Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (136)
  • Open Access

    ARTICLE

    Multi-Attack Intrusion Detection System for Software-Defined Internet of Things Network

    Tarcízio Ferrão1,*, Franklin Manene2, Adeyemi Abel Ajibesin3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4985-5007, 2023, DOI:10.32604/cmc.2023.038276

    Abstract Currently, the Internet of Things (IoT) is revolutionizing communication technology by facilitating the sharing of information between different physical devices connected to a network. To improve control, customization, flexibility, and reduce network maintenance costs, a new Software-Defined Network (SDN) technology must be used in this infrastructure. Despite the various advantages of combining SDN and IoT, this environment is more vulnerable to various attacks due to the centralization of control. Most methods to ensure IoT security are designed to detect Distributed Denial-of-Service (DDoS) attacks, but they often lack mechanisms to mitigate their severity. This paper proposes a Multi-Attack Intrusion Detection System… More >

  • Open Access

    ARTICLE

    RRCNN: Request Response-Based Convolutional Neural Network for ICS Network Traffic Anomaly Detection

    Yan Du1,2, Shibin Zhang1,2,*, Guogen Wan1,2, Daohua Zhou3, Jiazhong Lu1,2, Yuanyuan Huang1,2, Xiaoman Cheng4, Yi Zhang4, Peilin He5

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5743-5759, 2023, DOI:10.32604/cmc.2023.035919

    Abstract Nowadays, industrial control system (ICS) has begun to integrate with the Internet. While the Internet has brought convenience to ICS, it has also brought severe security concerns. Traditional ICS network traffic anomaly detection methods rely on statistical features manually extracted using the experience of network security experts. They are not aimed at the original network data, nor can they capture the potential characteristics of network packets. Therefore, the following improvements were made in this study: (1) A dataset that can be used to evaluate anomaly detection algorithms is produced, which provides raw network data. (2) A request response-based convolutional neural… More >

  • Open Access

    ARTICLE

    Data Augmentation Using Contour Image for Convolutional Neural Network

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4669-4680, 2023, DOI:10.32604/cmc.2023.031129

    Abstract With the development of artificial intelligence-related technologies such as deep learning, various organizations, including the government, are making various efforts to generate and manage big data for use in artificial intelligence. However, it is difficult to acquire big data due to various social problems and restrictions such as personal information leakage. There are many problems in introducing technology in fields that do not have enough training data necessary to apply deep learning technology. Therefore, this study proposes a mixed contour data augmentation technique, which is a data augmentation technique using contour images, to solve a problem caused by a lack… More >

  • Open Access

    ARTICLE

    Improved Supervised and Unsupervised Metaheuristic-Based Approaches to Detect Intrusion in Various Datasets

    Ouail Mjahed1,*, Salah El Hadaj1, El Mahdi El Guarmah1,2, Soukaina Mjahed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 265-298, 2023, DOI:10.32604/cmes.2023.027581

    Abstract Due to the increasing number of cyber-attacks, the necessity to develop efficient intrusion detection systems (IDS) is more imperative than ever. In IDS research, the most effectively used methodology is based on supervised Neural Networks (NN) and unsupervised clustering, but there are few works dedicated to their hybridization with metaheuristic algorithms. As intrusion detection data usually contains several features, it is essential to select the best ones appropriately. Linear Discriminant Analysis (LDA) and t-statistic are considered as efficient conventional techniques to select the best features, but they have been little exploited in IDS design. Thus, the research proposed in this… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection in Internet of Blended Environment Using Ensemble of Heterogeneous Autoencoders (E-HAE)

    Lelisa Adeba Jilcha1, Deuk-Hun Kim2, Julian Jang-Jaccard3, Jin Kwak4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3261-3284, 2023, DOI:10.32604/csse.2023.037615

    Abstract Contemporary attackers, mainly motivated by financial gain, consistently devise sophisticated penetration techniques to access important information or data. The growing use of Internet of Things (IoT) technology in the contemporary convergence environment to connect to corporate networks and cloud-based applications only worsens this situation, as it facilitates multiple new attack vectors to emerge effortlessly. As such, existing intrusion detection systems suffer from performance degradation mainly because of insufficient considerations and poorly modeled detection systems. To address this problem, we designed a blended threat detection approach, considering the possible impact and dimensionality of new attack surfaces due to the aforementioned convergence.… More >

