Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (672)
  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification

    Qinyue Wu, Hui Xu*, Mengran Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4091-4107, 2024, DOI:10.32604/cmc.2024.048461

    Abstract Network traffic identification is critical for maintaining network security and further meeting various demands of network applications. However, network traffic data typically possesses high dimensionality and complexity, leading to practical problems in traffic identification data analytics. Since the original Dung Beetle Optimizer (DBO) algorithm, Grey Wolf Optimization (GWO) algorithm, Whale Optimization Algorithm (WOA), and Particle Swarm Optimization (PSO) algorithm have the shortcomings of slow convergence and easily fall into the local optimal solution, an Improved Dung Beetle Optimizer (IDBO) algorithm is proposed for network traffic identification. Firstly, the Sobol sequence is utilized to initialize the dung beetle population, laying the… More >

  • Open Access

    ARTICLE

    Enhancing PDF Malware Detection through Logistic Model Trees

    Muhammad Binsawad*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3645-3663, 2024, DOI:10.32604/cmc.2024.048183

    Abstract Malware is an ever-present and dynamic threat to networks and computer systems in cybersecurity, and because of its complexity and evasiveness, it is challenging to identify using traditional signature-based detection approaches. The study article discusses the growing danger to cybersecurity that malware hidden in PDF files poses, highlighting the shortcomings of conventional detection techniques and the difficulties presented by adversarial methodologies. The article presents a new method that improves PDF virus detection by using document analysis and a Logistic Model Tree. Using a dataset from the Canadian Institute for Cybersecurity, a comparative analysis is carried out with well-known machine learning… More >

  • Open Access

    ARTICLE

    A Security Trade-Off Scheme of Anomaly Detection System in IoT to Defend against Data-Tampering Attacks

    Bing Liu1, Zhe Zhang1, Shengrong Hu2, Song Sun3,*, Dapeng Liu4, Zhenyu Qiu5

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4049-4069, 2024, DOI:10.32604/cmc.2024.048099

    Abstract Internet of Things (IoT) is vulnerable to data-tampering (DT) attacks. Due to resource limitations, many anomaly detection systems (ADSs) for IoT have high false positive rates when detecting DT attacks. This leads to the misreporting of normal data, which will impact the normal operation of IoT. To mitigate the impact caused by the high false positive rate of ADS, this paper proposes an ADS management scheme for clustered IoT. First, we model the data transmission and anomaly detection in clustered IoT. Then, the operation strategy of the clustered IoT is formulated as the running probabilities of all ADSs deployed on… More >

  • Open Access

    ARTICLE

    Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs

    Rahul Gupta1, Kapil Sharma1,*, R. K. Garg2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4283-4301, 2024, DOI:10.32604/cmc.2024.046890

    Abstract The prevalence of smartphones is deeply embedded in modern society, impacting various aspects of our lives. Their versatility and functionalities have fundamentally changed how we communicate, work, seek entertainment, and access information. Among the many smartphones available, those operating on the Android platform dominate, being the most widely used type. This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years. Therefore, there is an urgent need to develop new methods for detecting Android malware. The literature contains numerous works related to Android malware detection. As far as our understanding… More >

  • Open Access

    ARTICLE

    Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems

    Rabia Abid1, Muhammad Rizwan2, Abdulatif Alabdulatif3,*, Abdullah Alnajim4, Meznah Alamro5, Mourade Azrour6

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3413-3429, 2024, DOI:10.32604/cmc.2024.046880

    Abstract Explainable Artificial Intelligence (XAI) has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning (ML) and Deep Learning (DL) based algorithms. In this paper, we chose e-healthcare systems for efficient decision-making and data classification, especially in data security, data handling, diagnostics, laboratories, and decision-making. Federated Machine Learning (FML) is a new and advanced technology that helps to maintain privacy for Personal Health Records (PHR) and handle a large amount of medical data effectively. In this context, XAI, along with FML, increases efficiency and improves the security of e-healthcare systems. The… More >

  • Open Access

    ARTICLE

    Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis

    Dahyeon Kim1, Namgi Kim2, Junho Ahn2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3867-3889, 2024, DOI:10.32604/cmc.2024.046871

    Abstract This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities, generating applicable guidelines based on real-world software. The existing analysis of software security vulnerabilities often focuses on specific features or modules. This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software. The key novelty lies in overcoming the constraints of partial approaches. The proposed framework utilizes data from various sources to create a comprehensive functionality profile, facilitating the derivation of real-world security guidelines. Security guidelines are dynamically generated… More >

  • Open Access

    ARTICLE

    A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

    Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4417-4452, 2024, DOI:10.32604/cmc.2024.046797

    Abstract In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning… More >

  • Open Access

    ARTICLE

    CL2ES-KDBC: A Novel Covariance Embedded Selection Based on Kernel Distributed Bayes Classifier for Detection of Cyber-Attacks in IoT Systems

    Talal Albalawi, P. Ganeshkumar*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3511-3528, 2024, DOI:10.32604/cmc.2024.046396

    Abstract The Internet of Things (IoT) is a growing technology that allows the sharing of data with other devices across wireless networks. Specifically, IoT systems are vulnerable to cyberattacks due to its opennes The proposed work intends to implement a new security framework for detecting the most specific and harmful intrusions in IoT networks. In this framework, a Covariance Linear Learning Embedding Selection (CL2ES) methodology is used at first to extract the features highly associated with the IoT intrusions. Then, the Kernel Distributed Bayes Classifier (KDBC) is created to forecast attacks based on the probability distribution value precisely. In addition, a… More >

  • Open Access

    ARTICLE

    A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism

    Nannan Wu1, Xianyi Chen1,*, James Msughter Adeke2, Junjie Zhao2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3001-3019, 2024, DOI:10.32604/cmc.2023.045311

    Abstract Recently, deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information hiding. However, these approaches have some limitations. For example, a cover image lacks self-adaptability, information leakage, or weak concealment. To address these issues, this study proposes a universal and adaptable image-hiding method. First, a domain attention mechanism is designed by combining the Atrous convolution, which makes better use of the relationship between the secret image domain and the cover image domain. Second, to improve perceived human similarity, perceptual loss is incorporated into the training process. The experimental results are promising, with the proposed method achieving an… More >

Displaying 11-20 on page 2 of 672. Per Page