Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (688)
  • Open Access

    ARTICLE

    Mental Status and Psychological Needs of Chinese Police Officers in a Highly Impacted City during the COVID-19 Pandemic

    Xu Zhu1, Meng Xia1, Yingzhe Hu1, Lin Zhang1,*, Yun Lu2, Ying Zhang1, Xudong Guo1

    International Journal of Mental Health Promotion, Vol.22, No.3, pp. 149-157, 2020, DOI:10.32604/IJMHP.2020.011097

    Abstract The purpose of the study was to investigate the mental status and psychological needs of police officers during the COVID-19 outbreak in China. The Anti-Pandemic Public Mental Status Scale and self-administered Psychological Needs Scale were administered online to police officers in Y city, a significant sub-central city of Hubei Province, where was affected by the pandemic the most seriously. A total of 5,467 valid questionnaires were collected, of which female police accounted for 17.7%. Compared with the national public and Y city public data previously measured using the Anti-Pandemic Public Mental Status Scale, this study found that 24.6% of the… More >

  • Open Access

    ARTICLE

    The Study on Evaluation Method of Urban Network Security in the Big Data Era

    Qingyuan Zhoua, Jianjian Luob

    Intelligent Automation & Soft Computing, Vol.24, No.1, pp. 133-138, 2018, DOI:10.1080/10798587.2016.1267444

    Abstract Big data is an emerging paradigm applied to datasets whose size is beyond the ability of commonly used software tools to capture, manage, and process the data within a tolerable elapsed time. In a Smarter City, available resources are harnessed safely, sustainably and efficiently to achieve positive, measurable economic and societal outcomes. Most of the challenges of Big Data in Smart Cities are multi-dimensional and can be addressed from different multidisciplinary perspectives. Based on the above considerations, this paper combined the PSR method, the fuzzy logic model and the entropy weight method in an empirical study for feasible urban public… More >

  • Open Access

    ARTICLE

    Personal Data Security and Supervision in the Age of Large Data

    DU Zhen-Yuan

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 847-853, 2019, DOI:10.31209/2019.100000088

    Abstract Big data’s fast growth and development has triggered the attention of academic circles. Most of the studies are focusing on the concept of personal data, the definition of data rights, etc. In China, the current status of laws protecting personal data is still scarce and incomplete, relying on specific regulations that are lacking an overall architecture, which has not been efficient in the age of rapid development and application of big data. In the western countries with relatively mature personal data supervision system, the supervision principle is centered on the data subject, and it is difficult to adapt to the… More >

  • Open Access

    ARTICLE

    Detecting Android Inter-App Data Leakage Via Compositional Concolic Walking

    Tianjun Wu, Yuexiang Yang

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 755-766, 2019, DOI:10.31209/2019.100000079

    Abstract While many research efforts have been around auditing individual android apps, the security issues related to the interaction among multiple apps are less studied. Due to the hidden nature of Inter-App communications, few existing security tools are able to detect such related vulnerable behaviors. This paper proposes to perform overall security auditing using dynamic analysis techniques. We focus on data leakage as it is one of the most common vulnerabilities for Android applications. We present an app auditing system AppWalker, which uses concolic execution on a set of apps. We use static Inter-App taint analysis to guide the dynamic auditing… More >

  • Open Access

    ARTICLE

    Cyber-security Risk Assessment Framework for Critical Infrastructures

    Zubair Baig1, Sherali Zeadally2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049

    Abstract A critical infrastructure provides essential services to a nation’s population. Interruptions in its smooth operations are highly undesirable because they will cause significant and devastating consequences on all stakeholders in the society. In order to provide sustained protection to a nation’s critical infrastructure, we must continually assess and evaluate the risks thereof. We propose a risk assessment framework that can evaluate the risks posed to the security of a critical infrastructure from threat agents, with a special emphasis on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess exploitable vulnerabilities within a critical… More >

