Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    Effective Controller Placement in Software-Defined Internet-of-Things Leveraging Deep Q-Learning (DQL)

    Jehad Ali1,*, Mohammed J. F. Alenazi2

    CMC-Computers, Materials & Continua, Vol.81, No.3, pp. 4015-4032, 2024, DOI:10.32604/cmc.2024.058480 - 19 December 2024

    Abstract The controller is a main component in the Software-Defined Networking (SDN) framework, which plays a significant role in enabling programmability and orchestration for 5G and next-generation networks. In SDN, frequent communication occurs between network switches and the controller, which manages and directs traffic flows. If the controller is not strategically placed within the network, this communication can experience increased delays, negatively affecting network performance. Specifically, an improperly placed controller can lead to higher end-to-end (E2E) delay, as switches must traverse more hops or encounter greater propagation delays when communicating with the controller. This paper introduces… More >

  • Open Access

    ARTICLE

    Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

    S. Ashwini*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3043-3056, 2023, DOI:10.32604/iasc.2023.034551 - 15 March 2023

    Abstract Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is… More >

  • Open Access

    ARTICLE

    Voting Classifier and Metaheuristic Optimization for Network Intrusion Detection

    Doaa Sami Khafaga1, Faten Khalid Karim1,*, Abdelaziz A. Abdelhamid2,3, El-Sayed M. El-kenawy4, Hend K. Alkahtani1, Nima Khodadadi5, Mohammed Hadwan6, Abdelhameed Ibrahim7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3183-3198, 2023, DOI:10.32604/cmc.2023.033513 - 31 October 2022

    Abstract Managing physical objects in the network’s periphery is made possible by the Internet of Things (IoT), revolutionizing human life. Open attacks and unauthorized access are possible with these IoT devices, which exchange data to enable remote access. These attacks are often detected using intrusion detection methodologies, although these systems’ effectiveness and accuracy are subpar. This paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic optimization. The employed metaheuristic optimizer is a new version of the whale optimization algorithm (WOA), which is guided by the dipper… More >

  • Open Access

    ARTICLE

    Network Intrusion Detection Based on Feature Selection and Hybrid Metaheuristic Optimization

    Reem Alkanhel1, El-Sayed M. El-kenawy2, Abdelaziz A. Abdelhamid3,4, Abdelhameed Ibrahim5, Manal Abdullah Alohali6, Mostafa Abotaleb7, Doaa Sami Khafaga8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2677-2693, 2023, DOI:10.32604/cmc.2023.033273 - 31 October 2022

    Abstract Applications of internet-of-things (IoT) are increasingly being used in many facets of our daily life, which results in an enormous volume of data. Cloud computing and fog computing, two of the most common technologies used in IoT applications, have led to major security concerns. Cyberattacks are on the rise as a result of the usage of these technologies since present security measures are insufficient. Several artificial intelligence (AI) based security solutions, such as intrusion detection systems (IDS), have been proposed in recent years. Intelligent technologies that require data preprocessing and machine learning algorithm-performance augmentation require… More >

  • Open Access

    ARTICLE

    Logistic Regression Trust–A Trust Model for Internet-of-Things Using Regression Analysis

    Feslin Anish Mon Solomon1,*, Godfrey Winster Sathianesan2, R. Ramesh3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1125-1142, 2023, DOI:10.32604/csse.2023.024292 - 15 June 2022

    Abstract Internet of Things (IoT) is a popular social network in which devices are virtually connected for communicating and sharing information. This is applied greatly in business enterprises and government sectors for delivering the services to their customers, clients and citizens. But, the interaction is successful only based on the trust that each device has on another. Thus trust is very much essential for a social network. As Internet of Things have access over sensitive information, it urges to many threats that lead data management to risk. This issue is addressed by trust management that help… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Topological Infrastructure in Internet-of-Things-Enabled Serious Games

    Shabir Ahmad, Faheem Khan, Taeg Keun Whangbo*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2653-2666, 2022, DOI:10.32604/cmc.2022.022821 - 07 December 2021

    Abstract Serious games have recently enticed many researchers due to their wide range of capabilities. A serious game is a mean of gaming for a serious job such as healthcare, education, and entertainment purposes. With the advancement in the Internet of Things, new research directions are paving the way in serious games. However, the internet connectivity of players in Internet-of-things-enabled serious games is a matter of concern and has been worth investigating. Different studies on topologies, frameworks, and architecture of communication technologies are conducted to integrate them with serious games on machine and network levels. However,… More >

  • Open Access

    ARTICLE

    An Architecture Supporting Intelligent Mobile Healthcare Using Human-Computer Interaction HCI Principles

    Mesfer Alrizq1, Shauban Ali Solangi2, Abdullah Alghamdi1,*, Muhammad Ali Nizamani2, Muhammad Ali Memon2, Mohammed Hamdi1

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 557-569, 2022, DOI:10.32604/csse.2022.018800 - 09 September 2021

    Abstract Recent advancements in the Internet of Things IoT and cloud computing have paved the way for mobile Healthcare (mHealthcare) services. A patient within the hospital is monitored by several devices. Moreover, upon leaving the hospital, the patient can be remotely monitored whether directly using body wearable sensors or using a smartphone equipped with sensors to monitor different user-health parameters. This raises potential challenges for intelligent monitoring of patient’s health. In this paper, an improved architecture for smart mHealthcare is proposed that is supported by HCI design principles. The HCI also provides the support for the… More >

  • Open Access

    ARTICLE

    Security Empowered System-on-Chip Selection for Internet of Things

    Ramesh Krishnamoorthy*, Kalimuthu Krishnan

    Intelligent Automation & Soft Computing, Vol.30, No.2, pp. 403-418, 2021, DOI:10.32604/iasc.2021.018560 - 11 August 2021

    Abstract Due to the rapid growth of embedded devices, the selection of System-on-Chip (SoC) has a stronger influence to enable hardware security in embedded system design. System-on-chip (SoC) devices consist of one or more CPUs through wide-ranging inbuilt peripherals for designing a system with less cost. The selection of SoC is more significant to determine the suitability for secured application development. The design space analysis of symmetric key approaches including rivest cipher (RC5), advanced encryption standard (AES), data encryption standard (DES), international data encryption algorithm (IDEA), elliptic curve cryptography (ECC), MX algorithm, and the secure hash… More >

  • Open Access

    ARTICLE

    A Trusted NUMFabric Algorithm for Congestion Price Calculation at the Internet-of-Things Datacenter

    Shan Chun1, Xiaolong Chen2, Guoqiang Deng3,*, Hao Liu4

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.3, pp. 1203-1216, 2021, DOI:10.32604/cmes.2021.012230 - 19 February 2021

    Abstract The important issues of network TCP congestion control are how to compute the link price according to the link status and regulate the data sending rate based on link congestion pricing feedback information. However, it is difficult to predict the congestion state of the link-end accurately at the source. In this paper, we presented an improved NUMFabric algorithm for calculating the overall congestion price. In the proposed scheme, the whole network structure had been obtained by the central control server in the Software Defined Network, and a kind of dual-hierarchy algorithm for calculating overall network… More >

Displaying 1-10 on page 1 of 13. Per Page