Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    A Secure Microgrid Data Storage Strategy with Directed Acyclic Graph Consensus Mechanism

    Jian Shang1,2,*, Runmin Guan2, Wei Wang2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2609-2626, 2023, DOI:10.32604/iasc.2023.037694

    Abstract The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years. In real-world scenarios, microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks. To meet the high hardware resource requirements, address the vulnerability to network attacks and poor reliability in the traditional centralized data storage schemes, this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph (DAG) consensus mechanism. Firstly, the microgrid data storage model is designed based on the edge computing technology. The blockchain, deployed on… More >

  • Open Access

    ARTICLE

    Adversarial Attack-Based Robustness Evaluation for Trustworthy AI

    Eungyu Lee, Yongsoo Lee, Taejin Lee*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1919-1935, 2023, DOI:10.32604/csse.2023.039599

    Abstract Artificial Intelligence (AI) technology has been extensively researched in various fields, including the field of malware detection. AI models must be trustworthy to introduce AI systems into critical decision-making and resource protection roles. The problem of robustness to adversarial attacks is a significant barrier to trustworthy AI. Although various adversarial attack and defense methods are actively being studied, there is a lack of research on robustness evaluation metrics that serve as standards for determining whether AI models are safe and reliable against adversarial attacks. An AI model’s robustness level cannot be evaluated by traditional evaluation indicators such as accuracy and… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    An OP-TEE Energy-Efficient Task Scheduling Approach Based on Mobile Application Characteristics

    Hai Wang*, Xuan Hao, Shuo Ji*, Jie Zheng, Yuhui Ma, Jianfeng Yang

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1621-1635, 2023, DOI:10.32604/iasc.2023.037898

    Abstract Trusted Execution Environment (TEE) is an important part of the security architecture of modern mobile devices, but its secure interaction process brings extra computing burden to mobile devices. This paper takes open portable trusted execution environment (OP-TEE) as the research object and deploys it to Raspberry Pi 3B, designs and implements a benchmark for OP-TEE, and analyzes its program characteristics. Furthermore, the application execution time, energy consumption and energy-delay product (EDP) are taken as the optimization objectives, and the central processing unit (CPU) frequency scheduling strategy of mobile devices is dynamically adjusted according to the characteristics of different applications through… More >

  • Open Access

    ARTICLE

    Modified Computational Ranking Model for Cloud Trust Factor Using Fuzzy Logic

    Lei Shen*, Ting Huang, Nishui Cai, Hao Wu

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 507-524, 2023, DOI:10.32604/iasc.2023.037640

    Abstract Through the use of the internet and cloud computing, users may access their data as well as the programmes they have installed. It is now more challenging than ever before to choose which cloud service providers to take advantage of. When it comes to the dependability of the cloud infrastructure service, those who supply cloud services, as well as those who seek cloud services, have an equal responsibility to exercise utmost care. Because of this, further caution is required to ensure that the appropriate values are reached in light of the ever-increasing need for correct decision-making. The purpose of this… More >

  • Open Access

    ARTICLE

    The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android

    Thien-Phuc Doan, Ngoc-Tu Chau, Jungsoo Park, Souhwan Jung*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3059-3073, 2023, DOI:10.32604/csse.2023.038664

    Abstract Nowadays, with the significant growth of the mobile market, security issues on the Android Operation System have also become an urgent matter. Trusted execution environment (TEE) technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security. However, for Android, TEE technologies still contain restrictions and limitations. The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE. Another issue of hardware-based TEE is the cross-platform problem. Since every mobile device supports different TEE vendors, it becomes an obstacle for developers to migrate their trusted applications to other… More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In addition, Trusted Forwarding Factor (TFF)… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Trust Model for Supporting Collaborative Healthcare Data Management

    Jiwon Jeon, Junho Kim, Mincheol Shin, Mucheol Kim*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3403-3421, 2023, DOI:10.32604/csse.2023.036658

    Abstract The development of information technology allows the collaborative business process to be run across multiple enterprises in a larger market environment. However, while collaborative business expands the realm of businesses, it also causes various hazards in collaborative Interaction, such as data falsification, inconstancy, and misuse. To solve these issues, a blockchain-based collaborative business modeling approach was proposed and analyzed. However, the existing studies lack the blockchain risk problem-solving specification, and there is no verification technique to examine the process. Consequently, it is difficult to confirm the appropriateness of the approach. Thus, here, we propose and build a blockchain-based trust model… More >

  • Open Access

    ARTICLE

    Energy Based Random Repeat Trust Computation in Delay Tolerant Network

    S. Dheenathayalan*, B. Paramasivan

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326

    Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off of its path in this… More >

  • Open Access

    ARTICLE

    Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering for Noisy Data

    Pham Huy Thong1,2,3, Florentin Smarandache4, Phung The Huan5, Tran Manh Tuan6, Tran Thi Ngan6,*, Vu Duc Thai5, Nguyen Long Giang2, Le Hoang Son3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1981-1997, 2023, DOI:10.32604/csse.2023.035692

    Abstract Clustering is a crucial method for deciphering data structure and producing new information. Due to its significance in revealing fundamental connections between the human brain and events, it is essential to utilize clustering for cognitive research. Dealing with noisy data caused by inaccurate synthesis from several sources or misleading data production processes is one of the most intriguing clustering difficulties. Noisy data can lead to incorrect object recognition and inference. This research aims to innovate a novel clustering approach, named Picture-Neutrosophic Trusted Safe Semi-Supervised Fuzzy Clustering (PNTS3FCM), to solve the clustering problem with noisy data using neutral and refusal degrees… More >

Displaying 11-20 on page 2 of 92. Per Page