Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (56)
  • Open Access

    ARTICLE

    Adaptive Emulation Framework for Multi-Architecture IoT Firmware Testing

    Jihyeon Yu1, Juhwan Kim1, Youngwoo Lee1, Fayozbek Rustamov2, Joobeom Yun1,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3291-3315, 2023, DOI:10.32604/cmc.2023.035835

    Abstract Internet of things (IoT) devices are being increasingly used in numerous areas. However, the low priority on security and various IoT types have made these devices vulnerable to attacks. To prevent this, recent studies have analyzed firmware in an emulation environment that does not require actual devices and is efficient for repeated experiments. However, these studies focused only on major firmware architectures and rarely considered exotic firmware. In addition, because of the diversity of firmware, the emulation success rate is not high in terms of large-scale analyses. In this study, we propose the adaptive emulation framework for multi-architecture (AEMA). In… More >

  • Open Access

    ARTICLE

    Critical Relation Path Aggregation-Based Industrial Control Component Exploitable Vulnerability Reasoning

    Zibo Wang1,3, Chaobin Huo2, Yaofang Zhang1,3, Shengtao Cheng1,3, Yilu Chen1,3, Xiaojie Wei5, Chao Li4, Bailing Wang1,3,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2957-2979, 2023, DOI:10.32604/cmc.2023.035694

    Abstract With the growing discovery of exposed vulnerabilities in the Industrial Control Components (ICCs), identification of the exploitable ones is urgent for Industrial Control System (ICS) administrators to proactively forecast potential threats. However, it is not a trivial task due to the complexity of the multi-source heterogeneous data and the lack of automatic analysis methods. To address these challenges, we propose an exploitability reasoning method based on the ICC-Vulnerability Knowledge Graph (KG) in which relation paths contain abundant potential evidence to support the reasoning. The reasoning task in this work refers to determining whether a specific relation is valid between an… More >

  • Open Access

    ARTICLE

    Formal Verification Platform as a Service: WebAssembly Vulnerability Detection Application

    LiangJun Deng1, Hang Lei1, Zheng Yang1, WeiZhong Qian1,*, XiaoYu Li1, Hao Wu2, Sihao Deng3, RuChao Sha1, WeiDong Deng4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2155-2170, 2023, DOI:10.32604/csse.2023.027680

    Abstract In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service (FVPS), which aims to provide an automated report of vulnerability detections, this work builds a Hyperledger Fabric blockchain runtime model. It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages. This methodology utilizes an external application programming interface (API) table to replace the source codes in compilation, thereby pruning the part of housekeeping codes to ease code inflation. Code inflation is a significant metric in formal language translation. Namely, minor code inflation enhances verification scale… More >

  • Open Access

    REVIEW

    A Review of the Advances Made in Improving the Durability of Welded Wood against Water in Light of the Results of African Tropical Woods Welding

    Jean Jalin Eyinga Biwôlé1,4,*, Achille Bernard Biwolé1, Antonio Pizzi4,*, Joseph Zobo Mfomo1, César Segovia3, Atangana Ateba2, Evariste Fedoung Fongnzossie1, Sahbi Ouertani4,5, Xinyi Chen4, Bénoît Ndiwe1,2, Dieudonné Abessolo1,2, Pierre-Jean Meausoone4

    Journal of Renewable Materials, Vol.11, No.3, pp. 1077-1099, 2023, DOI:10.32604/jrm.2023.024079

    Abstract Wood plays a major role in the production of furniture and wooden structures. Nevertheless, in this process, the massive use of adhesives and plural connectors remains a definite problem for health and the environment. Therefore, wood welding is a breakthrough in this respect. This paper reviews the applications of wood welding in furniture and construction and then examines advances in improving the durability of welded wood against water. Our contribution also highlights the need to join African tropical woods using the rotational friction welding technique. According to our results, these woods present interesting chemical singularities, which could provide solutions to… More >

  • Open Access

    ARTICLE

    Analyzing Ethereum Smart Contract Vulnerabilities at Scale Based on Inter-Contract Dependency

    Qiuyun Lyu1, Chenhao Ma1, Yanzhao Shen2, Shaopeng Jiao3, Yipeng Sun1, Liqin Hu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1625-1647, 2023, DOI:10.32604/cmes.2022.021562

    Abstract Smart contracts running on public blockchains are permissionless and decentralized, attracting both developers and malicious participants. Ethereum, the world’s largest decentralized application platform on which more than 40 million smart contracts are running, is frequently challenged by smart contract vulnerabilities. What’s worse, since the homogeneity of a wide range of smart contracts and the increase in inter-contract dependencies, a vulnerability in a certain smart contract could affect a large number of other contracts in Ethereum. However, little is known about how vulnerable contracts affect other on-chain contracts and which contracts can be affected. Thus, we first present the contract dependency… More >

  • Open Access

    ARTICLE

    Machine Learning-Based Threatened Species Translocation Under Climate Vulnerability

    Nandhi Kesavan*, Latha

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 327-337, 2023, DOI:10.32604/iasc.2023.030910

    Abstract Climate change is the most serious causes and has a direct impact on biodiversity. According to the world’s biodiversity conservation organization, reptile species are most affected since their biological and ecological qualities are directly linked to climate. Due to a lack of time frame in existing works, conservation adoption affects the performance of existing works. The proposed research presents a knowledge-driven Decision Support System (DSS) including the assisted translocation to adapt to future climate change to conserving from its extinction. The Dynamic approach is used to develop a knowledge-driven DSS using machine learning by applying an ecological and biological variable… More >

  • Open Access

    ARTICLE

    A Novel Approach for Network Vulnerability Analysis in IIoT

    K. Sudhakar*, S. Senthilkumar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 263-277, 2023, DOI:10.32604/csse.2023.029680

    Abstract Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the network traffic features are collected… More >

  • Open Access

    ARTICLE

    Network Invulnerability Enhancement Algorithm Based on WSN Closeness Centrality

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3, Jing Li4,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3021-3038, 2022, DOI:10.32604/cmc.2022.029367

    Abstract Wireless Sensor Network (WSN) is an important part of the Internet of Things (IoT), which are used for information exchange and communication between smart objects. In practical applications, WSN lifecycle can be influenced by the unbalanced distribution of node centrality and excessive energy consumption, etc. In order to overcome these problems, a heterogeneous wireless sensor network model with small world characteristics is constructed to balance the centrality and enhance the invulnerability of the network. Also, a new WSN centrality measurement method and a new invulnerability measurement model are proposed based on the WSN data transmission characteristics. Simulation results show that… More >

  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization algorithm to find the globally… More >

  • Open Access

    ARTICLE

    Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol

    M. Ramya Devi*, I. Jasmine Selvakumari Jeya

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 31-45, 2023, DOI:10.32604/iasc.2023.026152

    Abstract Internet of Vehicles (IoV) is an intelligent vehicular technology that allows vehicles to communicate with each other via internet. Communications and the Internet of Things (IoT) enable cutting-edge technologies including such self-driving cars. In the existing systems, there is a maximum communication delay while transmitting the messages. The proposed system uses hybrid Co-operative, Vehicular Communication Management Framework called CAMINO (CA). Further it uses, energy efficient fast message routing protocol with Common Vulnerability Scoring System (CVSS) methodology for improving the communication delay, throughput. It improves security while transmitting the messages through networks. In this research, we present a unique intelligent vehicular… More >

Displaying 11-20 on page 2 of 56. Per Page