Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access


    Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment

    Sriramulu Bojjagani1, D. R. Denslin Brabin2,*, K. Saravanan2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 805-819, 2022, DOI:10.32604/iasc.2022.023771

    Abstract The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary to deal with the dangers. A DDoS attack is a well-known network infrastructure assault that prevents servers from servicing genuine customers. It is necessary to identify and block a DDoS assault before it reaches the server in order to avoid being refused services.… More >

  • Open Access


    Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

    D. Kothandaraman1,*, M. Manickam2, A. Balasundaram3, D. Pradeep4, A. Arulmurugan5, Arun Kumar Sivaraman6, Sita Rani7, Barnali Dey8, R. Balakrishna9

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 655-666, 2022, DOI:10.32604/iasc.2022.024134

    Abstract This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed algorithm works with light-weight wireless… More >

  • Open Access


    Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure

    Mohammad Hafiz Mohd Yusof1,*, Abdullah Mohd Zin2, Nurhizam Safie Mohd Satar2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2445-2466, 2022, DOI:10.32604/cmc.2022.023571

    Abstract Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely to be the case in production network as the dataset is unstructured and has no label. Hence an unsupervised learning is recommended. Behavioral study is one of the techniques to elicit traffic pattern. However, studies have shown that existing behavioral intrusion detection model had a few issues which had been parameterized into its common… More >

  • Open Access


    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025

    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of… More >

  • Open Access


    On the Selection of a Composite Material for Two-Wheeler Foot Bracket Failure Prevention through Simulation and Mathematical Modeling

    S. M. Sivagami1, A. Bovas Herbert Bejaxhin2,*, R. Gayathri1, T. Raja Vijay1, K. Punitharani3, P. Keerthi Vasan1, M. Meignanamoorthy4

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.3, pp. 521-536, 2022, DOI:10.32604/fdmp.2022.018752

    Abstract A foot bracket is a metal panel bracket used to mount and support the footrest in two-wheeler systems. It holds the footrest in place while rigidly supporting it. In working conditions, this element has often been observed to fail when specific load-fluctuation conditions are established at its rear end. Appropriate materials therefore need to be identified to overcome such a recurring failure. To address these issues, the present study has been implemented with the specific objective to determine the response of selected Al6061-T6 and Al7075-T6 Hybrid Metal Matrix Composites (HMMC). The results, obtained using the ANSYS Software, show that the… More >

  • Open Access


    Secretome-microRNA and anti-proliferative APRO family proteins as cancer prevention and stem cell research strategies


    BIOCELL, Vol.46, No.5, pp. 1163-1167, 2022, DOI:10.32604/biocell.2022.018177

    Abstract Stemness of cancer cells contains limitless self-renewal proliferation. For the purpose of proliferation, secretome might exert its effects via the paracrine signaling. Specific microRNAs enclosed in the secretome of cancer stem cells could regulate the expression of anti-proliferative APRO family proteins. The biological functions of APRO family proteins seems to be quite intricate, however, which might be a key modulator of microRNAs, then could regulate the proliferation of cancer cells. In addition to affecting proliferation/differentiation during cellular development, APRO family proteins might also play an imperious role on keeping homeostasis in healthy stem cells under a physiological condition. Therefore, relationship… More >

  • Open Access


    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and eventually degrades the performance of… More >

  • Open Access


    Calcium supplementation in colorectal cancer prevention: A systematic meta-analysis of adverse events


    BIOCELL, Vol.46, No.3, pp. 759-767, 2022, DOI:10.32604/biocell.2022.016586

    Abstract Despite the multiple systematic reviews and meta-analyses accumulating evidence on the preventive effect of calcium supplementation for colorectal cancer, most of the associated adverse effects are not systematically analyzed. The aim of the study is evaluating adverse events associated with calcium supplementation for colorectal cancer prevention through a systematic meta-analysis. We searched Medline, PubMed Central, EMBASE (Excerpta Medica database), Scopus, Cochrane Central Register of Controlled Trials, and Web of Science published in English from database inception up to 31 July 2019. In the current systematic meta-analysis, we included human studies (including cohort studies, clinical trials, case-control studies) on supplementation of… More >

  • Open Access


    Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning

    M. Prabhavathy1,*, S. UmaMaheswari2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 101-114, 2022, DOI:10.32604/iasc.2022.018257

    Abstract Cloud computing utilizes various Internet-based technologies to enhance the Internet user experience. Cloud systems are on the rise, as this technology has completely revolutionized the digital industry. Currently, many users rely on cloud-based solutions to acquire business information and knowledge. As a result, cloud computing services such as SaaS and PaaS store a warehouse of sensitive and valuable information, which has turned the cloud systems into the obvious target for many malware creators and hackers. These malicious attackers attempt to gain illegal access to a myriad of valuable information such as user personal information, password, credit/debit card numbers, etc., from… More >

  • Open Access


    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious node attacks. As a consequence… More >

Displaying 11-20 on page 2 of 39. Per Page