  • Open Access

    EDITORIAL

    Advances in Security and Privacy Technologies for Forthcoming Smart Systems, Services, Computing, and Networks

    Ilsun You, Chang Choi, Vishal Sharma, Isaac Woungang, Bharat K. Bhargava

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 117-119, 2019, DOI:10.31209/2018.100000048

    Abstract This article has no abstract. More >

  • Open Access

    ARTICLE

    Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT

    Jinxin Zuo1, 3, Yueming Lu1, 3, *, Hui Gao2, 3, Ruohan Cao2, 3, Ziyv Guo2, 3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 683-704, 2020, DOI:10.32604/cmc.2020.010793

    Abstract The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and risk (S&R) value of the network urgently. In this paper, we summarize the architecture and vulnerability in IoT and propose a comprehensive information security evaluation model based on multi-level decomposition feedback. The evaluation model provides an idea for information security evaluation of IoT and guides the security decision maker for dynamic protection. Firstly, we establish an overall evaluation indicator system that includes four primary indicators of threat information, asset, vulnerability, and management, respectively. It also includes eleven… More >

  • Open Access

    ARTICLE

    A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain

    Gyeong-Jin Ra1, Chang-Hyun Roh1, Im-Yeong Lee1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 153-170, 2020, DOI:10.32604/cmc.2020.011293

    Abstract In today’s fourth industrial revolution, various blockchain technologies are being actively researched. A blockchain is a peer-to-peer data-sharing structure lacking central control. If a user wishes to access stored data, she/he must employ a private key to prove ownership of the data and create a transaction. If the private key is lost, blockchain data cannot be accessed. To solve such a problem, public blockchain users can recover the key using a wallet program. However, key recovery in a permissioned blockchain (PBC) has been but little studied. The PBC server is Honest-but-Curious (HBC), and should not be able to learn anything… More >

  • Open Access

    ARTICLE

    Privacy Preserving Blockchain Technique to Achieve Secure and Reliable Sharing of IoT Data

    Bao Le Nguyen1, E. Laxmi Lydia2, Mohamed Elhoseny3, Irina V. Pustokhina4, Denis A. Pustokhin5, Mahmoud Mohamed Selim6, Gia Nhu Nguyen7, 8, K. Shankar9, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 87-107, 2020, DOI:10.32604/cmc.2020.011599

    Abstract In present digital era, an exponential increase in Internet of Things (IoT) devices poses several design issues for business concerning security and privacy. Earlier studies indicate that the blockchain technology is found to be a significant solution to resolve the challenges of data security exist in IoT. In this view, this paper presents a new privacy-preserving Secure Ant Colony optimization with Multi Kernel Support Vector Machine (ACOMKSVM) with Elliptical Curve cryptosystem (ECC) for secure and reliable IoT data sharing. This program uses blockchain to ensure protection and integrity of some data while it has the technology to create secure ACOMKSVM… More >

  • Open Access

    ARTICLE

    Identifying and Verifying Vulnerabilities through PLC Network Protocol and Memory Structure Analysis

    Joo-Chan Lee1, Hyun-Pyo Choi1, Jang-Hoon Kim1, Jun-Won Kim1, Da-Un Jung1, Ji-Ho Shin1, Jung-Taek Seo1, *

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 53-67, 2020, DOI:10.32604/cmc.2020.011251

    Abstract Cyberattacks on the Industrial Control System (ICS) have recently been increasing, made more intelligent by advancing technologies. As such, cybersecurity for such systems is attracting attention. As a core element of control devices, the Programmable Logic Controller (PLC) in an ICS carries out on-site control over the ICS. A cyberattack on the PLC will cause damages on the overall ICS, with Stuxnet and Duqu as the most representative cases. Thus, cybersecurity for PLCs is considered essential, and many researchers carry out a variety of analyses on the vulnerabilities of PLCs as part of preemptive efforts against attacks. In this study,… More >

Displaying 621-630 on page 63 of 688. Per Page