Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (141)
  • Open Access

    ARTICLE

    Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol (iSTSP) for Security-Critical Time-Sensitive WSNs

    Ramadan Abdul-Rashid1, Mohd Amiruddin Abd Rahman1,*, Abdulaziz Yagoub Barnawi2

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.3, pp. 3213-3250, 2025, DOI:10.32604/cmes.2025.066589 - 30 September 2025

    Abstract Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks (WSNs), especially in security-critical, time-sensitive applications. However, most existing protocols degrade substantially under malicious interference. We introduce iSTSP, an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust, precise synchronization even in hostile environments: (1) trust preprocessing that filters node participation using behavioral trust scoring; (2) anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time; (3) reliability-weighted consensus that prioritizes high-trust nodes during time aggregation; and (4) convergence-optimized synchronization… More >

  • Open Access

    ARTICLE

    Interpretable Vulnerability Detection in LLMs: A BERT-Based Approach with SHAP Explanations

    Nouman Ahmad*, Changsheng Zhang

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3321-3334, 2025, DOI:10.32604/cmc.2025.067044 - 23 September 2025

    Abstract Source code vulnerabilities present significant security threats, necessitating effective detection techniques. Rigid rule-sets and pattern matching are the foundation of traditional static analysis tools, which drown developers in false positives and miss context-sensitive vulnerabilities. Large Language Models (LLMs) like BERT, in particular, are examples of artificial intelligence (AI) that exhibit promise but frequently lack transparency. In order to overcome the issues with model interpretability, this work suggests a BERT-based LLM strategy for vulnerability detection that incorporates Explainable AI (XAI) methods like SHAP and attention heatmaps. Furthermore, to ensure auditable and comprehensible choices, we present a… More >

  • Open Access

    ARTICLE

    FedCognis: An Adaptive Federated Learning Framework for Secure Anomaly Detection in Industrial IoT-Enabled Cognitive Cities

    Abdulatif Alabdulatif*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1185-1220, 2025, DOI:10.32604/cmc.2025.066898 - 29 August 2025

    Abstract FedCognis is a secure and scalable federated learning framework designed for continuous anomaly detection in Industrial Internet of Things-enabled Cognitive Cities (IIoTCC). It introduces two key innovations: a Quantum Secure Authentication (QSA) mechanism for adversarial defense and integrity validation, and a Self-Attention Long Short-Term Memory (SALSTM) model for high-accuracy spatiotemporal anomaly detection. Addressing core challenges in traditional Federated Learning (FL)—such as model poisoning, communication overhead, and concept drift—FedCognis integrates dynamic trust-based aggregation and lightweight cryptographic verification to ensure secure, real-time operation across heterogeneous IIoT domains including utilities, public safety, and traffic systems. Evaluated on the More >

  • Open Access

    ARTICLE

    Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation

    Xiaogang Yuan*, Huan Pei, Yanlin Wu

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5555-5575, 2025, DOI:10.32604/cmc.2025.063537 - 30 July 2025

    Abstract In the complex environment of Wireless Sensor Networks (WSNs), various malicious attacks have emerged, among which internal attacks pose particularly severe security risks. These attacks seriously threaten network stability, data transmission reliability, and overall performance. To effectively address this issue and significantly improve intrusion detection speed, accuracy, and resistance to malicious attacks, this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation (TIDM-DTE). This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust, communication trust, and energy consumption trust by focusing… More >

  • Open Access

    ARTICLE

    DRL-AMIR: Intelligent Flow Scheduling for Software-Defined Zero Trust Networks

    Wenlong Ke1,2,*, Zilong Li1, Peiyu Chen1, Benfeng Chen1, Jinglin Lv1, Qiang Wang2, Ziyi Jia2, Shigen Shen1

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3305-3319, 2025, DOI:10.32604/cmc.2025.065665 - 03 July 2025

    Abstract Zero Trust Network (ZTN) enhances network security through strict authentication and access control. However, in the ZTN, optimizing flow control to improve the quality of service is still facing challenges. Software Defined Network (SDN) provides solutions through centralized control and dynamic resource allocation, but the existing scheduling methods based on Deep Reinforcement Learning (DRL) are insufficient in terms of convergence speed and dynamic optimization capability. To solve these problems, this paper proposes DRL-AMIR, which is an efficient flow scheduling method for software defined ZTN. This method constructs a flow scheduling optimization model that comprehensively considers… More >

