Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Autonomous Cyber-Physical System for Anomaly Detection and Attack Prevention Using Transformer-Based Attention Generative Adversarial Residual Network

    Abrar M. Alajlan1,*, Marwah M. Almasri2

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5237-5262, 2025, DOI:10.32604/cmc.2025.066736 - 23 October 2025

    Abstract Cyber-Physical Systems integrated with information technologies introduce vulnerabilities that extend beyond traditional cyber threats. Attackers can non-invasively manipulate sensors and spoof controllers, which in turn increases the autonomy of the system. Even though the focus on protecting against sensor attacks increases, there is still uncertainty about the optimal timing for attack detection. Existing systems often struggle to manage the trade-off between latency and false alarm rate, leading to inefficiencies in real-time anomaly detection. This paper presents a framework designed to monitor, predict, and control dynamic systems with a particular emphasis on detecting and adapting to… More >

  • Open Access

    ARTICLE

    Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT

    Ammar Odeh*, Anas Abu Taleb

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4149-4169, 2024, DOI:10.32604/cmc.2024.058052 - 19 December 2024

    Abstract The proliferation of Internet of Things (IoT) technology has exponentially increased the number of devices interconnected over networks, thereby escalating the potential vectors for cybersecurity threats. In response, this study rigorously applies and evaluates deep learning models—namely Convolutional Neural Networks (CNN), Autoencoders, and Long Short-Term Memory (LSTM) networks—to engineer an advanced Intrusion Detection System (IDS) specifically designed for IoT environments. Utilizing the comprehensive UNSW-NB15 dataset, which encompasses 49 distinct features representing varied network traffic characteristics, our methodology focused on meticulous data preprocessing including cleaning, normalization, and strategic feature selection to enhance model performance. A robust… More >

  • Open Access

    ARTICLE

    Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

    Mohammed Amin Almaiah1,*, Leen Mohammad Saqr1, Leen Ahmad Al-Rawwash1, Layan Ahmed Altellawi1, Romel Al-Ali2,*, Omar Almomani3

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 3189-3220, 2024, DOI:10.32604/cmc.2024.057673 - 18 November 2024

    Abstract Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding… More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473 - 20 May 2024

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    Multiclass Classification for Cyber Threats Detection on Twitter

    Adnan Hussein1, Abdulwahab Ali Almazroi2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3853-3866, 2023, DOI:10.32604/cmc.2023.040856 - 26 December 2023

    Abstract The advances in technology increase the number of internet systems usage. As a result, cybersecurity issues have become more common. Cyber threats are one of the main problems in the area of cybersecurity. However, detecting cybersecurity threats is not a trivial task and thus is the center of focus for many researchers due to its importance. This study aims to analyze Twitter data to detect cyber threats using a multiclass classification approach. The data is passed through different tasks to prepare it for the analysis. Term Frequency and Inverse Document Frequency (TFIDF) features are extracted… More >

  • Open Access

    ARTICLE

    Multilayer Self-Defense System to Protect Enterprise Cloud

    Shailendra Mishra, Sunil Kumar Sharma*, Majed A. Alowaidi

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 71-85, 2021, DOI:10.32604/cmc.2020.012475 - 30 October 2020

    Abstract A data breach can seriously impact organizational intellectual property, resources, time, and product value. The risk of system intrusion is augmented by the intrinsic openness of commonly utilized technologies like TCP/IP protocols. As TCP relies on IP addresses, an attacker may easily trace the IP address of the organization. Given that many organizations run the risk of data breach and cyber-attacks at a certain point, a repeatable and well-developed incident response framework is critical to shield them. Enterprise cloud possesses the challenges of security, lack of transparency, trust and loss of controls. Technology eases quickens… More >

Displaying 1-10 on page 1 of 6. Per Page