Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (352)
  • Open Access

    ARTICLE

    Defending against Topological Information Probing for Online Decentralized Web Services

    Xinli Hao1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073155 - 12 January 2026

    Abstract Topological information is very important for understanding different types of online web services, in particular, for online social networks (OSNs). People leverage such information for various applications, such as social relationship modeling, community detection, user profiling, and user behavior prediction. However, the leak of such information will also pose severe challenges for user privacy preserving due to its usefulness in characterizing users. Large-scale web crawling-based information probing is a representative way for obtaining topological information of online web services. In this paper, we explore how to defend against topological information probing for online web services,… More >

  • Open Access

    ARTICLE

    FRF-BiLSTM: Recognising and Mitigating DDoS Attacks through a Secure Decentralized Feature Optimized Federated Learning Approach

    Sushruta Mishra1, Sunil Kumar Mohapatra2, Kshira Sagar Sahoo3, Anand Nayyar4, Tae-Kyung Kim5,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072493 - 12 January 2026

    Abstract With an increase in internet-connected devices and a dependency on online services, the threat of Distributed Denial of Service (DDoS) attacks has become a significant concern in cybersecurity. The proposed system follows a multi-step process, beginning with the collection of datasets from different edge devices and network nodes. To verify its effectiveness, experiments were conducted using the CICDoS2017, NSL-KDD, and CICIDS benchmark datasets alongside other existing models. Recursive feature elimination (RFE) with random forest is used to select features from the CICDDoS2019 dataset, on which a BiLSTM model is trained on local nodes. Local models… More >

  • Open Access

    ARTICLE

    From Budget-Aware Preferences to Optimal Composition: A Dual-Stage Framework for Wireless Energy Service Optimization

    Haotian Zhang, Jing Li*, Ming Zhu, Zhiyong Zhao, Hongli Su, Liming Sun

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.072381 - 12 January 2026

    Abstract In the wireless energy transmission service composition optimization problem, a key challenge is accurately capturing users’ preferences for service criteria under complex influencing factors, and optimally selecting a composition solution under their budget constraints. Existing studies typically evaluate satisfaction solely based on energy transmission capacity, while overlooking critical factors such as price and trustworthiness of the provider, leading to a mismatch between optimization outcomes and user needs. To address this gap, we construct a user satisfaction evaluation model for multi-user and multi-provider scenarios, systematically incorporating service price, transmission capacity, and trustworthiness into the satisfaction assessment… More >

  • Open Access

    ARTICLE

    Multi-Criteria Discovery of Communities in Social Networks Based on Services

    Karim Boudjebbour1,2, Abdelkader Belkhir1, Hamza Kheddar2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071532 - 12 January 2026

    Abstract Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties. Although several community detection methods have been proposed, many are unsuitable for social networks due to significant limitations. Specifically, most approaches depend mainly on user–user structural links while overlooking service-centric, semantic, and multi-attribute drivers of community formation, and they also lack flexible filtering mechanisms for large-scale, service-oriented settings. Our proposed approach, called community discovery-based service (CDBS), leverages user profiles and their interactions with consulted web services. The method introduces a novel similarity measure, global similarity interaction profile (GSIP), which… More >

  • Open Access

    ARTICLE

    Empowering Edge Computing: Public Edge as a Service for Performance and Cost Optimization

    Ateeqa Jalal1,*, Umar Farooq1,4,5, Ihsan Rabbi1,4, Afzal Badshah2, Aurangzeb Khan1,4, Muhammad Mansoor Alam3,4, Mazliham Mohd Su’ud4,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-19, 2026, DOI:10.32604/cmc.2025.068289 - 09 December 2025

    Abstract The exponential growth of Internet of Things (IoT) devices, autonomous systems, and digital services is generating massive volumes of big data, projected to exceed 291 zettabytes by 2027. Conventional cloud computing, despite its high processing and storage capacity, suffers from increased network latency, network congestion, and high operational costs, making it unsuitable for latency-sensitive applications. Edge computing addresses these issues by processing data near the source but faces scalability challenges and elevated Total Cost of Ownership (TCO). Hybrid solutions, such as fog computing, cloudlets, and Mobile Edge Computing (MEC), attempt to balance cost and performance;… More >

  • Open Access

    REVIEW

    AI Agents in Finance and Fintech: A Scientific Review of Agent-Based Systems, Applications, and Future Horizons

