Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (814)
  • Open Access

    ARTICLE

    Enhancing Malware Detection Resilience: A U-Net GAN Denoising Framework for Image-Based Classification

    Huiyao Dong1, Igor Kotenko2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4263-4285, 2025, DOI:10.32604/cmc.2025.062439 - 06 March 2025

    Abstract The growing complexity of cyber threats requires innovative machine learning techniques, and image-based malware classification opens up new possibilities. Meanwhile, existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection, and there is a critical gap in using noise simulation as a means of replicating real-world malware obfuscation techniques and adopting denoising framework to counteract these challenges. This study introduces an image denoising technique based on a U-Net combined with a GAN framework to address noise interference and obfuscation challenges in image-based malware analysis. The… More >

  • Open Access

    ARTICLE

    GENOME: Genetic Encoding for Novel Optimization of Malware Detection and Classification in Edge Computing

    Sang-Hoon Choi1, Ki-Woong Park2,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4021-4039, 2025, DOI:10.32604/cmc.2025.061267 - 06 March 2025

    Abstract The proliferation of Internet of Things (IoT) devices has established edge computing as a critical paradigm for real-time data analysis and low-latency processing. Nevertheless, the distributed nature of edge computing presents substantial security challenges, rendering it a prominent target for sophisticated malware attacks. Existing signature-based and behavior-based detection methods are ineffective against the swiftly evolving nature of malware threats and are constrained by the availability of resources. This paper suggests the Genetic Encoding for Novel Optimization of Malware Evaluation (GENOME) framework, a novel solution that is intended to improve the performance of malware detection and… More >

  • Open Access

    ARTICLE

    Unknown DDoS Attack Detection with Sliced Iterative Normalizing Flows Technique

    Chin-Shiuh Shieh1, Thanh-Lam Nguyen1, Thanh-Tuan Nguyen2,*, Mong-Fong Horng1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4881-4912, 2025, DOI:10.32604/cmc.2025.061001 - 06 March 2025

    Abstract DDoS attacks represent one of the most pervasive and evolving threats in cybersecurity, capable of crippling critical infrastructures and disrupting services globally. As networks continue to expand and threats become more sophisticated, there is an urgent need for Intrusion Detection Systems (IDS) capable of handling these challenges effectively. Traditional IDS models frequently have difficulties in detecting new or changing attack patterns since they heavily depend on existing characteristics. This paper presents a novel approach for detecting unknown Distributed Denial of Service (DDoS) attacks by integrating Sliced Iterative Normalizing Flows (SINF) into IDS. SINF utilizes the… More >

  • Open Access

    ARTICLE

    An Intrusion Detection System Based on HiTar-2024 Dataset Generation from LOG Files for Smart Industrial Internet-of-Things Environment

    Tarak Dhaouadi1, Hichem Mrabet1,2,*, Adeeb Alhomoud3, Abderrazak Jemai1,4

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4535-4554, 2025, DOI:10.32604/cmc.2025.060935 - 06 March 2025

    Abstract The increasing adoption of Industrial Internet of Things (IIoT) systems in smart manufacturing is leading to raise cyberattack numbers and pressing the requirement for intrusion detection systems (IDS) to be effective. However, existing datasets for IDS training often lack relevance to modern IIoT environments, limiting their applicability for research and development. To address the latter gap, this paper introduces the HiTar-2024 dataset specifically designed for IIoT systems. As a consequence, that can be used by an IDS to detect imminent threats. Likewise, HiTar-2024 was generated using the AREZZO simulator, which replicates realistic smart manufacturing scenarios.… More >

  • Open Access

    ARTICLE

    An Improved Hybrid Deep Learning Approach for Security Requirements Classification

    Shoaib Hassan1,*, Qianmu Li1,*, Muhammad Zubair2, Rakan A. Alsowail3, Muhammad Umair2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4041-4067, 2025, DOI:10.32604/cmc.2025.059832 - 06 March 2025

    Abstract As the trend to use the latest machine learning models to automate requirements engineering processes continues, security requirements classification is tuning into the most researched field in the software engineering community. Previous literature studies have proposed numerous models for the classification of security requirements. However, adopting those models is constrained due to the lack of essential datasets permitting the repetition and generalization of studies employing more advanced machine learning algorithms. Moreover, most of the researchers focus only on the classification of requirements with security keywords. They did not consider other nonfunctional requirements (NFR) directly or… More >

