Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (261)
  • Open Access

    ARTICLE

    An Intelligent Security Service Optimization Method Based on Knowledge Base

    Xianju Gao*, Huachun Zhou, Weilin Wang, Jingfu Yan

    Computer Systems Science and Engineering, Vol.49, pp. 19-48, 2025, DOI:10.32604/csse.2024.058327 - 03 January 2025

    Abstract The network security knowledge base standardizes and integrates network security data, providing a reliable foundation for real-time network security protection solutions. However, current research on network security knowledge bases mainly focuses on their construction, while the potential to optimize intelligent security services for real-time network security protection requires further exploration. Therefore, how to effectively utilize the vast amount of historical knowledge in the field of network security and establish a feedback mechanism to update it in real time, thereby enhancing the detection capability of security services against malicious traffic, has become an important issue. Our… More >

  • Open Access

    ARTICLE

    Congruent Feature Selection Method to Improve the Efficacy of Machine Learning-Based Classification in Medical Image Processing

    Mohd Anjum1, Naoufel Kraiem2, Hong Min3,*, Ashit Kumar Dutta4, Yousef Ibrahim Daradkeh5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.1, pp. 357-384, 2025, DOI:10.32604/cmes.2024.057889 - 17 December 2024

    Abstract Machine learning (ML) is increasingly applied for medical image processing with appropriate learning paradigms. These applications include analyzing images of various organs, such as the brain, lung, eye, etc., to identify specific flaws/diseases for diagnosis. The primary concern of ML applications is the precise selection of flexible image features for pattern detection and region classification. Most of the extracted image features are irrelevant and lead to an increase in computation time. Therefore, this article uses an analytical learning paradigm to design a Congruent Feature Selection Method to select the most relevant image features. This process… More >

  • Open Access

    ARTICLE

    Robust Network Security: A Deep Learning Approach to Intrusion Detection in IoT

    Ammar Odeh*, Anas Abu Taleb

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4149-4169, 2024, DOI:10.32604/cmc.2024.058052 - 19 December 2024

    Abstract The proliferation of Internet of Things (IoT) technology has exponentially increased the number of devices interconnected over networks, thereby escalating the potential vectors for cybersecurity threats. In response, this study rigorously applies and evaluates deep learning models—namely Convolutional Neural Networks (CNN), Autoencoders, and Long Short-Term Memory (LSTM) networks—to engineer an advanced Intrusion Detection System (IDS) specifically designed for IoT environments. Utilizing the comprehensive UNSW-NB15 dataset, which encompasses 49 distinct features representing varied network traffic characteristics, our methodology focused on meticulous data preprocessing including cleaning, normalization, and strategic feature selection to enhance model performance. A robust… More >

  • Open Access

    ARTICLE

    Enhancing Software Cost Estimation Using Feature Selection and Machine Learning Techniques

    Fizza Mansoor1, Muhammad Affan Alim2,5,*, Muhammad Taha Jilani3, Muhammad Monsoor Alam4,5, Mazliham Mohd Su’ud5

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4603-4624, 2024, DOI:10.32604/cmc.2024.057979 - 19 December 2024

    Abstract Software cost estimation is a crucial aspect of software project management, significantly impacting productivity and planning. This research investigates the impact of various feature selection techniques on software cost estimation accuracy using the CoCoMo NASA dataset, which comprises data from 93 unique software projects with 24 attributes. By applying multiple machine learning algorithms alongside three feature selection methods, this study aims to reduce data redundancy and enhance model accuracy. Our findings reveal that the principal component analysis (PCA)-based feature selection technique achieved the highest performance, underscoring the importance of optimal feature selection in improving software More >

  • Open Access

    ARTICLE

    Contribution Tracking Feature Selection (CTFS) Based on the Fusion of Sparse Autoencoder and Mutual Information

    Yifan Yu, Dazhi Wang*, Yanhua Chen, Hongfeng Wang, Min Huang

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 3761-3780, 2024, DOI:10.32604/cmc.2024.057103 - 19 December 2024

    Abstract For data mining tasks on large-scale data, feature selection is a pivotal stage that plays an important role in removing redundant or irrelevant features while improving classifier performance. Traditional wrapper feature selection methodologies typically require extensive model training and evaluation, which cannot deliver desired outcomes within a reasonable computing time. In this paper, an innovative wrapper approach termed Contribution Tracking Feature Selection (CTFS) is proposed for feature selection of large-scale data, which can locate informative features without population-level evolution. In other words, fewer evaluations are needed for CTFS compared to other evolutionary methods. We initially More >

  • Open Access

    ARTICLE

    Performance Analysis of Machine Learning-Based Intrusion Detection with Hybrid Feature Selection

