Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (58)
  • Open Access

    ARTICLE

    Linux Kali for Social Media User Location: A Target-Oriented Social Media Software Vulnerability Detection

    Adnan Alam Khan1,2,*, Qamar-ul-Arfeen1

    Journal of Cyber Security, Vol.3, No.4, pp. 201-205, 2021, DOI:10.32604/jcs.2021.024614

    Abstract Technology is expanding like a mushroom, there are various benefits of technology, in contrary users are facing serious losses by this technology. Furthermore, people lost their lives, their loved ones, brain-related diseases, etc. The industry is eager to get one technology that can secure their finance-related matters, personal videos or pictures, precious contact numbers, and their current location. Things are going worst because every software has some sort of legacy, deficiency, and shortcomings through which exploiters gain access to any software. There are various ways to get illegitimate access but on the top is Linux Kali with QRLjacker by user… More >

  • Open Access

    ARTICLE

    Security Threat and Vulnerability Assessment and Measurement in Secure Software Development

    Mamoona Humayun1, NZ Jhanjhi2,*, Maram Fahhad Almufareh1, Muhammad Ibrahim Khalil3

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5039-5059, 2022, DOI:10.32604/cmc.2022.019289

    Abstract Security is critical to the success of software, particularly in today's fast-paced, technology-driven environment. It ensures that data, code, and services maintain their CIA (Confidentiality, Integrity, and Availability). This is only possible if security is taken into account at all stages of the SDLC (Software Development Life Cycle). Various approaches to software quality have been developed, such as CMMI (Capability maturity model integration). However, there exists no explicit solution for incorporating security into all phases of SDLC. One of the major causes of pervasive vulnerabilities is a failure to prioritize security. Even the most proactive companies use the “patch and… More >

  • Open Access

    ARTICLE

    Cloud-IoT Integration: Cloud Service Framework for M2M Communication

    Saadia Malik1, Nadia Tabassum2, Muhammad Saleem3, Tahir Alyas4, Muhammad Hamid5,*, Umer Farooq4

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 471-480, 2022, DOI:10.32604/iasc.2022.019837

    Abstract With the ongoing revolution in the Internet of Things (IoT) and cloud computing has made the potential of every stack holder that is connected through the Internet, to exchange and transfer data. Various users perceive this connection and interaction with devices as very helpful and serviceable in their daily life. However, an improperly configured network system is a soft target to security threats, therefore there is a dire need for a security embedded framework for IoT and cloud communication models is the latest research area. In this paper, different IoT and cloud computing frameworks are discussed in detail and describes… More >

  • Open Access

    ARTICLE

    Efficacy of Unconventional Penetration Testing Practices

    Bandar Abdulrhman Bin Arfaj1, Shailendra Mishra2,*, Mohammed Alshehri1

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 223-239, 2022, DOI:10.32604/iasc.2022.019485

    Abstract The financial and confidential cost of cyberattack has presented a significant loss to the organization and government where the privacy of worthless information has become vulnerable to cyber threat. In terms of efforts implemented to avoid this risk, the cyberattack continues to evolve, making the cybersecurity systems weekend. This has necessitated the importance of comprehensive penetration testing, assessment techniques, and tools to analyze and present the currently available unconventional penetration techniques and tactics to test and examine their key features and role in supporting cybersecurity and measure their effectiveness. The importance of cyberspace and its value make it an eminent… More >

  • Open Access

    ARTICLE

    Cyber-Attack Detection and Mitigation Using SVM for 5G Network

    Sulaiman Yousef Alshunaifi, Shailendra Mishra*, Mohammed Alshehri

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 13-28, 2022, DOI:10.32604/iasc.2022.019121

    Abstract 5G technology is widely seen as a game-changer for the IT and telecommunications sectors. Benefits expected from 5G include lower latency, higher capacity, and greater levels of bandwidth. 5G also has the potential to provide additional bandwidth in terms of AI support, further increasing the benefits to the IT and telecom sectors. There are many security threats and organizational vulnerabilities that can be exploited by fraudsters to take over or damage corporate data. This research addresses cybersecurity issues and vulnerabilities in 4G(LTE) and 5G technology. The findings in this research were obtained by using primary and secondary data. Secondary data… More >

