Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (78)
  • Open Access

    ARTICLE

    HDLIDP: A Hybrid Deep Learning Intrusion Detection and Prevention Framework

    Magdy M. Fadel1,*, Sally M. El-Ghamrawy2, Amr M. T. Ali-Eldin1, Mohammed K. Hassan3, Ali I. El-Desoky1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2293-2312, 2022, DOI:10.32604/cmc.2022.028287 - 16 June 2022

    Abstract Distributed denial-of-service (DDoS) attacks are designed to interrupt network services such as email servers and webpages in traditional computer networks. Furthermore, the enormous number of connected devices makes it difficult to operate such a network effectively. Software defined networks (SDN) are networks that are managed through a centralized control system, according to researchers. This controller is the brain of any SDN, composing the forwarding table of all data plane network switches. Despite the advantages of SDN controllers, DDoS attacks are easier to perpetrate than on traditional networks. Because the controller is a single point of More >

  • Open Access

    ARTICLE

    Early DDoS Detection and Prevention with Traced-Back Blocking in SDN Environment

    Sriramulu Bojjagani1, D. R. Denslin Brabin2,*, K. Saravanan2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 805-819, 2022, DOI:10.32604/iasc.2022.023771 - 03 May 2022

    Abstract The flow of information is a valuable asset for every company and its consumers, and Distributed Denial-of-Service (DDoS) assaults pose a substantial danger to this flow. If we do not secure security, hackers may steal information flowing across a network, posing a danger to a business and society. As a result, the most effective ways are necessary to deal with the dangers. A DDoS attack is a well-known network infrastructure assault that prevents servers from servicing genuine customers. It is necessary to identify and block a DDoS assault before it reaches the server in order… More >

  • Open Access

    ARTICLE

    Decentralized Link Failure Prevention Routing (DLFPR) Algorithm for Efficient Internet of Things

    D. Kothandaraman1,*, M. Manickam2, A. Balasundaram3, D. Pradeep4, A. Arulmurugan5, Arun Kumar Sivaraman6, Sita Rani7, Barnali Dey8, R. Balakrishna9

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 655-666, 2022, DOI:10.32604/iasc.2022.024134 - 15 April 2022

    Abstract This work implements a Decentralized Links Failure Prevention (DLFP) routing algorithm to promote enhanced and efficient Internet of Things (IoT). The work increases the mobility as well as an opportunity for loss of IoT node meeting links due to both mobility and blockers/interferers. The proposed algorithm overcomes loss issues as well as works in dynamically allocating alternate route from other IoT nodes available in near and selecting for efficient route in the network. When the link fails, bandwidth is reduced and coverage area problems for packets sending from source to destination is managed. The proposed… More >

  • Open Access

    ARTICLE

    Behavioral Intrusion Prediction Model on Bayesian Network over Healthcare Infrastructure

    Mohammad Hafiz Mohd Yusof1,*, Abdullah Mohd Zin2, Nurhizam Safie Mohd Satar2

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2445-2466, 2022, DOI:10.32604/cmc.2022.023571 - 29 March 2022

    Abstract Due to polymorphic nature of malware attack, a signature-based analysis is no longer sufficient to solve polymorphic and stealth nature of malware attacks. On the other hand, state-of-the-art methods like deep learning require labelled dataset as a target to train a supervised model. This is unlikely to be the case in production network as the dataset is unstructured and has no label. Hence an unsupervised learning is recommended. Behavioral study is one of the techniques to elicit traffic pattern. However, studies have shown that existing behavioral intrusion detection model had a few issues which had… More >

  • Open Access

    ARTICLE

    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025 - 24 February 2022

    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain.… More >

  • Open Access

    ARTICLE

    On the Selection of a Composite Material for Two-Wheeler Foot Bracket Failure Prevention through Simulation and Mathematical Modeling

    S. M. Sivagami1, A. Bovas Herbert Bejaxhin2,*, R. Gayathri1, T. Raja Vijay1, K. Punitharani3, P. Keerthi Vasan1, M. Meignanamoorthy4

    FDMP-Fluid Dynamics & Materials Processing, Vol.18, No.3, pp. 521-536, 2022, DOI:10.32604/fdmp.2022.018752 - 22 February 2022

