rate, intruders are breaching… More >

  • Open Access

    ARTICLE

    A Novel Framework for Windows Malware Detection Using a Deep Learning Approach

    Abdulbasit A. Darem*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 461-479, 2022, DOI:10.32604/cmc.2022.023566 - 24 February 2022

    Abstract Malicious software (malware) is one of the main cyber threats that organizations and Internet users are currently facing. Malware is a software code developed by cybercriminals for damage purposes, such as corrupting the system and data as well as stealing sensitive data. The damage caused by malware is substantially increasing every day. There is a need to detect malware efficiently and automatically and remove threats quickly from the systems. Although there are various approaches to tackle malware problems, their prevalence and stealthiness necessitate an effective method for the detection and prevention of malware attacks. The More >

  • Open Access

    ARTICLE

    A Secure and Efficient Cluster-Based Authentication Scheme for Internet of Things (IoTs)

    Kanwal Imran1,*, Nasreen Anjum2, Abdullah Alghamdi3, Asadullah Shaikh3, Mohammed Hamdi3, Saeed Mahfooz1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1033-1052, 2022, DOI:10.32604/cmc.2022.018589 - 07 September 2021

    Abstract IPv6 over Low Power Wireless Personal Area Network (6LoWPAN) provides IP connectivity to the highly constrained nodes in the Internet of Things (IoTs). 6LoWPAN allows nodes with limited battery power and storage capacity to carry IPv6 datagrams over the lossy and error-prone radio links offered by the IEEE 802.15.4 standard, thus acting as an adoption layer between the IPv6 protocol and IEEE 802.15.4 network. The data link layer of IEEE 802.15.4 in 6LoWPAN is based on AES (Advanced Encryption Standard), but the 6LoWPAN standard lacks and has omitted the security and privacy requirements at higher… More >

  • Open Access

    ARTICLE

    A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans

    Suliman A. Alsuhibany*, Hessah Abdulaziz Alhodathi

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 523-537, 2022, DOI:10.32604/iasc.2022.019913 - 03 September 2021

    Abstract The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614 - 09 February 2022

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136 - 17 November 2021

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security… More >

  • Open Access

    ARTICLE

    Cyber Security and Privacy Issues in Industrial Internet of Things

    NZ Jhanjhi1, Mamoona Humayun2,*, Saleh N. Almuayqil2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 361-380, 2021, DOI:10.32604/csse.2021.015206 - 08 March 2021

    Abstract The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades. Consequently, there has been a huge paradigm shift in the manufacturing and production sectors. However, this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting (various pillars of) industry 4.0. However, before providing a concrete solution certain aspect need to be researched, for instance, cybersecurity threats and privacy issues in the industry. To fill this gap, this paper discusses potential solutions to cybersecurity targeting this industry and highlights… More >

  • Open Access

    ARTICLE

    Impact of COVID-19 Pandemic: A Cybersecurity Perspective

    Mohammed Baz1, Hosam Alhakami2, Alka Agrawal3, Abdullah Baz4, Raees Ahmad Khan3,*

    Intelligent Automation & Soft Computing, Vol.27, No.3, pp. 641-652, 2021, DOI:10.32604/iasc.2021.015845 - 01 March 2021

    Abstract Inspite of the world being at a complete standstill in the wake of unprecedented health emergency of COVID-19 pandemic, people have managed to retain their digital interactions through Information Technology. Cloud networks, departmental servers, data centres, and the digital devices have ensured that businesses and industries as well as workers across the world remain associated with each other and are connected to the organizations’ data. In such a scenario, the requirements placed on digital frames have increased rapidly. While this has proved to be a boon in the combat against the spread of Coronavirus, alarming… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074 - 05 February 2021

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In… More >

Displaying 31-40 on page 4 of 45. Per Page