Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (39)
  • Open Access

    ARTICLE

    Efficient Autonomous Defense System Using Machine Learning on Edge Device

    Jaehyuk Cho*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3565-3588, 2022, DOI:10.32604/cmc.2022.020826

    Abstract As a large amount of data needs to be processed and speed needs to be improved, edge computing with ultra-low latency and ultra-connectivity is emerging as a new paradigm. These changes can lead to new cyber risks, and should therefore be considered for a security threat model. To this end, we constructed an edge system to study security in two directions, hardware and software. First, on the hardware side, we want to autonomically defend against hardware attacks such as side channel attacks by configuring field programmable gate array (FPGA) which is suitable for edge computing and identifying communication status to… More >

  • Open Access

    ARTICLE

    Real-Time Network Intrusion Prevention System Using Incremental Feature Generation

    Yeongje Uhm1, Wooguil Pak2,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1631-1648, 2022, DOI:10.32604/cmc.2022.019667

    Abstract Security measures are urgently required to mitigate the recent rapid increase in network security attacks. Although methods employing machine learning have been researched and developed to detect various network attacks effectively, these are passive approaches that cannot protect the network from attacks, but detect them after the end of the session. Since such passive approaches cannot provide fundamental security solutions, we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends. The proposed technology uses a two-level classifier structure: the first-stage classifier supports real-time classification, and the second-stage classifier… More >

  • Open Access

    ARTICLE

    Towards Prevention of Sportsmen Burnout: Formal Analysis of Sub-Optimal Tournament Scheduling

    Syed Rameez Naqvi1, Adnan Ahmad1, S. M. Riazul Islam2,*, Tallha Akram1, M. Abdullah-Al-Wadud3, Atif Alamri4

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1509-1526, 2022, DOI:10.32604/cmc.2022.019653

    Abstract Scheduling a sports tournament is a complex optimization problem, which requires a large number of hard constraints to satisfy. Despite the availability of several such constraints in the literature, there remains a gap since most of the new sports events pose their own unique set of requirements, and demand novel constraints. Specifically talking of the strictly time bound events, ensuring fairness between the different teams in terms of their rest days, traveling, and the number of successive games they play, becomes a difficult task to resolve, and demands attention. In this work, we present a similar situation with a recently… More >

  • Open Access

    ARTICLE

    Numerical Solutions of a Novel Designed Prevention Class in the HIV Nonlinear Model

    Zulqurnain Sabir1, Muhammad Umar1, Muhammad Asif Zahoor Raja2,*, Dumitru Baleanu3,4

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.1, pp. 227-251, 2021, DOI:10.32604/cmes.2021.016611

    Abstract The presented research aims to design a new prevention class (P) in the HIV nonlinear system, i.e., the HIPV model. Then numerical treatment of the newly formulated HIPV model is portrayed handled by using the strength of stochastic procedure based numerical computing schemes exploiting the artificial neural networks (ANNs) modeling legacy together with the optimization competence of the hybrid of global and local search schemes via genetic algorithms (GAs) and active-set approach (ASA), i.e., GA-ASA. The optimization performances through GA-ASA are accessed by presenting an error-based fitness function designed for all the classes of the HIPV model and its corresponding… More >

  • Open Access

    Management of Schemes and Threat Prevention in ICS Partner Companies Security

    Sangdo Lee1, Jun-Ho Huh2,*

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3659-3684, 2021, DOI:10.32604/cmc.2021.015632

    Abstract An analysis of the recent major security incidents related to industrial control systems, revealed that most had been caused by company employees. Therefore, enterprise security management systems have been developed to focus on companies’ personnel. Nonetheless, several hacking incidents, involving major companies and public/financial institutions, were actually attempted by the cooperative firms or the outsourced manpower undertaking maintenance work. Specifically, institutions that operate industrial control systems (ICSs) associated with critical national infrastructures, such as traffic or energy, have contracted several cooperative firms. Nonetheless, ICT's importance is gradually increasing, due to outsourcing, and is the most vulnerable factor in security. This… More >

  • Open Access

    ARTICLE

    Development of Mental Health Literacy Scale for Depression Affecting the Help-Seeking Process in Health Professional Students

    Soshi Kodama1,*, Koichi Shido2, Nozomu Ikeda3

    International Journal of Mental Health Promotion, Vol.23, No.3, pp. 331-352, 2021, DOI:10.32604/IJMHP.2021.016337

    Abstract Despite depression being a global mental health disorder, many people with depression do not seek psychiatric help. In particular, it has been reported that only 15.7% of medical students seek treatment. A longer duration of untreated illness (DUI) leads to clinically poor results. To shorten the DUI, the mental health literacy (MHL) with regard to depression needs to be improved, although it is unclear which MHL components will improve the help-seeking process. Additionally, the existing MHL scale for depression is poorly validated for structural validity. Therefore, the purpose of this study was to develop an MHL scale for depression with… More >

  • Open Access

    ARTICLE

    Trust Management-Based Service Recovery and Attack Prevention in MANET

    V. Nivedita1,*, N. Nandhagopal2

    Intelligent Automation & Soft Computing, Vol.29, No.3, pp. 771-786, 2021, DOI:10.32604/iasc.2021.017547

    Abstract The mobile ad-hoc network (MANET) output is critically impaired by the versatility and resource constraint of nodes. Node mobility affects connection reliability, and node resource constraints can lead to congestion, which makes the design of a routing MANET protocol with quality of service (QoS) very difficult. An adaptive clustering reputation model (ACRM) method is proposed to improve energy efficiency with a cluster-based framework. The proposed framework is employed to overcome the problems of data protection, privacy, and policy. The proposed ACRM-MRT approach that includes direct and indirect node trust computation is introduced along with the master recovery timer (MRT) for… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions in the voice, the data… More >

  • Open Access

    ARTICLE

    Detecting Man-in-the-Middle Attack in Fog Computing for Social Media

    Farouq Aliyu1,*, Tarek Sheltami1, Ashraf Mahmoud1, Louai Al-Awami1, Ansar Yasar2

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1159-1181, 2021, DOI:10.32604/cmc.2021.016938

    Abstract Fog computing (FC) is a networking paradigm where wireless devices known as fog nodes are placed at the edge of the network (close to the Internet of Things (IoT) devices). Fog nodes provide services in lieu of the cloud. Thus, improving the performance of the network and making it attractive to social media-based systems. Security issues are one of the most challenges encountered in FC. In this paper, we propose an anomaly-based Intrusion Detection and Prevention System (IDPS) against Man-in-the-Middle (MITM) attack in the fog layer. The system uses special nodes known as Intrusion Detection System (IDS) nodes to detect… More >

  • Open Access

    ARTICLE

    Web Attack Detection Using the Input Validation Method: DPDA Theory

    Osamah Ibrahim Khalaf1, Munsif Sokiyna2,*, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3167-3184, 2021, DOI:10.32604/cmc.2021.016099

    Abstract A major issue while building web applications is proper input validation and sanitization. Attackers can quickly exploit errors and vulnerabilities that lead to malicious behavior in web application validation operations. Attackers are rapidly improving their capabilities and technologies and now focus on exploiting vulnerabilities in web applications and compromising confidentiality. Cross-site scripting (XSS) and SQL injection attack (SQLIA) are attacks in which a hacker sends malicious inputs (cheat codes) to confuse a web application, to access or disable the application’s back-end without user awareness. In this paper, we explore the problem of detecting and removing bugs from both client-side and… More >

Displaying 21-30 on page 3 of 39. Per Page