Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (615)
  • Open Access

    ARTICLE

    Electromyogram Based Personal Recognition Using Attention Mechanism for IoT Security

    Jin Su Kim, Sungbum Pan*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1663-1678, 2023, DOI:10.32604/cmc.2023.043998

    Abstract As Internet of Things (IoT) technology develops, integrating network functions into diverse equipment introduces new challenges, particularly in dealing with counterfeit issues. Over the past few decades, research efforts have focused on leveraging electromyogram (EMG) for personal recognition, aiming to address security concerns. However, obtaining consistent EMG signals from the same individual is inherently challenging, resulting in data irregularity issues and consequently decreasing the accuracy of personal recognition. Notably, conventional studies in EMG-based personal recognition have overlooked the issue of data irregularities. This paper proposes an innovative approach to personal recognition that combines a siamese fusion network with an auxiliary… More >

  • Open Access

    ARTICLE

    A Mathematical Approach for Generating a Highly Non-Linear Substitution Box Using Quadratic Fractional Transformation

    Abid Mahboob1, Muhammad Asif2, Rana Muhammad Zulqarnain3,*, Imran Saddique4, Hijaz Ahmad5, Sameh Askar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2565-2578, 2023, DOI:10.32604/cmc.2023.040371

    Abstract Nowadays, one of the most important difficulties is the protection and privacy of confidential data. To address these problems, numerous organizations rely on the use of cryptographic techniques to secure data from illegal activities and assaults. Modern cryptographic ciphers use the non-linear component of block cipher to ensure the robust encryption process and lawful decoding of plain data during the decryption phase. For the designing of a secure substitution box (S-box), non-linearity (NL) which is an algebraic property of the S-box has great importance. Consequently, the main focus of cryptographers is to achieve the S-box with a high value of… More >

  • Open Access

    ARTICLE

    Leveraging Blockchain with Optimal Deep Learning-Based Drug Supply Chain Management for Pharmaceutical Industries

    Shanthi Perumalsamy, Venkatesh Kaliyamurthy*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2341-2357, 2023, DOI:10.32604/cmc.2023.040269

    Abstract Due to its complexity and involvement of numerous stakeholders, the pharmaceutical supply chain presents many challenges that companies must overcome to deliver necessary medications to patients efficiently. The pharmaceutical supply chain poses different challenging issues, encompasses supply chain visibility, cold-chain shipping, drug counterfeiting, and rising prescription drug prices, which can considerably surge out-of-pocket patient costs. Blockchain (BC) offers the technical base for such a scheme, as it could track legitimate drugs and avoid fake circulation. The designers presented the procedure of BC with fabric for creating a secured drug supply-chain management (DSCM) method. With this motivation, the study presents a… More >

  • Open Access

    REVIEW

    Ensuring User Privacy and Model Security via Machine Unlearning: A Review

    Yonghao Tang1, Zhiping Cai1,*, Qiang Liu1, Tongqing Zhou1, Qiang Ni2

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2645-2656, 2023, DOI:10.32604/cmc.2023.032307

    Abstract As an emerging discipline, machine learning has been widely used in artificial intelligence, education, meteorology and other fields. In the training of machine learning models, trainers need to use a large amount of practical data, which inevitably involves user privacy. Besides, by polluting the training data, a malicious adversary can poison the model, thus compromising model security. The data provider hopes that the model trainer can prove to them the confidentiality of the model. Trainer will be required to withdraw data when the trust collapses. In the meantime, trainers hope to forget the injected data to regain security when finding… More >

  • Open Access

    ARTICLE

    Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption

    Mohanad A. Mohammed*, Hala B. Abdul Wahab

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1731-1748, 2024, DOI:10.32604/cmes.2023.030528

    Abstract Blockchain technology has garnered significant attention from global organizations and researchers due to its potential as a solution for centralized system challenges. Concurrently, the Internet of Things (IoT) has revolutionized the Fourth Industrial Revolution by enabling interconnected devices to offer innovative services, ultimately enhancing human lives. This paper presents a new approach utilizing lightweight blockchain technology, effectively reducing the computational burden typically associated with conventional blockchain systems. By integrating this lightweight blockchain with IoT systems, substantial reductions in implementation time and computational complexity can be achieved. Moreover, the paper proposes the utilization of the Okamoto Uchiyama encryption algorithm, renowned for… More >

  • Open Access

    REVIEW

    A Survey on Sensor- and Communication-Based Issues of Autonomous UAVs

    Pavlo Mykytyn1,2,*, Marcin Brzozowski1, Zoya Dyka1,2, Peter Langendoerfer1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1019-1050, 2024, DOI:10.32604/cmes.2023.029075

    Abstract The application field for Unmanned Aerial Vehicle (UAV) technology and its adoption rate have been increasing steadily in the past years. Decreasing cost of commercial drones has enabled their use at a scale broader than ever before. However, increasing the complexity of UAVs and decreasing the cost, both contribute to a lack of implemented security measures and raise new security and safety concerns. For instance, the issue of implausible or tampered UAV sensor measurements is barely addressed in the current research literature and thus, requires more attention from the research community. The goal of this survey is to extensively review… More >

  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed to overcome the problems existing… More >

  • Open Access

    ARTICLE

    Security Test Case Prioritization through Ant Colony Optimization Algorithm

    Abdulaziz Attaallah1, Khalil al-Sulbi2, Areej Alasiry3, Mehrez Marzougui3, Mohd Waris Khan4,*, Mohd Faizan4, Alka Agrawal5, Dhirendra Pandey5

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3165-3195, 2023, DOI:10.32604/csse.2023.040259

    Abstract Security testing is a critical concern for organizations worldwide due to the potential financial setbacks and damage to reputation caused by insecure software systems. One of the challenges in software security testing is test case prioritization, which aims to reduce redundancy in fault occurrences when executing test suites. By effectively applying test case prioritization, both the time and cost required for developing secure software can be reduced. This paper proposes a test case prioritization technique based on the Ant Colony Optimization (ACO) algorithm, a metaheuristic approach. The performance of the ACO-based technique is evaluated using the Average Percentage of Fault… More >

  • Open Access

    ARTICLE

    Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF

    Zhen Zhen1, Jian Gao1,2,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 299-323, 2023, DOI:10.32604/cmc.2023.042090

    Abstract In recent years, cyber attacks have been intensifying and causing great harm to individuals, companies, and countries. The mining of cyber threat intelligence (CTI) can facilitate intelligence integration and serve well in combating cyber attacks. Named Entity Recognition (NER), as a crucial component of text mining, can structure complex CTI text and aid cybersecurity professionals in effectively countering threats. However, current CTI NER research has mainly focused on studying English CTI. In the limited studies conducted on Chinese text, existing models have shown poor performance. To fully utilize the power of Chinese pre-trained language models (PLMs) and conquer the problem… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst Method (BWM) method and Criteria… More >

Displaying 1-10 on page 1 of 615. Per Page