Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (853)
  • Open Access

    REVIEW

    Intrusion Detection Systems Using Blockchain Technology: A Review, Issues and Challenges

    Salam Al-E’mari1, Mohammed Anbar1,*, Yousef Sanjalawe1,2, Selvakumar Manickam1, Iznan Hasbullah1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 87-112, 2022, DOI:10.32604/csse.2022.017941 - 26 August 2021

    Abstract Intrusion detection systems that have emerged in recent decades can identify a variety of malicious attacks that target networks by employing several detection approaches. However, the current approaches have challenges in detecting intrusions, which may affect the performance of the overall detection system as well as network performance. For the time being, one of the most important creative technological advancements that plays a significant role in the professional world today is blockchain technology. Blockchain technology moves in the direction of persistent revolution and change. It is a chain of blocks that covers information and maintains… More >

  • Open Access

    ARTICLE

    A Performance Study of Membership Inference Attacks on Different Machine Learning Algorithms

    Jumana Alsubhi1, Abdulrahman Gharawi1, Mohammad Alahmadi2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 193-200, 2021, DOI:10.32604/jihpp.2021.027871 - 22 March 2022

    Abstract Nowadays, machine learning (ML) algorithms cannot succeed without the availability of an enormous amount of training data. The data could contain sensitive information, which needs to be protected. Membership inference attacks attempt to find out whether a target data point is used to train a certain ML model, which results in security and privacy implications. The leakage of membership information can vary from one machine-learning algorithm to another. In this paper, we conduct an empirical study to explore the performance of membership inference attacks against three different machine learning algorithms, namely, K-nearest neighbors, random forest, More >

  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614 - 09 February 2022

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux More >

  • Open Access

    ARTICLE

    Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection

    Taifeng Pan*

    Journal of Quantum Computing, Vol.3, No.4, pp. 161-171, 2021, DOI:10.32604/jqc.2021.025373 - 10 January 2022

    Abstract The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this… More >

  • Open Access

    ARTICLE

    Design of Cybersecurity Threat Warning Model Based on Ant Colony Algorithm

    Weiwei Lin1,2,*, Reiko Haga3

    Journal on Big Data, Vol.3, No.4, pp. 147-153, 2021, DOI:10.32604/jbd.2021.017299 - 20 December 2021

    Abstract In this paper, a cybersecurity threat warning model based on ant colony algorithm is designed to strengthen the accuracy of the cybersecurity threat warning model in the warning process and optimize its algorithm structure. Through the ant colony algorithm structure, the local global optimal solution is obtained; and the cybersecurity threat warning index system is established. Next, the above two steps are integrated to build the cybersecurity threat warning model based on ant colony algorithm, and comparative experiment is also designed. The experimental results show that, compared with the traditional qualitative differential game-based cybersecurity More >

  • Open Access

    ARTICLE

    Security Attacks on the IoT Network with 5G Wireless Communication

    Ghada Sultan Aljumaie, Ghada Hisham Alzeer, Sultan S. Alshamrani*

    Journal on Internet of Things, Vol.3, No.3, pp. 119-130, 2021, DOI:10.32604/jiot.2021.015900 - 16 December 2021

    Abstract The term Internet of Things has increased in popularity in recent years and has spread to be used in many applications around us, such as healthcare applications, smart homes and smart cities, IoT is a group of smart devices equipped with sensors that have the ability to calculate data, and carry out actions in the environment in which they are located, they are connected to each other through the Internet and recently it has become supported by 5G technology due to many advantages such as its ability to provide a fast connection, despite the efficiency More >

  • Open Access

    ARTICLE

    Enterprise Cyberspace Threat Landscape: An Analysis

    Emmanuel U. Opara1,*, Oredola A. Soluade2

    Journal of Cyber Security, Vol.3, No.3, pp. 167-176, 2021, DOI:10.32604/jcs.2021.019158 - 17 November 2021

    Abstract The ecosystem security platform described in this research is already impacting the threat spectrum in quantifiable ways. The global network has undergone a dramatic transformation over the course of 2020, with an unprecedented destabilization of events. Security breaches of all kinds are growing in complexity, sophistication, and impact. The bad actors are bypassing predictable security devices at will by breaching network systems at an escalating rate. This study will analyze these developments by creating awareness among security practitioners so they can be prepared to defend their enterprise systems. More >

  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112 - 17 November 2021

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136 - 17 November 2021

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security… More >

  • Open Access

    ARTICLE

    MIA-UNet: Multi-Scale Iterative Aggregation U-Network for Retinal Vessel Segmentation

    Linfang Yu, Zhen Qin*, Yi Ding, Zhiguang Qin

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 805-828, 2021, DOI:10.32604/cmes.2021.017332 - 08 October 2021

    Abstract As an important part of the new generation of information technology, the Internet of Things (IoT) has been widely concerned and regarded as an enabling technology of the next generation of health care system. The fundus photography equipment is connected to the cloud platform through the IoT, so as to realize the real-time uploading of fundus images and the rapid issuance of diagnostic suggestions by artificial intelligence. At the same time, important security and privacy issues have emerged. The data uploaded to the cloud platform involves more personal attributes, health status and medical application data… More >

Displaying 661-670 on page 67 of 853. Per Page