    Maryan Rizinski1,2,*, Dimitar Trajanov1,2

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-34, 2026, DOI:10.32604/cmc.2025.069678 - 10 November 2025

    Abstract Artificial intelligence (AI) is reshaping financial systems and services, as intelligent AI agents increasingly form the foundation of autonomous, goal-driven systems capable of reasoning, learning, and action. This review synthesizes recent research and developments in the application of AI agents across core financial domains. Specifically, it covers the deployment of agent-based AI in algorithmic trading, fraud detection, credit risk assessment, robo-advisory, and regulatory compliance (RegTech). The review focuses on advanced agent-based methodologies, including reinforcement learning, multi-agent systems, and autonomous decision-making frameworks, particularly those leveraging large language models (LLMs), contrasting these with traditional AI or purely… More >

  • Open Access

    ARTICLE

    A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles

    Junjun Ren1, Guoqiang Chen2, Zheng-Yi Chai3, Dong Yuan4,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-26, 2026, DOI:10.32604/cmc.2025.068795 - 10 November 2025

    Abstract Vehicle Edge Computing (VEC) and Cloud Computing (CC) significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit (RSU), thereby achieving lower delay and energy consumption. However, due to the limited storage capacity and energy budget of RSUs, it is challenging to meet the demands of the highly dynamic Internet of Vehicles (IoV) environment. Therefore, determining reasonable service caching and computation offloading strategies is crucial. To address this, this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading. By… More >

  • Open Access

    ARTICLE

    Towards Decentralized IoT Security: Optimized Detection of Zero-Day Multi-Class Cyber-Attacks Using Deep Federated Learning

    Misbah Anwer1,*, Ghufran Ahmed1, Maha Abdelhaq2, Raed Alsaqour3, Shahid Hussain4, Adnan Akhunzada5,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-15, 2026, DOI:10.32604/cmc.2025.068673 - 10 November 2025

    Abstract The exponential growth of the Internet of Things (IoT) has introduced significant security challenges, with zero-day attacks emerging as one of the most critical and challenging threats. Traditional Machine Learning (ML) and Deep Learning (DL) techniques have demonstrated promising early detection capabilities. However, their effectiveness is limited when handling the vast volumes of IoT-generated data due to scalability constraints, high computational costs, and the costly time-intensive process of data labeling. To address these challenges, this study proposes a Federated Learning (FL) framework that leverages collaborative and hybrid supervised learning to enhance cyber threat detection in… More >

  • Open Access

    ARTICLE

    Who I am shapes how I learn: A mixed methods study exploring the role of work identity and psychological needs in learning engagement

    Ling Li1,#, Ninghui Xu1,#, Wenjing Wang2,*, Jianfen Ying1,*

    Journal of Psychology in Africa, Vol.35, No.6, pp. 833-842, 2025, DOI:10.32604/jpa.2025.071557 - 30 December 2025

    Abstract This study explores the role of teachers’ professional identity (TPI) on employee learning engagement (LE), with mediation by basic needs satisfaction (BNS). Participants were 255 Chinese pre-service teachers (191 females = 74.9%, 16 freshmen = 6.2%, 135 sophomores = 52.9%, 35 juniors = 12.5%, 72 seniors = 28.2%). They completed surveys on the “QuestionStar” online survey platform and 12 of the teachers completed interviews for sharing their personal insights. The results of Structural Equation Modeling (SEM) indicated that teachers’ professional identity significantly predicted both learning engagement and basic needs satisfaction, with basic needs satisfaction partially More >

  • Open Access

    ARTICLE

    Operational police members’ empathy during engagements with survivors of trauma: A rural community perspective

    Masefako Andronica Gumani*

    Journal of Psychology in Africa, Vol.35, No.6, pp. 807-814, 2025, DOI:10.32604/jpa.2025.065776 - 30 December 2025

    Abstract This study explored law enforcement members’ empathetic engagements with primary survivors of trauma. Informants were 15 South African Police Service members from a rural district of the Limpopo (females = 26.6%; constables = 13.3%). Unstructured open-ended and follow-up telephone interviews, field notes, and diaries were used as data-collection methods. Data were analysed following the Interpretative Phenomenological Analysis guidelines. Emergent themes indicated that law enforcement members engage in three types of empathy, namely affective, cognitive, and cognitive-affective empathy when called upon to help survivors of trauma. Their affective empathy involved police members’ emotional connection with the More >

Displaying 1-10 on page 1 of 352. Per Page