Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    Wireless Sensor Security Issues on Data Link Layer: A Survey

    Muhammad Zulkifl Hasan*, Zurina Mohd Hanapi, Muhammad Zunnurain Hussain

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4065-4084, 2023, DOI:10.32604/cmc.2023.036444

    Abstract A computer network can be defined as many computing devices connected via a communication medium like the internet. Computer network development has proposed how humans and devices communicate today. These networks have improved, facilitated, and made conventional forms of communication easier. However, it has also led to uptick in-network threats and assaults. In 2022, the global market for information technology is expected to reach $170.4 billion. However, in contrast, 95% of cyber security threats globally are caused by human action. These networks may be utilized in several control systems, such as home-automation, chemical and physical… More >

  • Open Access


    Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks

    V. Balaji*, P. Selvaraj

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1289-1303, 2022, DOI:10.32604/csse.2022.023609

    Abstract Reliable transmission is vital to the success of the next generation of communications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters the maintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wireless network and constantly needs to be self-configured to provide consistent and efficient data transmission. The medical devices need to be connected with sophisticated protocols… More >

  • Open Access


    Safeguarding Cloud Computing Infrastructure: A Security Analysis

    Mamdouh Alenezi*

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 159-167, 2021, DOI:10.32604/csse.2021.015282

    Abstract Cloud computing is the provision of hosted resources, comprising software, hardware and processing over the World Wide Web. The advantages of rapid deployment, versatility, low expenses and scalability have led to the widespread use of cloud computing across organizations of all sizes, mostly as a component of the combination/multi-cloud infrastructure structure. While cloud storage offers significant benefits as well as cost-effective alternatives for IT management and expansion, new opportunities and challenges in the context of security vulnerabilities are emerging in this domain. Cloud security, also recognized as cloud computing security, refers to a collection of More >

  • Open Access


    A Proposal for Addressing Security Issues Related to Dynamic Code Loading on Android Platform

    Aleksandar Kelec, Zoran Djuric

    Computer Systems Science and Engineering, Vol.35, No.4, pp. 271-282, 2020, DOI:10.32604/csse.2020.35.271

    Abstract One of the constant challenges faced by the Android community, when it comes to the safety of the end users, is the ability of applications to load code dynamically. This mechanism may be used for both legitimate and malicious purposes. A particular problem is the fact that remote code is not analyzed during the verification process because it doesn’t have to be present in the application package at the publishing time. Previous research has shown that using this concept in an insecure way can cause serious consequences for the user and his device. Solving this More >

  • Open Access


    Review of PLC Security Issues in Industrial Control System

    Xiaojun Pan, Zhuoran Wang, Yanbin Sun*

    Journal of Cyber Security, Vol.2, No.2, pp. 69-83, 2020, DOI:10.32604/jcs.2020.010045

    Abstract Programmable Logic Controllers (PLC), core of industrial control systems, is widely used in industrial control systems. The security of PLC is the key to the security of industrial control systems. Nowadays, a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet, and thus raising security concerns. First of all, we introduce the basic principle of PLC in this paper. Then we analyze the PLC code security, firmware security, network security, virus vulnerability and Modbus communication protocol by reviewing the previous related work. Finally, we make More >

Displaying 1-10 on page 1 of 5. Per Page