Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (675)
  • Open Access

    ARTICLE

    Privacy-Aware Federated Learning Framework for IoT Security Using Chameleon Swarm Optimization and Self-Attentive Variational Autoencoder

    Saad Alahmari1,*, Abdulwhab Alkharashi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 849-873, 2025, DOI:10.32604/cmes.2025.062549 - 11 April 2025

    Abstract The Internet of Things (IoT) is emerging as an innovative phenomenon concerned with the development of numerous vital applications. With the development of IoT devices, huge amounts of information, including users’ private data, are generated. IoT systems face major security and data privacy challenges owing to their integral features such as scalability, resource constraints, and heterogeneity. These challenges are intensified by the fact that IoT technology frequently gathers and conveys complex data, creating an attractive opportunity for cyberattacks. To address these challenges, artificial intelligence (AI) techniques, such as machine learning (ML) and deep learning (DL),… More >

  • Open Access

    ARTICLE

    A Common Architecture-Based Smart Home Tools and Applications Forensics for Scalable Investigations

    Sungbum Kim1, Gwangsik Lee2, Jian Song2, Insoo Lee2, Taeshik Shon3,*

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 661-683, 2025, DOI:10.32604/cmc.2025.063687 - 26 March 2025

    Abstract The smart home platform integrates with Internet of Things (IoT) devices, smartphones, and cloud servers, enabling seamless and convenient services. It gathers and manages extensive user data, including personal information, device operations, and patterns of user behavior. Such data plays an essential role in criminal investigations, highlighting the growing importance of specialized smart home forensics. Given the rapid advancement in smart home software and hardware technologies, many companies are introducing new devices and services that expand the market. Consequently, scalable and platform-specific forensic research is necessary to support efficient digital investigations across diverse smart home… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Latent Profile Analysis: Mattering Concepts, Problematic Internet Use, and Adaptability in Chinese University Students

    Jianlong Wang1,#, Xiumei Chen1,2,#, Muqi Huang3, Rui Liu3, I-Hua Chen4,5,*, Gordon L. Flett6,*

    International Journal of Mental Health Promotion, Vol.27, No.2, pp. 241-256, 2025, DOI:10.32604/ijmhp.2025.058503 - 03 March 2025

    Abstract Background: This study addresses the pressing need to understand the nuanced relationship between ‘mattering’—the perception of being significant to others—and problematic internet use (PIU) among university students. Unlike previous research that has primarily employed variable-centered approaches, this study first adopts a person-centered approach using Latent Profile Analysis (LPA) to identify distinct mattering profiles. Subsequently, through variable-centered analyses, these profiles are examined in relation to different types of PIU—specifically problematic social media use (PSMU) and problematic gaming (PG)—as well as adaptability. Methods: Data were collected from 3587 university students across 19 universities in China. Participants completed… More >

  • Open Access

    ARTICLE

    Software Defined Range-Proof Authentication Mechanism for Untraceable Digital ID

    So-Eun Jeon1, Yeon-Ji Lee2, Il-Gu Lee1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3213-3228, 2025, DOI:10.32604/cmes.2025.062082 - 03 March 2025

    Abstract The Internet of Things (IoT) is extensively applied across various industrial domains, such as smart homes, factories, and intelligent transportation, becoming integral to daily life. Establishing robust policies for managing and governing IoT devices is imperative. Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols. Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations, which are impractical for lightweight devices. To address this, our study introduces the privacy-preserving software-defined range proof (SDRP) model, which achieves secure authentication with low complexity. SDRP minimizes the More >

  • Open Access

    ARTICLE

    ANNDRA-IoT: A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments

    Abdullah M. Alqahtani1,*, Kamran Ahmad Awan2, Abdulaziz Almaleh3, Osama Aletri4

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 3155-3179, 2025, DOI:10.32604/cmes.2025.061472 - 03 March 2025

    Abstract Efficient resource management within Internet of Things (IoT) environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities. This study introduces a neural network-based model that uses Long-Short-Term Memory (LSTM) to optimize resource allocation under dynamically changing conditions. Designed to monitor the workload on individual IoT nodes, the model incorporates long-term data dependencies, enabling adaptive resource distribution in real time. The training process utilizes Min-Max normalization and grid search for hyperparameter tuning, ensuring high resource utilization and consistent performance. The simulation results demonstrate the effectiveness of the proposed method, More >

  • Open Access

    ARTICLE

    Quantum Inspired Adaptive Resource Management Algorithm for Scalable and Energy Efficient Fog Computing in Internet of Things (IoT)

    Sonia Khan1, Naqash Younas2, Musaed Alhussein3, Wahib Jamal Khan2, Muhammad Shahid Anwar4,*, Khursheed Aurangzeb3

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2641-2660, 2025, DOI:10.32604/cmes.2025.060973 - 03 March 2025

    Abstract Effective resource management in the Internet of Things and fog computing is essential for efficient and scalable networks. However, existing methods often fail in dynamic and high-demand environments, leading to resource bottlenecks and increased energy consumption. This study aims to address these limitations by proposing the Quantum Inspired Adaptive Resource Management (QIARM) model, which introduces novel algorithms inspired by quantum principles for enhanced resource allocation. QIARM employs a quantum superposition-inspired technique for multi-state resource representation and an adaptive learning component to adjust resources in real time dynamically. In addition, an energy-aware scheduling module minimizes power More >

  • Open Access

    ARTICLE

    A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles

    Meng-Hua Yen1,*, Nilamadhab Mishra2,*, Win-Jet Luo3, Chu-En Lin1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1839-1855, 2025, DOI:10.32604/cmc.2025.060903 - 17 February 2025

    Abstract The Internet of Everything (IoE) coupled with Proactive Artificial Intelligence (AI)-Based Learning Agents (PLAs) through a cloud processing system is an idea that connects all computing resources to the Internet, making it possible for these devices to communicate with one another. Technologies featured in the IoE include embedding, networking, and sensing devices. To achieve the intended results of the IoE and ease life for everyone involved, sensing devices and monitoring systems are linked together. The IoE is used in several contexts, including intelligent cars’ protection, navigation, security, and fuel efficiency. The Smart Things Monitoring System… More >

  • Open Access

    ARTICLE

    HybridEdge: A Lightweight and Secure Hybrid Communication Protocol for the Edge-Enabled Internet of Things

    Amjad Khan1, Rahim Khan1,*, Fahad Alturise2,*, Tamim Alkhalifah3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3161-3178, 2025, DOI:10.32604/cmc.2025.060372 - 17 February 2025

    Abstract The Internet of Things (IoT) and edge-assisted networking infrastructures are capable of bringing data processing and accessibility services locally at the respective edge rather than at a centralized module. These infrastructures are very effective in providing a fast response to the respective queries of the requesting modules, but their distributed nature has introduced other problems such as security and privacy. To address these problems, various security-assisted communication mechanisms have been developed to safeguard every active module, i.e., devices and edges, from every possible vulnerability in the IoT. However, these methodologies have neglected one of the… More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

Displaying 51-60 on page 6 of 675. Per Page