  • Open Access

    ARTICLE

    Utilizing Fine-Tuning of Large Language Models for Generating Synthetic Payloads: Enhancing Web Application Cybersecurity through Innovative Penetration Testing Techniques

    Stefan Ćirković1, Vladimir Mladenović1, Siniša Tomić2, Dalibor Drljača2, Olga Ristić1,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4409-4430, 2025, DOI:10.32604/cmc.2025.059696 - 06 March 2025

    Abstract With the increasing use of web applications, challenges in the field of cybersecurity are becoming more complex. This paper explores the application of fine-tuned large language models (LLMs) for the automatic generation of synthetic attacks, including XSS (Cross-Site Scripting), SQL Injections, and Command Injections. A web application has been developed that allows penetration testers to quickly generate high-quality payloads without the need for in-depth knowledge of artificial intelligence. The fine-tuned language model demonstrates the capability to produce synthetic payloads that closely resemble real-world attacks. This approach not only improves the model’s precision and dependability but… More >

  • Open Access

    ARTICLE

    Blockchain-Based Trust Model for Inter-Domain Routing

    Qiong Yang1, Li Ma1,2,*, Sami Ullah3, Shanshan Tu1, Hisham Alasmary4, Muhammad Waqas5,6

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4821-4839, 2025, DOI:10.32604/cmc.2025.059497 - 06 March 2025

    Abstract Border Gateway Protocol (BGP), as the standard inter-domain routing protocol, is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems (AS). BGP nodes, communicating in a distributed dynamic environment, face several security challenges, with trust being one of the most important issues in inter-domain routing. Existing research, which performs trust evaluation when exchanging routing information to suppress malicious routing behavior, cannot meet the scalability requirements of BGP nodes. In this paper, we propose a blockchain-based trust model for inter-domain routing. Our model achieves scalability by allowing the master node of… More >

  • Open Access

    ARTICLE

    Real-Time Identity Authentication Scheme Based on Dynamic Credentials for Power AIGC System

    Feng Wei*, Zhao Chen, Yin Wang, Dongqing Liu, Xun Zhang, Zhao Zhou

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5325-5341, 2025, DOI:10.32604/cmc.2025.058802 - 06 March 2025

    Abstract The integration of artificial intelligence (AI) with advanced power technologies is transforming energy system management, particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content (AIGC). However, the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions. Although traditional public key cryptographic primitives can offer high security, the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems. To ensure the real-time and security of power data… More >

  • Open Access

    ARTICLE

    Smart Grid Security Framework for Data Transmissions with Adaptive Practices Using Machine Learning Algorithm

    Shitharth Selvarajan1,2,3,*, Hariprasath Manoharan4, Taher Al-Shehari5, Hussain Alsalman6, Taha Alfakih7

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4339-4369, 2025, DOI:10.32604/cmc.2025.056100 - 06 March 2025

    Abstract This research presents an analysis of smart grid units to enhance connected units’ security during data transmissions. The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring, data expansion, control association, throughput, and losses. In addition, all the above-mentioned aspects are carried out with neural networks and adaptive optimizations to enhance the operation of smart grid networks. Moreover, the quantitative analysis of the optimization algorithm is discussed concerning two case studies, thereby achieving early convergence at reduced complexities. The suggested method ensures that each communication More >

  • Open Access

    ARTICLE

    Relationship between Psychological Security and Fear of Missing Out among University Students: A Moderated Mediation Model

    Xiaowen Wan1, Wenbin Sheng1, Rong Huang1, Cheng Zeng1, Xu Zhou2,*, Yuan Wu3, Xiaohui Cao1, Xiaoke Chen1

    International Journal of Mental Health Promotion, Vol.27, No.2, pp. 215-229, 2025, DOI:10.32604/ijmhp.2025.059074 - 03 March 2025

    Abstract Background: As the digital age progresses, fear of missing out (FoMO) is becoming increasingly common, and the impact factor of FOMO needs to be further investigated. This study aims to explore the relationship between psychological security (PS) and FoMO by analyzing the mediating role of social networking addiction (SNA) and the moderating role of social self-efficacy (SSE). Methods: We collected a sample of 1181 college students (with a mean age of 19.67 ± 1.38 years) from five universities in a province of mainland China through cluster sampling. Data were gathered using the psychological security questionnaire… More >

Displaying 1-10 on page 1 of 814. Per Page