  • Open Access

    ARTICLE

    Visual Lip-Reading for Quranic Arabic Alphabets and Words Using Deep Learning

    Nada Faisal Aljohani*, Emad Sami Jaha

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3037-3058, 2023, DOI:10.32604/csse.2023.037113

    Abstract The continuing advances in deep learning have paved the way for several challenging ideas. One such idea is visual lip-reading, which has recently drawn many research interests. Lip-reading, often referred to as visual speech recognition, is the ability to understand and predict spoken speech based solely on lip movements without using sounds. Due to the lack of research studies on visual speech recognition for the Arabic language in general, and its absence in the Quranic research, this research aims to fill this gap. This paper introduces a new publicly available Arabic lip-reading dataset containing 10490 videos captured from multiple viewpoints… More >

  • Open Access

    ARTICLE

    A Novel Cluster Analysis-Based Crop Dataset Recommendation Method in Precision Farming

    K. R. Naveen Kumar1, Husam Lahza2, B. R. Sreenivasa3,*, Tawfeeq Shawly4, Ahmed A. Alsheikhy5, H. Arunkumar1, C. R. Nirmala1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3239-3260, 2023, DOI:10.32604/csse.2023.036629

    Abstract Data mining and analytics involve inspecting and modeling large pre-existing datasets to discover decision-making information. Precision agriculture uses data mining to advance agricultural developments. Many farmers aren’t getting the most out of their land because they don’t use precision agriculture. They harvest crops without a well-planned recommendation system. Future crop production is calculated by combining environmental conditions and management behavior, yielding numerical and categorical data. Most existing research still needs to address data preprocessing and crop categorization/classification. Furthermore, statistical analysis receives less attention, despite producing more accurate and valid results. The study was conducted on a dataset about Karnataka state,… More >

  • Open Access

    ARTICLE

    COVID-19 Classification from X-Ray Images: An Approach to Implement Federated Learning on Decentralized Dataset

    Ali Akbar Siddique1, S. M. Umar Talha1, M. Aamir1, Abeer D. Algarni2, Naglaa F. Soliman2,*, Walid El-Shafai3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3883-3901, 2023, DOI:10.32604/cmc.2023.037413

    Abstract The COVID-19 pandemic has devastated our daily lives, leaving horrific repercussions in its aftermath. Due to its rapid spread, it was quite difficult for medical personnel to diagnose it in such a big quantity. Patients who test positive for Covid-19 are diagnosed via a nasal PCR test. In comparison, polymerase chain reaction (PCR) findings take a few hours to a few days. The PCR test is expensive, although the government may bear expenses in certain places. Furthermore, subsets of the population resist invasive testing like swabs. Therefore, chest X-rays or Computerized Vomography (CT) scans are preferred in most cases, and… More >

  • Open Access

    ARTICLE

    A Universal Activation Function for Deep Learning

    Seung-Yeon Hwang1, Jeong-Joon Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3553-3569, 2023, DOI:10.32604/cmc.2023.037028

    Abstract Recently, deep learning has achieved remarkable results in fields that require human cognitive ability, learning ability, and reasoning ability. Activation functions are very important because they provide the ability of artificial neural networks to learn complex patterns through nonlinearity. Various activation functions are being studied to solve problems such as vanishing gradients and dying nodes that may occur in the deep learning process. However, it takes a lot of time and effort for researchers to use the existing activation function in their research. Therefore, in this paper, we propose a universal activation function (UA) so that researchers can easily create… More >

  • Open Access

    ARTICLE

    MNIST Handwritten Digit Classification Based on Convolutional Neural Network with Hyperparameter Optimization

    Haijian Shao1, Edwin Ma2, Ming Zhu1, Xing Deng3, Shengjie Zhai1,*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3595-3606, 2023, DOI:10.32604/iasc.2023.036323

    Abstract Accurate handwriting recognition has been a challenging computer vision problem, because static feature analysis of the text pictures is often inadequate to account for high variance in handwriting styles across people and poor image quality of the handwritten text. Recently, by introducing machine learning, especially convolutional neural networks (CNNs), the recognition accuracy of various handwriting patterns is steadily improved. In this paper, a deep CNN model is developed to further improve the recognition rate of the MNIST handwritten digit dataset with a fast-converging rate in training. The proposed model comes with a multi-layer deep arrange structure, including 3 convolution and… More >

Displaying 31-40 on page 4 of 136. Per Page