  • Open Access

    ARTICLE

    Case Optimization Using Improved Genetic Algorithm for Industrial Fuzzing Test

    Ming Wan1, Shiyan Zhang1, Yan Song2, Jiangyuan Yao3,*, Hao Luo1, Xingcan Cao4

    Intelligent Automation & Soft Computing, Vol.28, No.3, pp. 857-871, 2021, DOI:10.32604/iasc.2021.017214

    Abstract Due to the lack of security consideration in the original design of industrial communication protocols, industrial fuzzing test which can successfully exploit various potential security vulnerabilities has become one new research hotspot. However, one critical issue is how to improve its testing efficiency. From this point of view, this paper proposes a novel fuzzing test case optimization approach based on improved genetic algorithm for industrial communication protocols. Moreover, a new individual selection strategy is designed as the selection operator in this genetic algorithm, which can be actively engaged in the fuzzing test case optimization process. In this individual selection strategy,… More >

  • Open Access

    ARTICLE

    PS-Fuzz: Efficient Graybox Firmware Fuzzing Based on Protocol State

    Xiaoyi Li, Xiaojun Pan, Yanbin Sun*

    Journal on Artificial Intelligence, Vol.3, No.1, pp. 21-31, 2021, DOI:10.32604/jai.2021.017328

    Abstract The rise of the Internet of Things (IoT) exposes more and more important embedded devices to the network, which poses a serious threat to people’s lives and property. Therefore, ensuring the safety of embedded devices is a very important task. Fuzzing is currently the most effective technique for discovering vulnerabilities. In this work, we proposed PS-Fuzz (Protocol State Fuzz), a gray-box fuzzing technique based on protocol state orientation. By instrumenting the program that handles protocol fields in the firmware, the problem of lack of guidance information in common protocol fuzzing is solved. By recording and comparing state transition paths, the… More >

  • Open Access

    ARTICLE

    Evaluation of Environmental Quality for Abandoned Coal Mine Based on Environmental Vulnerability Index

    Peng Qi1,*, Yu Shang2,*

    Energy Engineering, Vol.118, No.3, pp. 727-736, 2021, DOI:10.32604/EE.2021.014203

    Abstract With the increasingly prominent environmental problems of abandoned coal mines, this paper discussed the significance of environmental vulnerability assessment of abandoned coal mines. Environmental vulnerability assessment is essentially an assessment of environmental quality. At present, the research object of environmental impact assessment method and program of mine is mostly single factor. However, the impact of abandoned coal mine on the environment is multifaceted, which was summarized into nine prominent common problems. Based on these nine factors, the environmental vulnerability assessment model of abandoned coal mine based on multifactor evaluation was established by using the analytic hierarchy process (AHP) method, the… More >

  • Open Access

    ARTICLE

    Prediction Models for COVID-19 Integrating Age Groups, Gender, and Underlying Conditions

    Imran Ashraf1, Waleed S. Alnumay2, Rashid Ali3, Soojung Hur1, Ali Kashif Bashir4, Yousaf Bin Zikria1,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3009-3044, 2021, DOI:10.32604/cmc.2021.015140

    Abstract The COVID-19 pandemic has caused hundreds of thousands of deaths, millions of infections worldwide, and the loss of trillions of dollars for many large economies. It poses a grave threat to the human population with an excessive number of patients constituting an unprecedented challenge with which health systems have to cope. Researchers from many domains have devised diverse approaches for the timely diagnosis of COVID-19 to facilitate medical responses. In the same vein, a wide variety of research studies have investigated underlying medical conditions for indicators suggesting the severity and mortality of, and role of age groups and gender on,… More >

  • Open Access

    ARTICLE

    Hybrid Security Assessment Methodology for Web Applications

    Roddy A. Correa1, Juan Ramón Bermejo Higuera2, Javier Bermejo Higuera2, Juan Antonio Sicilia Montalvo2, Manuel Sánchez Rubio2, Á. Alberto Magreñán3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.126, No.1, pp. 89-124, 2021, DOI:10.32604/cmes.2021.010700

    Abstract This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments of white box and black box, to carry out the security validation of a web application in an agile and precise way. The objective of the methodology is to take advantage of the synergies of semi-automatic static and dynamic security analysis tools and manual checks. Each one of the phases contemplated in the methodology is supported by security analysis tools of different degrees of coverage, so that… More >

Displaying 31-40 on page 4 of 58. Per Page