Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (16)
  • Open Access

    ARTICLE

    Social Engineering Attack Classifications on Social Media Using Deep Learning

    Yichiet Aun1,*, Ming-Lee Gan1, Nur Haliza Binti Abdul Wahab2, Goh Hock Guan1

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4917-4931, 2023, DOI:10.32604/cmc.2023.032373 - 28 December 2022

    Abstract In defense-in-depth, humans have always been the weakest link in cybersecurity. However, unlike common threats, social engineering poses vulnerabilities not directly quantifiable in penetration testing. Most skilled social engineers trick users into giving up information voluntarily through attacks like phishing and adware. Social Engineering (SE) in social media is structurally similar to regular posts but contains malicious intrinsic meaning within the sentence semantic. In this paper, a novel SE model is trained using a Recurrent Neural Network Long Short Term Memory (RNN-LSTM) to identify well-disguised SE threats in social media posts. We use a custom… More >

  • Open Access

    ARTICLE

    Prediction of Flash Flood Susceptibility of Hilly Terrain Using Deep Neural Network: A Case Study of Vietnam

    Huong Thi Thanh Ngo1, Nguyen Duc Dam1, Quynh-Anh Thi Bui1, Nadhir Al-Ansari2,*, Romulus Costache3,4,*, Hang Ha5, Quynh Duy Bui5, Sy Hung Mai6, Indra Prakash7, Binh Thai Pham1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 2219-2241, 2023, DOI:10.32604/cmes.2023.022566 - 23 November 2022

    Abstract Flash floods are one of the most dangerous natural disasters, especially in hilly terrain, causing loss of life, property, and infrastructures and sudden disruption of traffic. These types of floods are mostly associated with landslides and erosion of roads within a short time. Most of Vietnam is hilly and mountainous; thus, the problem due to flash flood is severe and requires systematic studies to correctly identify flood susceptible areas for proper landuse planning and traffic management. In this study, three Machine Learning (ML) methods namely Deep Learning Neural Network (DL), Correlation-based Feature Weighted Naive Bayes… More >

  • Open Access

    ARTICLE

    COVID-19 Outbreak Prediction by Using Machine Learning Algorithms

    Tahir Sher1, Abdul Rehman2, Dongsun Kim2,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1561-1574, 2023, DOI:10.32604/cmc.2023.032020 - 22 September 2022

    Abstract COVID-19 is a contagious disease and its several variants put under stress in all walks of life and economy as well. Early diagnosis of the virus is a crucial task to prevent the spread of the virus as it is a threat to life in the whole world. However, with the advancement of technology, the Internet of Things (IoT) and social IoT (SIoT), the versatile data produced by smart devices helped a lot in overcoming this lethal disease. Data mining is a technique that could be used for extracting useful information from massive data. In… More >

  • Open Access

    ARTICLE

    Detection Collision Flows in SDN Based 5G Using Machine Learning Algorithms

    Aqsa Aqdus1, Rashid Amin1,*, Sadia Ramzan1, Sultan S. Alshamrani2, Abdullah Alshehri3, El-Sayed M. El-kenawy4

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1413-1435, 2023, DOI:10.32604/cmc.2023.031719 - 22 September 2022

    Abstract The rapid advancement of wireless communication is forming a hyper-connected 5G network in which billions of linked devices generate massive amounts of data. The traffic control and data forwarding functions are decoupled in software-defined networking (SDN) and allow the network to be programmable. Each switch in SDN keeps track of forwarding information in a flow table. The SDN switches must search the flow table for the flow rules that match the packets to handle the incoming packets. Due to the obvious vast quantity of data in data centres, the capacity of the flow table restricts… More >

  • Open Access

    ARTICLE

    Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines

    Atif Ikram1,2,*, Masita Abdul Jalil1, Amir Bin Ngah1, Saqib Raza6, Ahmad Salman Khan3, Yasir Mahmood3,4, Nazri Kama4, Azri Azmi4, Assad Alzayed5

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1871-1886, 2023, DOI:10.32604/cmc.2023.030818 - 22 September 2022

    Abstract Software maintenance is the process of fixing, modifying, and improving software deliverables after they are delivered to the client. Clients can benefit from offshore software maintenance outsourcing (OSMO) in different ways, including time savings, cost savings, and improving the software quality and value. One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’ projects. The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients. The projects belong to… More >

  • Open Access

    ARTICLE

    Prediction of Suitable Candidates for COVID-19 Vaccination

    R. Sujatha1, B. Venkata Siva Krishna1, Jyotir Moy Chatterjee2, P. Rahul Naidu1, NZ Jhanjhi3,*, Challa Charita1, Eza Nerin Mariya1, Mohammed Baz4

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 525-541, 2022, DOI:10.32604/iasc.2022.021216 - 26 October 2021

    Abstract In the current times, COVID-19 has taken a handful of people’s lives. So, vaccination is crucial for everyone to avoid the spread of the disease. However, not every vaccine will be perfect or will get success for everyone. In the present work, we have analyzed the data from the Vaccine Adverse Event Reporting System and understood that the vaccines given to the people might or might not work considering certain demographic factors like age, gender, and multiple other variables like the state of living, etc. This variable is considered because it explains the unmentioned variables… More >

Displaying 11-20 on page 2 of 16. Per Page