Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation

    Xiaogang Yuan*, Huan Pei, Yanlin Wu

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5555-5575, 2025, DOI:10.32604/cmc.2025.063537 - 30 July 2025

    Abstract In the complex environment of Wireless Sensor Networks (WSNs), various malicious attacks have emerged, among which internal attacks pose particularly severe security risks. These attacks seriously threaten network stability, data transmission reliability, and overall performance. To effectively address this issue and significantly improve intrusion detection speed, accuracy, and resistance to malicious attacks, this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation (TIDM-DTE). This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust, communication trust, and energy consumption trust by focusing… More >

  • Open Access

    ARTICLE

    YOLO-LE: A Lightweight and Efficient UAV Aerial Image Target Detection Model

    Zhe Chen*, Yinyang Zhang, Sihao Xing

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1787-1803, 2025, DOI:10.32604/cmc.2025.065238 - 09 June 2025

    Abstract Unmanned aerial vehicle (UAV) imagery poses significant challenges for object detection due to extreme scale variations, high-density small targets (68% in VisDrone dataset), and complex backgrounds. While YOLO-series models achieve speed-accuracy trade-offs via fixed convolution kernels and manual feature fusion, their rigid architectures struggle with multi-scale adaptability, as exemplified by YOLOv8n’s 36.4% mAP and 13.9% small-object AP on VisDrone2019. This paper presents YOLO-LE, a lightweight framework addressing these limitations through three novel designs: (1) We introduce the C2f-Dy and LDown modules to enhance the backbone’s sensitivity to small-object features while reducing backbone parameters, thereby improving More >

  • Open Access

    ARTICLE

    Metaheuristic-Driven Abnormal Traffic Detection Model for SDN Based on Improved Tyrannosaurus Optimization Algorithm

    Hui Xu, Jiahui Chen*, Zhonghao Hu

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4495-4513, 2025, DOI:10.32604/cmc.2025.062189 - 19 May 2025

    Abstract Nowadays, abnormal traffic detection for Software-Defined Networking (SDN) faces the challenges of large data volume and high dimensionality. Since traditional machine learning-based detection methods have the problem of data redundancy, the Metaheuristic Algorithm (MA) is introduced to select features before machine learning to reduce the dimensionality of data. Since a Tyrannosaurus Optimization Algorithm (TROA) has the advantages of few parameters, simple implementation, and fast convergence, and it shows better results in feature selection, TROA can be applied to abnormal traffic detection for SDN. However, TROA suffers from insufficient global search capability, is easily trapped in… More >

  • Open Access

    ARTICLE

    Evaluation and Benchmarking of Cybersecurity DDoS Attacks Detection Models through the Integration of FWZIC and MABAC Methods

    Alaa Mahmood, İsa Avcı*

    Computer Systems Science and Engineering, Vol.49, pp. 401-417, 2025, DOI:10.32604/csse.2025.062413 - 25 April 2025

    Abstract A Distributed Denial-of-Service (DDoS) attack poses a significant challenge in the digital age, disrupting online services with operational and financial consequences. Detecting such attacks requires innovative and effective solutions. The primary challenge lies in selecting the best among several DDoS detection models. This study presents a framework that combines several DDoS detection models and Multiple-Criteria Decision-Making (MCDM) techniques to compare and select the most effective models. The framework integrates a decision matrix from training several models on the CiC-DDOS2019 dataset with Fuzzy Weighted Zero Inconsistency Criterion (FWZIC) and Multi-Attribute Boundary Approximation Area Comparison (MABAC) methodologies.… More >

  • Open Access

    ARTICLE

    YOLO-S3DT: A Small Target Detection Model for UAV Images Based on YOLOv8

    Pengcheng Gao*, Zhenjiang Li

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4555-4572, 2025, DOI:10.32604/cmc.2025.060873 - 06 March 2025

    Abstract The application of deep learning for target detection in aerial images captured by Unmanned Aerial Vehicles (UAV) has emerged as a prominent research focus. Due to the considerable distance between UAVs and the photographed objects, coupled with complex shooting environments, existing models often struggle to achieve accurate real-time target detection. In this paper, a You Only Look Once v8 (YOLOv8) model is modified from four aspects: the detection head, the up-sampling module, the feature extraction module, and the parameter optimization of positive sample screening, and the YOLO-S3DT model is proposed to improve the performance of More >

  • Open Access

    ARTICLE

    Diff-IDS: A Network Intrusion Detection Model Based on Diffusion Model for Imbalanced Data Samples

