Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (142)
  • Open Access

    ARTICLE

    MBB-IoT: Construction and Evaluation of IoT DDoS Traffic Dataset from a New Perspective

    Yi Qing1, Xiangyu Liu2, Yanhui Du2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2095-2119, 2023, DOI:10.32604/cmc.2023.039980

    Abstract Distributed Denial of Service (DDoS) attacks have always been a major concern in the security field. With the release of malware source codes such as BASHLITE and Mirai, Internet of Things (IoT) devices have become the new source of DDoS attacks against many Internet applications. Although there are many datasets in the field of IoT intrusion detection, such as Bot-IoT, Constrained Application Protocol–Denial of Service (CoAP-DoS), and LATAM-DDoS-IoT (some of the names of DDoS datasets), which mainly focus on DDoS attacks, the datasets describing new IoT DDoS attack scenarios are extremely rare, and only N-BaIoT… More >

  • Open Access

    ARTICLE

    A Survey on Deep Learning-Based 2D Human Pose Estimation Models

    Sani Salisu1,2, A. S. A. Mohamed1,*, M. H. Jaafar3, Ainun S. B. Pauzi1, Hussain A. Younis1,4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2385-2400, 2023, DOI:10.32604/cmc.2023.035904

    Abstract In this article, a comprehensive survey of deep learning-based (DL-based) human pose estimation (HPE) that can help researchers in the domain of computer vision is presented. HPE is among the fastest-growing research domains of computer vision and is used in solving several problems for human endeavours. After the detailed introduction, three different human body modes followed by the main stages of HPE and two pipelines of two-dimensional (2D) HPE are presented. The details of the four components of HPE are also presented. The keypoints output format of two popular 2D HPE datasets and the most More >

  • Open Access

    ARTICLE

    Towards Generating a Practical SUNBURST Attack Dataset for Network Attack Detection

    Ehab AlMasri1, Mouhammd Alkasassbeh1, Amjad Aldweesh2,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2643-2669, 2023, DOI:10.32604/csse.2023.040626

    Abstract Supply chain attacks, exemplified by the SUNBURST attack utilizing SolarWinds Orion updates, pose a growing cybersecurity threat to entities worldwide. However, the need for suitable datasets for detecting and anticipating SUNBURST attacks is a significant challenge. We present a novel dataset collected using a unique network traffic data collection methodology to address this gap. Our study aims to enhance intrusion detection and prevention systems by understanding SUNBURST attack features. We construct realistic attack scenarios by combining relevant data and attack indicators. The dataset is validated with the J48 machine learning algorithm, achieving an average F-Measure More >

  • Open Access

    ARTICLE

    Towards Intelligent Detection and Classification of Rice Plant Diseases Based on Leaf Image Dataset

    Fawad Ali Shah1, Habib Akbar1, Abid Ali2,3, Parveen Amna4, Maha Aljohani5, Eman A. Aldhahri6, Harun Jamil7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1385-1413, 2023, DOI:10.32604/csse.2023.036144

    Abstract The detection of rice leaf disease is significant because, as an agricultural and rice exporter country, Pakistan needs to advance in production and lower the risk of diseases. In this rapid globalization era, information technology has increased. A sensing system is mandatory to detect rice diseases using Artificial Intelligence (AI). It is being adopted in all medical and plant sciences fields to access and measure the accuracy of results and detection while lowering the risk of diseases. Deep Neural Network (DNN) is a novel technique that will help detect disease present on a rice leave… More >

  • Open Access

    ARTICLE

    New Denial of Service Attacks Detection Approach Using Hybridized Deep Neural Networks and Balanced Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 757-775, 2023, DOI:10.32604/csse.2023.039111

    Abstract Denial of Service (DoS/DDoS) intrusions are damaging cyber-attacks, and their identification is of great interest to the Intrusion Detection System (IDS). Existing IDS are mainly based on Machine Learning (ML) methods including Deep Neural Networks (DNN), but which are rarely hybridized with other techniques. The intrusion data used are generally imbalanced and contain multiple features. Thus, the proposed approach aims to use a DNN-based method to detect DoS/DDoS attacks using CICIDS2017, CSE-CICIDS2018 and CICDDoS 2019 datasets, according to the following key points. a) Three imbalanced CICIDS2017-2018-2019 datasets, including Benign and DoS/DDoS attack classes, are used.… More >

  • Open Access

    ARTICLE

    A New Hybrid Feature Selection Sequence for Predicting Breast Cancer Survivability Using Clinical Datasets

    E. Jenifer Sweetlin*, S. Saudia

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 343-367, 2023, DOI:10.32604/iasc.2023.036742

    Abstract This paper proposes a hybrid feature selection sequence complemented with filter and wrapper concepts to improve the accuracy of Machine Learning (ML) based supervised classifiers for classifying the survivability of breast cancer patients into classes, living and deceased using METABRIC and Surveillance, Epidemiology and End Results (SEER) datasets. The ML-based classifiers used in the analysis are: Multiple Logistic Regression, K-Nearest Neighbors, Decision Tree, Random Forest, Support Vector Machine and Multilayer Perceptron. The workflow of the proposed ML algorithm sequence comprises the following stages: data cleaning, data balancing, feature selection via a filter and wrapper sequence, More >

  • Open Access

    ARTICLE

    Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network

    Tarcízio Ferrão1,*, Franklin Manene2, Adeyemi Abel Ajibesin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4985-5007, 2023, DOI:10.32604/cmc.2023.038276

    Abstract Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2)… More >

  • Open Access

    ARTICLE

    Data Augmentation Using Contour Image for Convolutional Neural Network

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4669-4680, 2023, DOI:10.32604/cmc.2023.031129

    Abstract With the development of artificial intelligence-related technologies such as deep learning, various organizations, including the government, are making various efforts to generate and manage big data for use in artificial intelligence. However, it is difficult to acquire big data due to various social problems and restrictions such as personal information leakage. There are many problems in introducing technology in fields that do not have enough training data necessary to apply deep learning technology. Therefore, this study proposes a mixed contour data augmentation technique, which is a data augmentation technique using contour images, to solve a… More >

  • Open Access

    ARTICLE

    Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 265-298, 2023, DOI:10.32604/cmes.2023.027581

    Abstract Due to the increasing number of cyber-attacks, the necessity to develop efficient intrusion detection systems (IDS) is more imperative than ever. In IDS research, the most effectively used methodology is based on supervised Neural Networks (NN) and unsupervised clustering, but there are few works dedicated to their hybridization with metaheuristic algorithms. As intrusion detection data usually contains several features, it is essential to select the best ones appropriately. Linear Discriminant Analysis (LDA) and t-statistic are considered as efficient conventional techniques to select the best features, but they have been little exploited in IDS design. Thus,… More >

Displaying 31-40 on page 4 of 142. Per Page