Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (85)
  • Open Access

    ARTICLE

    An Immutable Framework for Smart Healthcare Using Blockchain Technology

    Faneela1, Muazzam A. Khan1, Suliman A. Alsuhibany2,*, Walid El-Shafai3,4, Mujeeb Ur Rehman5, Jawad Ahmad6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 165-179, 2023, DOI:10.32604/csse.2023.035066

    Abstract The advancements in sensing technologies, information processing, and communication schemes have revolutionized the healthcare sector. Electronic Healthcare Records (EHR) facilitate the patients, doctors, hospitals, and other stakeholders to maintain valuable data and medical records. The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks. A single attempt of a successful Denial of Service (DoS) attack can compromise the complete healthcare system. This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things (IoMT) to address the stated challenges. The proposed architecture is on the idea of a lightweight private blockchain-based network that… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied… More >

  • Open Access

    ARTICLE

    A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things

    Maha Sabir1, Jawad Ahmad2,*, Daniyal Alghazzawi1

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 57-72, 2023, DOI:10.32604/csse.2023.034277

    Abstract The Internet of things (IoT) is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision. Despite several advantages, the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals. A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries. To overcome the security challenges of IoT networks, this article proposes a lightweight deep autoencoder (DAE) based cyberattack detection framework. The proposed… More >

  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom dataset crawled from hundreds of… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Based Cybersecurity Phishing Email Detection and Classification

    R. Brindha1, S. Nandagopal2, H. Azath3, V. Sathana4, Gyanendra Prasad Joshi5, Sung Won Kim6,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5901-5914, 2023, DOI:10.32604/cmc.2023.030784

    Abstract Phishing is a type of cybercrime in which cyber-attackers pose themselves as authorized persons or entities and hack the victims’ sensitive data. E-mails, instant messages and phone calls are some of the common modes used in cyberattacks. Though the security models are continuously upgraded to prevent cyberattacks, hackers find innovative ways to target the victims. In this background, there is a drastic increase observed in the number of phishing emails sent to potential targets. This scenario necessitates the importance of designing an effective classification model. Though numerous conventional models are available in the literature for proficient classification of phishing emails,… More >

  • Open Access

    ARTICLE

    Enhanced Gorilla Troops Optimizer with Deep Learning Enabled Cybersecurity Threat Detection

    Fatma S. Alrayes1, Najm Alotaibi2, Jaber S. Alzahrani3, Sana Alazwari4, Areej Alhogail5, Ali M. Al-Sharafi6, Mahmoud Othman7, Manar Ahmed Hamza8,*

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3037-3052, 2023, DOI:10.32604/csse.2023.033970

    Abstract Recent developments in computer networks and Internet of Things (IoT) have enabled easy access to data. But the government and business sectors face several difficulties in resolving cybersecurity network issues, like novel attacks, hackers, internet criminals, and so on. Presently, malware attacks and software piracy pose serious risks in compromising the security of IoT. They can steal confidential data which results in financial and reputational losses. The advent of machine learning (ML) and deep learning (DL) models has been employed to accomplish security in the IoT cloud environment. This article presents an Enhanced Artificial Gorilla Troops Optimizer with Deep Learning… More >

  • Open Access

    ARTICLE

    Spotted Hyena Optimizer with Deep Learning Driven Cybersecurity for Social Networks

    Anwer Mustafa Hilal1,2,*, Aisha Hassan Abdalla Hashim1, Heba G. Mohamed3, Lubna A. Alharbi4, Mohamed K. Nour5, Abdullah Mohamed6, Ahmed S. Almasoud7, Abdelwahed Motwakel2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2033-2047, 2023, DOI:10.32604/csse.2023.031181

    Abstract Recent developments on Internet and social networking have led to the growth of aggressive language and hate speech. Online provocation, abuses, and attacks are widely termed cyberbullying (CB). The massive quantity of user generated content makes it difficult to recognize CB. Current advancements in machine learning (ML), deep learning (DL), and natural language processing (NLP) tools enable to detect and classify CB in social networks. In this view, this study introduces a spotted hyena optimizer with deep learning driven cybersecurity (SHODLCS) model for OSN. The presented SHODLCS model intends to accomplish cybersecurity from the identification of CB in the OSN.… More >

  • Open Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328

    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for online social networks, named SRO-MLCOSN… More >

  • Open Access

    ARTICLE

    Proposed Biometric Security System Based on Deep Learning and Chaos Algorithms

    Iman Almomani1,2, Walid El-Shafai1,3,*, Aala AlKhayer1, Albandari Alsumayt4, Sumayh S. Aljameel5, Khalid Alissa6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3515-3537, 2023, DOI:10.32604/cmc.2023.033765

    Abstract Nowadays, there is tremendous growth in biometric authentication and cybersecurity applications. Thus, the efficient way of storing and securing personal biometric patterns is mandatory in most governmental and private sectors. Therefore, designing and implementing robust security algorithms for users’ biometrics is still a hot research area to be investigated. This work presents a powerful biometric security system (BSS) to protect different biometric modalities such as faces, iris, and fingerprints. The proposed BSS model is based on hybridizing auto-encoder (AE) network and a chaos-based ciphering algorithm to cipher the details of the stored biometric patterns and ensures their secrecy. The employed… More >

  • Open Access

    ARTICLE

    A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity

    S. Hanis*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 865-878, 2023, DOI:10.32604/iasc.2023.030597

    Abstract In the recent past, the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications. In this paper, a modulated version of the Ikeda map and key generation algorithm are proposed, which can be used as a chaotic key for securely storing images in the cloud. The distinctive feature of the proposed map is that it is hyperchaotic, highly sensitive to initial conditions, and depicts chaos over a wide range of control parameter variations. These properties prevent the attacker from detecting and extracting the keys easily. The key generation algorithm… More >

Displaying 31-40 on page 4 of 85. Per Page