Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Detecting Phishing Using a Multi-Layered Social Engineering Framework

    Kofi Sarpong Adu-Manu*, Richard Kwasi Ahiable

    Journal of Cyber Security, Vol.5, pp. 13-32, 2023, DOI:10.32604/jcs.2023.043359

    Abstract As businesses develop and expand with a significant volume of data, data protection and privacy become increasingly important. Research has shown a tremendous increase in phishing activities during and after COVID-19. This research aimed to improve the existing approaches to detecting phishing activities on the internet. We designed a multi-layered phish detection algorithm to detect and prevent phishing applications on the internet using URLs. In the algorithm, we considered technical dimensions of phishing attack prevention and mitigation on the internet. In our approach, we merge, Phishtank, Blacklist, Blocklist, and Whitelist to form our framework. A web application system and browser… More >

  • Open Access

    ARTICLE

    An Enhanced Security System Using Blockchain Technology for Strong FMC Relationship

    K. Meenakshi*, K. Sashi Rekha

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 111-128, 2023, DOI:10.32604/iasc.2023.025032

    Abstract Blockchain technology is a shared database of logs of all consumer transactions which are registered on all machines on a network. Both transactions in the system are carried out by consensus processes and to preserve confidentiality all the files contained cannot be changed. Blockchain technology is the fundamental software behind digital currencies like Bitcoin, which is common in the marketplace. Cloud computing is a method of using a network of external machines to store, monitor, and process information, rather than using the local computer or a local personal computer. The software is currently facing multiple problems including lack of data… More >

  • Open Access

    ARTICLE

    A Steganography Model Data Protection Method Based on Scrambling Encryption

    Xintao Duan1,*, Zhiqiang Shao1, Wenxin Wang1, En Zhang1, Dongli Yue1, Chuan Qin2, Haewoon Nam3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5363-5375, 2022, DOI:10.32604/cmc.2022.027807

    Abstract At present, the image steganography method based on CNN has achieved good results. The trained model and its parameters are of great value. Once leaked, the secret image will be exposed. To protect the security of steganographic network model parameters in the transmission process, an idea based on network model parameter scrambling is proposed in this paper. Firstly, the sender trains the steganography network and extraction network, encrypts the extraction network parameters with the key shared by the sender and the receiver, then sends the extraction network and parameters to the receiver through the public channel, and the receiver recovers… More >

  • Open Access

    ARTICLE

    A Robust 3-D Medical Watermarking Based on Wavelet Transform for Data Protection

    Xiaorui Zhang1,3,*, Wenfang Zhang1, Wei Sun2, Xingming Sun1, Sunil Kumar Jha4

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1043-1056, 2022, DOI:10.32604/csse.2022.022305

    Abstract In a telemedicine diagnosis system, the emergence of 3D imaging enables doctors to make clearer judgments, and its accuracy also directly affects doctors’ diagnosis of the disease. In order to ensure the safe transmission and storage of medical data, a 3D medical watermarking algorithm based on wavelet transform is proposed in this paper. The proposed algorithm employs the principal component analysis (PCA) transform to reduce the data dimension, which can minimize the error between the extracted components and the original data in the mean square sense. Especially, this algorithm helps to create a bacterial foraging model based on particle swarm… More >

  • Open Access

    ARTICLE

    Security and Privacy Aspects of Cloud Computing: A Smart Campus Case Study

    Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 117-128, 2022, DOI:10.32604/iasc.2022.016597

    Abstract The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost-effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More >

  • Open Access

    ARTICLE

    An Effective Non-Commutative Encryption Approach with Optimized Genetic Algorithm for Ensuring Data Protection in Cloud Computing

    S. Jerald Nirmal Kumar1,*, S. Ravimaran2, M. M. Gowthul Alam3

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 671-697, 2020, DOI:10.32604/cmes.2020.09361

    Abstract Nowadays, succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers. Hence, to secure both data and keys ensuring secured data storage and access, our proposed work designs a Novel Quantum Key Distribution (QKD) relying upon a non-commutative encryption framework. It makes use of a Novel Quantum Key Distribution approach, which guarantees high level secured data transmission. Along with this, a shared secret is generated using Diffie Hellman (DH) to certify secured key generation at reduced time complexity. Moreover, a non-commutative approach is used, which effectively allows the users to store… More >

Displaying 1-10 on page 1 of 7. Per Page