    Yue Yang1,2, Xiangyan Tang2,3,*, Zhaowu Liu2,3,*, Jieren Cheng2,3, Haozhe Fang3, Cunyi Zhang3

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4389-4408, 2025, DOI:10.32604/cmc.2025.060357 - 06 March 2025

    Abstract With the rapid development of Internet of Things technology, the sharp increase in network devices and their inherent security vulnerabilities present a stark contrast, bringing unprecedented challenges to the field of network security, especially in identifying malicious attacks. However, due to the uneven distribution of network traffic data, particularly the imbalance between attack traffic and normal traffic, as well as the imbalance between minority class attacks and majority class attacks, traditional machine learning detection algorithms have significant limitations when dealing with sparse network traffic data. To effectively tackle this challenge, we have designed a lightweight… More >

  • Open Access

    ARTICLE

    PD-YOLO: Colon Polyp Detection Model Based on Enhanced Small-Target Feature Extraction

    Yicong Yu1,2, Kaixin Lin1, Jiajun Hong1, Rong-Guei Tsai3,*, Yuanzhi Huang1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 913-928, 2025, DOI:10.32604/cmc.2024.058467 - 03 January 2025

    Abstract In recent years, the number of patients with colon disease has increased significantly. Colon polyps are the precursor lesions of colon cancer. If not diagnosed in time, they can easily develop into colon cancer, posing a serious threat to patients’ lives and health. A colonoscopy is an important means of detecting colon polyps. However, in polyp imaging, due to the large differences and diverse types of polyps in size, shape, color, etc., traditional detection methods face the problem of high false positive rates, which creates problems for doctors during the diagnosis process. In order to… More >

  • Open Access

    ARTICLE

    DDoS Attack Autonomous Detection Model Based on Multi-Strategy Integrate Zebra Optimization Algorithm

    Chunhui Li1,2, Xiaoying Wang1,2,*, Qingjie Zhang1,2, Jiaye Liang1, Aijing Zhang1

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 645-674, 2025, DOI:10.32604/cmc.2024.058081 - 03 January 2025

    Abstract Previous studies have shown that deep learning is very effective in detecting known attacks. However, when facing unknown attacks, models such as Deep Neural Networks (DNN) combined with Long Short-Term Memory (LSTM), Convolutional Neural Networks (CNN) combined with LSTM, and so on are built by simple stacking, which has the problems of feature loss, low efficiency, and low accuracy. Therefore, this paper proposes an autonomous detection model for Distributed Denial of Service attacks, Multi-Scale Convolutional Neural Network-Bidirectional Gated Recurrent Units-Single Headed Attention (MSCNN-BiGRU-SHA), which is based on a Multi-strategy Integrated Zebra Optimization Algorithm (MI-ZOA). The… More >

  • Open Access

    ARTICLE

    PUNet: A Semi-Supervised Anomaly Detection Model for Network Anomaly Detection Based on Positive Unlabeled Data

    Gang Long, Zhaoxin Zhang*

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 327-343, 2024, DOI:10.32604/cmc.2024.054558 - 15 October 2024

    Abstract Network anomaly detection plays a vital role in safeguarding network security. However, the existing network anomaly detection task is typically based on the one-class zero-positive scenario. This approach is susceptible to overfitting during the training process due to discrepancies in data distribution between the training set and the test set. This phenomenon is known as prediction drift. Additionally, the rarity of anomaly data, often masked by normal data, further complicates network anomaly detection. To address these challenges, we propose the PUNet network, which ingeniously combines the strengths of traditional machine learning and deep learning techniques… More >

  • Open Access

    ARTICLE

    Anomaly-Based Intrusion Detection Model Using Deep Learning for IoT Networks

    Muaadh A. Alsoufi1,*, Maheyzah Md Siraj1, Fuad A. Ghaleb2, Muna Al-Razgan3, Mahfoudh Saeed Al-Asaly3, Taha Alfakih3, Faisal Saeed2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 823-845, 2024, DOI:10.32604/cmes.2024.052112 - 20 August 2024

    Abstract The rapid growth of Internet of Things (IoT) devices has brought numerous benefits to the interconnected world. However, the ubiquitous nature of IoT networks exposes them to various security threats, including anomaly intrusion attacks. In addition, IoT devices generate a high volume of unstructured data. Traditional intrusion detection systems often struggle to cope with the unique characteristics of IoT networks, such as resource constraints and heterogeneous data sources. Given the unpredictable nature of network technologies and diverse intrusion methods, conventional machine-learning approaches seem to lack efficiency. Across numerous research domains, deep learning techniques have demonstrated… More >

Displaying 11-20 on page 2 of 65. Per Page