    Abstract A foot bracket is a metal panel bracket used to mount and support the footrest in two-wheeler systems. It holds the footrest in place while rigidly supporting it. In working conditions, this element has often been observed to fail when specific load-fluctuation conditions are established at its rear end. Appropriate materials therefore need to be identified to overcome such a recurring failure. To address these issues, the present study has been implemented with the specific objective to determine the response of selected Al6061-T6 and Al7075-T6 Hybrid Metal Matrix Composites (HMMC). The results, obtained using the More >

  • Open Access

    ARTICLE

    Secretome-microRNA and anti-proliferative APRO family proteins as cancer prevention and stem cell research strategies

    YUKA IKEDA, NOZOMI NAGASE, AI TSUJI, KURUMI TANIGUCHI, YASUKO KITAGISHI, SATORU MATSUDA*

    BIOCELL, Vol.46, No.5, pp. 1163-1167, 2022, DOI:10.32604/biocell.2022.018177 - 06 January 2022

    Abstract Stemness of cancer cells contains limitless self-renewal proliferation. For the purpose of proliferation, secretome might exert its effects via the paracrine signaling. Specific microRNAs enclosed in the secretome of cancer stem cells could regulate the expression of anti-proliferative APRO family proteins. The biological functions of APRO family proteins seems to be quite intricate, however, which might be a key modulator of microRNAs, then could regulate the proliferation of cancer cells. In addition to affecting proliferation/differentiation during cellular development, APRO family proteins might also play an imperious role on keeping homeostasis in healthy stem cells under a More >

  • Open Access

    ARTICLE

    Grey Hole Attack Detection and Prevention Methods in Wireless Sensor Networks

    Gowdham Chinnaraju*, S. Nithyanandam

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 373-386, 2022, DOI:10.32604/csse.2022.020993 - 02 December 2021

    Abstract Wireless Sensor Networks (WSNs) gained wide attention in the past decade, thanks to its attractive features like flexibility, monitoring capability, and scalability. It overcomes the crucial problems experienced in network management and facilitates the development of diverse network architectures. The existence of dynamic and adaptive routing features facilitate the quick formation of such networks. But flexible architecture also makes it highly vulnerable to different sorts of attacks, for instance, Denial of Service (DoS). Grey Hole Attack (GHA) is the most crucial attack types since it creates a heavy impact upon the components of WSN and… More >

  • Open Access

    ARTICLE

    Calcium supplementation in colorectal cancer prevention: A systematic meta-analysis of adverse events

    XUE MEI LUO1, SHAHANAVAJ KHAN2,3,4,*, ABDUL MALIK2, FAHAD M. ALDAKHEEL5, ANIS AHMAD CHAUDHARY6, SHOUKI BAZARBASHI7, FATEMEH TABATABAIE8

    BIOCELL, Vol.46, No.3, pp. 759-767, 2022, DOI:10.32604/biocell.2022.016586 - 18 November 2021

    Abstract Despite the multiple systematic reviews and meta-analyses accumulating evidence on the preventive effect of calcium supplementation for colorectal cancer, most of the associated adverse effects are not systematically analyzed. The aim of the study is evaluating adverse events associated with calcium supplementation for colorectal cancer prevention through a systematic meta-analysis. We searched Medline, PubMed Central, EMBASE (Excerpta Medica database), Scopus, Cochrane Central Register of Controlled Trials, and Web of Science published in English from database inception up to 31 July 2019. In the current systematic meta-analysis, we included human studies (including cohort studies, clinical trials,… More >

  • Open Access

    ARTICLE

    Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning

    M. Prabhavathy1,*, S. UmaMaheswari2

    Intelligent Automation & Soft Computing, Vol.32, No.1, pp. 101-114, 2022, DOI:10.32604/iasc.2022.018257 - 26 October 2021

    Abstract Cloud computing utilizes various Internet-based technologies to enhance the Internet user experience. Cloud systems are on the rise, as this technology has completely revolutionized the digital industry. Currently, many users rely on cloud-based solutions to acquire business information and knowledge. As a result, cloud computing services such as SaaS and PaaS store a warehouse of sensitive and valuable information, which has turned the cloud systems into the obvious target for many malware creators and hackers. These malicious attackers attempt to gain illegal access to a myriad of valuable information such as user personal information, password, More >

Displaying 41-50 on page 5 of 78. Per Page