  • Open Access

    ARTICLE

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

    Hsiao-Chun Han, Der-Chen Huang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3921-3941, 2025, DOI:10.32604/cmes.2025.065627 - 30 June 2025

    Abstract With the increasing importance of supply chain transparency, blockchain-based data has emerged as a valuable and verifiable source for analyzing procurement transaction risks. This study extends the mathematical model and proof of ‘the Overall Performance Characteristics of the Supply Chain’ to encompass multiple variables within blockchain data. Utilizing graph theory, the model is further developed into a single-layer neural network, which serves as the foundation for constructing two multi-layer deep learning neural network models, Feedforward Neural Network (abbreviated as FNN) and Deep Clustering Network (abbreviated as DCN). Furthermore, this study retrieves corporate data from the… More > Graphic Abstract

    The Blockchain Neural Network Superior to Deep Learning for Improving the Trust of Supply Chain

  • Open Access

    ARTICLE

    Port-Based Pre-Authentication Message Transmission Scheme

    Sunghyun Yu, Yoojae Won*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.3, pp. 3943-3980, 2025, DOI:10.32604/cmes.2025.064997 - 30 June 2025

    Abstract Pre-Authentication and Post-Connection (PAPC) plays a crucial role in realizing the Zero Trust security model by ensuring that access to network resources is granted only after successful authentication. While earlier approaches such as Port Knocking (PK) and Single Packet Authorization (SPA) introduced pre-authentication concepts, they suffer from limitations including plaintext communication, protocol dependency, reliance on dedicated clients, and inefficiency under modern network conditions. These constraints hinder their applicability in emerging distributed and resource-constrained environments such as AIoT and browser-based systems. To address these challenges, this study proposes a novel port-sequence-based PAPC scheme structured as a… More >

  • Open Access

    ARTICLE

    Multi-Firmware Comparison Based on Evolutionary Algorithm and Trusted Base Point

    Wenbing Wang*, Yongwen Liu

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 763-790, 2025, DOI:10.32604/cmc.2025.065179 - 09 June 2025

    Abstract Multi-firmware comparison techniques can improve efficiency when auditing firmwares in bulk. However, the problem of matching functions between multiple firmwares has not been studied before. This paper proposes a multi-firmware comparison method based on evolutionary algorithms and trusted base points. We first model the multi-firmware comparison as a multi-sequence matching problem. Then, we propose an adaptation function and a population generation method based on trusted base points. Finally, we apply an evolutionary algorithm to find the optimal result. At the same time, we design the similarity of matching results as an evaluation metric to measure More >

  • Open Access

    ARTICLE

    FSFS: A Novel Statistical Approach for Fair and Trustworthy Impactful Feature Selection in Artificial Intelligence Models

    Ali Hamid Farea1,*, Iman Askerzade1,2, Omar H. Alhazmi3, Savaş Takan4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 1457-1484, 2025, DOI:10.32604/cmc.2025.064872 - 09 June 2025

    Abstract Feature selection (FS) is a pivotal pre-processing step in developing data-driven models, influencing reliability, performance and optimization. Although existing FS techniques can yield high-performance metrics for certain models, they do not invariably guarantee the extraction of the most critical or impactful features. Prior literature underscores the significance of equitable FS practices and has proposed diverse methodologies for the identification of appropriate features. However, the challenge of discerning the most relevant and influential features persists, particularly in the context of the exponential growth and heterogeneity of big data—a challenge that is increasingly salient in modern artificial… More >

  • Open Access

    ARTICLE

    Distributed Computing-Based Optimal Route Finding Algorithm for Trusted Devices in the Internet of Things

    Amal Al-Rasheed1, Rahim Khan2,*, Fahad Alturise3, Salem Alkhalaf4

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 957-973, 2025, DOI:10.32604/cmc.2025.064102 - 09 June 2025

    Abstract The Internet of Things (IoT) is a smart infrastructure where devices share captured data with the respective server or edge modules. However, secure and reliable communication is among the challenging tasks in these networks, as shared channels are used to transmit packets. In this paper, a decision tree is integrated with other metrics to form a secure distributed communication strategy for IoT. Initially, every device works collaboratively to form a distributed network. In this model, if a device is deployed outside the coverage area of the nearest server, it communicates indirectly through the neighboring devices.… More >

Displaying 21-30 on page 3 of 141. Per Page