    Mohammad Al-Omari1, Qasem Abu Al-Haija2,*

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1537-1555, 2024, DOI:10.32604/csse.2024.056257 - 22 November 2024

    Abstract More businesses are deploying powerful Intrusion Detection Systems (IDS) to secure their data and physical assets. Improved cyber-attack detection and prevention in these systems requires machine learning (ML) approaches. This paper examines a cyber-attack prediction system combining feature selection (FS) and ML. Our technique’s foundation was based on Correlation Analysis (CA), Mutual Information (MI), and recursive feature reduction with cross-validation. To optimize the IDS performance, the security features must be carefully selected from multiple-dimensional datasets, and our hybrid FS technique must be extended to validate our methodology using the improved UNSW-NB 15 and TON_IoT datasets. More >

  • Open Access

    ARTICLE

    Augmenting Internet of Medical Things Security: Deep Ensemble Integration and Methodological Fusion

    Hamad Naeem1, Amjad Alsirhani2,*, Faeiz M. Alserhani3, Farhan Ullah4, Ondrej Krejcar1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2185-2223, 2024, DOI:10.32604/cmes.2024.056308 - 31 October 2024

    Abstract When it comes to smart healthcare business systems, network-based intrusion detection systems are crucial for protecting the system and its networks from malicious network assaults. To protect IoMT devices and networks in healthcare and medical settings, our proposed model serves as a powerful tool for monitoring IoMT networks. This study presents a robust methodology for intrusion detection in Internet of Medical Things (IoMT) environments, integrating data augmentation, feature selection, and ensemble learning to effectively handle IoMT data complexity. Following rigorous preprocessing, including feature extraction, correlation removal, and Recursive Feature Elimination (RFE), selected features are standardized… More >

  • Open Access

    ARTICLE

    Multi-Label Feature Selection Based on Improved Ant Colony Optimization Algorithm with Dynamic Redundancy and Label Dependence

    Ting Cai1, Chun Ye1, Zhiwei Ye1,*, Ziyuan Chen1, Mengqing Mei1, Haichao Zhang1, Wanfang Bai2, Peng Zhang3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1157-1175, 2024, DOI:10.32604/cmc.2024.055080 - 15 October 2024

    Abstract The world produces vast quantities of high-dimensional multi-semantic data. However, extracting valuable information from such a large amount of high-dimensional and multi-label data is undoubtedly arduous and challenging. Feature selection aims to mitigate the adverse impacts of high dimensionality in multi-label data by eliminating redundant and irrelevant features. The ant colony optimization algorithm has demonstrated encouraging outcomes in multi-label feature selection, because of its simplicity, efficiency, and similarity to reinforcement learning. Nevertheless, existing methods do not consider crucial correlation information, such as dynamic redundancy and label correlation. To tackle these concerns, the paper proposes a More >

  • Open Access

    ARTICLE

    A Secure Framework for WSN-IoT Using Deep Learning for Enhanced Intrusion Detection

    Chandraumakantham Om Kumar1,*, Sudhakaran Gajendran2, Suguna Marappan1, Mohammed Zakariah3, Abdulaziz S. Almazyad4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 471-501, 2024, DOI:10.32604/cmc.2024.054966 - 15 October 2024

    Abstract The security of the wireless sensor network-Internet of Things (WSN-IoT) network is more challenging due to its randomness and self-organized nature. Intrusion detection is one of the key methodologies utilized to ensure the security of the network. Conventional intrusion detection mechanisms have issues such as higher misclassification rates, increased model complexity, insignificant feature extraction, increased training time, increased run time complexity, computation overhead, failure to identify new attacks, increased energy consumption, and a variety of other factors that limit the performance of the intrusion system model. In this research a security framework for WSN-IoT, through… More >

  • Open Access

    ARTICLE

    Improved Harris Hawks Algorithm and Its Application in Feature Selection

    Qianqian Zhang1, Yingmei Li1,*, Jianjun Zhan2,*, Shan Chen1

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1251-1273, 2024, DOI:10.32604/cmc.2024.053892 - 15 October 2024

    Abstract This research focuses on improving the Harris’ Hawks Optimization algorithm (HHO) by tackling several of its shortcomings, including insufficient population diversity, an imbalance in exploration vs. exploitation, and a lack of thorough exploitation depth. To tackle these shortcomings, it proposes enhancements from three distinct perspectives: an initialization technique for populations grounded in opposition-based learning, a strategy for updating escape energy factors to improve the equilibrium between exploitation and exploration, and a comprehensive exploitation approach that utilizes variable neighborhood search along with mutation operators. The effectiveness of the Improved Harris Hawks Optimization algorithm (IHHO) is assessed by… More >

Displaying 1-10 on page 1 of 261. Per Page