Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Identification of Key Links in Electric Power Operation Based-Spatiotemporal Mixing Convolution Neural Network

    Lei Feng1, Bo Wang1,*, Fuqi Ma1, Hengrui Ma2, Mohamed A. Mohamed3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1487-1501, 2023, DOI:10.32604/csse.2023.035377

    Abstract As the scale of the power system continues to expand, the environment for power operations becomes more and more complex. Existing risk management and control methods for power operations can only set the same risk detection standard and conduct the risk detection for any scenario indiscriminately. Therefore, more reliable and accurate security control methods are urgently needed. In order to improve the accuracy and reliability of the operation risk management and control method, this paper proposes a method for identifying the key links in the whole process of electric power operation based on the spatiotemporal hybrid convolutional neural network. To… More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web applications, but not as the… More >

  • Open Access

    ARTICLE

    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938

    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%… More >

  • Open Access

    ARTICLE

    A Network Security Risk Assessment Method Based on a B_NAG Model

    Hui Wang1, Chuanhan Zhu1, Zihao Shen1,*, Dengwei Lin2, Kun Liu1, MengYao Zhao3

    Computer Systems Science and Engineering, Vol.38, No.1, pp. 103-117, 2021, DOI:10.32604/csse.2021.014680

    Abstract Computer networks face a variety of cyberattacks. Most network attacks are contagious and destructive, and these types of attacks can be harmful to society and computer network security. Security evaluation is an effective method to solve network security problems. For accurate assessment of the vulnerabilities of computer networks, this paper proposes a network security risk assessment method based on a Bayesian network attack graph (B_NAG) model. First, a new resource attack graph (RAG) and the algorithm E-Loop, which is applied to eliminate loops in the B_NAG, are proposed. Second, to distinguish the confusing relationships between nodes of the attack graph… More >

  • Open Access

    ARTICLE

    Systematic Analysis of Safety and Security Risks in Smart Homes

    Habib Ullah Khan1,*, Mohammad Kamel Alomari1, Sulaiman Khan2, Shah Nazir2, Asif Qumer Gill3, Alanoud Ali Al-Maadid4, Zaki Khalid Abu-Shawish1, Mostafa Kamal Hassan1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1409-1428, 2021, DOI:10.32604/cmc.2021.016058

    Abstract The revolution in Internet of Things (IoT)-based devices and applications has provided smart applications for humans. These applications range from healthcare to traffic-flow management, to communication devices, to smart security devices, and many others. In particular, government and private organizations are showing significant interest in IoT-enabled applications for smart homes. Despite the perceived benefits and interest, human safety is also a key concern. This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart homes. For this systematic review… More >

  • Open Access

    ARTICLE

    Managing Software Security Risks through an Integrated Computational Method

    Abdullah Alharbi1, Wael Alosaimi1, Hashem Alyami2, Mohd Nadeem3, Mohd Faizan3, Alka Agrawal3, Rajeev Kumar3,4,*, Raees Ahmad Khan3

    Intelligent Automation & Soft Computing, Vol.28, No.1, pp. 179-194, 2021, DOI:10.32604/iasc.2021.016646

    Abstract Security risk evaluation of web-based healthcare applications is important from a design perspective. The developers as well as the users need to make sure that the applications must be secure. Citing the disastrous effects of unsecured web applications, Accuntix Online states that the IT industry has lost millions of dollars due to security theft and malware attacks. Protecting the integrity of patients’ health data is of utmost importance. Thus, assessing the security risk of web-based healthcare applications should be accorded the highest priority while developing the web applications. To fulfill the security requirements, the developers must meticulously follow the Multi-Criteria… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field of the medical industry as… More >

  • Open Access

    ARTICLE

    Cyber-security Risk Assessment Framework for Critical Infrastructures

    Zubair Baig1, Sherali Zeadally2

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 121-129, 2019, DOI:10.31209/2018.100000049

    Abstract A critical infrastructure provides essential services to a nation’s population. Interruptions in its smooth operations are highly undesirable because they will cause significant and devastating consequences on all stakeholders in the society. In order to provide sustained protection to a nation’s critical infrastructure, we must continually assess and evaluate the risks thereof. We propose a risk assessment framework that can evaluate the risks posed to the security of a critical infrastructure from threat agents, with a special emphasis on the smart grid communications infrastructure. The framework defines finegrained risk identification to help quantify and assess exploitable vulnerabilities within a critical… More >

Displaying 1-10 on page 1 of 8. Per Page