Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (153)
  • Open Access

    ARTICLE

    Experimental Evaluation of Spatio-Temporal Data Utilization on Floating Cyber-Physical System Platform

    Daiki Nobayashi1,*, Meiya Tanaka2, Naoki Tanaka2, Riku Nakamura2, Kazuya Tsukamoto3, Takeshi Ikenaga1, Shu Sekigawa4, Myung Lee5

    CMC-Computers, Materials & Continua, Vol.87, No.3, 2026, DOI:10.32604/cmc.2026.077008 - 09 April 2026

    Abstract To realize local production and consumption of Spatio-temporal data (STD), it is essential to address two key challenges: (1) maintaining data locality by retaining and distributing STD close to their generation area, and (2) enabling application execution on heterogeneous and resource-constrained devices through a lightweight and portable execution platform. To address these challenges, we developed a Floating Cyber-Physical System (F-CPS) that retains both STD and the functions required to process and use the STD within a specific area. In the F-CPS, the STD Retention System directly distributes STD from the generation location and maintains the… More >

  • Open Access

    REVIEW

    Survey of AI-Based Threat Detection for Illicit Web Ecosystems: Models, Modalities, and Emerging Trends

    Jaeho Hwang1, Moohong Min2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.3, 2026, DOI:10.32604/cmes.2026.078940 - 30 March 2026

    Abstract Illicit web ecosystems, encompassing phishing, illegal online gambling, scam platforms, and malicious advertising, have rapidly expanded in scale and complexity, creating severe social, financial, and cybersecurity risks. Traditional rule-based and blacklist-driven detection approaches struggle to cope with polymorphic, multilingual, and adversarially manipulated threats, resulting in increasing demand for Artificial Intelligence (AI)-based solutions. This review provides a comprehensive synthesis of research on AI-driven threat detection for illicit web environments. It surveys detection models across multiple modalities, including text-based analysis of Uniform Resource Locator (URL) and HyperText Markup Language (HTML), vision-based recognition of webpage layouts and logos,… More >

  • Open Access

    ARTICLE

    Retrieval-Augmented Large Language Model for AWS Cloud Threat Detection and Modelling: Cloudtrail Mitre ATT&CK Mapping

    Goodness Adediran1, Kenny Awuson-David2, Yussuf Ahmed1,*

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.077606 - 12 March 2026

    Abstract Amazon Web Services (AWS) CloudTrail auditing service provides detailed records of operational and security events, enabling cloud administrators to monitor user activity and manage compliance. Although signature-based threat detection methods have been enhanced with machine learning and Large Language Models (LLMs), these approaches remain limited in addressing emerging threats. This study evaluates a two-step Retrieval Augmented Generation (RAG) approach using Gemini 2.5 Pro to enhance threat detection accuracy and contextual relevance. The RAG system integrates external cybersecurity knowledge sources including the MITRE ATT&CK framework, AWS Threat Technique Catalogue, and threat reports to overcome limitations of… More >

  • Open Access

    ARTICLE

    QPred: A Lightweight Deep Learning-Based Web Pipeline for Accessible and Scalable Streamflow Forecasting

    Randika K. Makumbura1, Hasanthi Wijesundara2, Hirushan Sajindra1, Upaka Rathnayake1,*, Vikram Kumar3, Dineshbabu Duraibabu1, Sumit Sen3

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2026.075539 - 12 March 2026

    Abstract Accurate streamflow prediction is essential for flood warning, reservoir operation, irrigation scheduling, hydropower planning, and sustainable water management, yet remains challenging due to the complexity of hydrological processes. Although data-driven models often outperform conventional physics-based hydrological modelling approaches, their real-world deployment is limited by cost, infrastructure demands, and the interdisciplinary expertise required. To bridge this gap, this study developed QPred, a regional, lightweight, cost-effective, web-delivered application for daily streamflow forecasting. The study executed an end-to-end workflow, from field data acquisition to accessible web-based deployment for on-demand forecasting. High-resolution rainfall data were recorded with tipping-bucket gauges… More >

  • Open Access

    ARTICLE

    A Comparative Analysis of Machine Learning Algorithms for Spam and Phishing URL Classification

    Tran Minh Bao1, Kumar Shashvat2, Nguyen Gia Nhu3,*, Dac-Nhuong Le4

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.075161 - 12 March 2026

    Abstract The sudden growth of harmful web pages, including spam and phishing URLs, poses a greater threat to global cybersecurity than ever before. These URLs are commonly utilised to trick people into divulging confidential details or to stealthily deploy malware. To address this issue, we aimed to assess the efficiency of popular machine learning and neural network models in identifying such harmful links. To serve our research needs, we employed two different datasets: the PhiUSIIL dataset, which is specifically designed to address phishing URL detection, and another dataset developed to uncover spam links by examining the… More >

  • Open Access

    ARTICLE

    Adaptive Windowing with Label-Aware Attention for Robust Multi-Tab Website Fingerprinting

    Chunqian Guo*, Gang Chen

    CMC-Computers, Materials & Continua, Vol.87, No.2, 2026, DOI:10.32604/cmc.2025.072184 - 12 March 2026

    Abstract Despite the ability of the anonymous communication system The Onion Router (Tor) to obscure the content of communications, prior studies have shown that passive adversaries can still infer the websites visited by users through website fingerprinting (WF) attacks. Conventional WF methodologies demonstrate optimal performance in scenarios involving single-tab browsing. Conventional WF methods achieve optimal performance primarily in scenarios involving single-tab browsing. However, in real-world network environments, users often engage in multi-tab browsing, which generates overlapping traffic patterns from different websites. This overlap has been shown to significantly degrade the performance of classifiers that rely on… More >

  • Open Access

    ARTICLE

    Predicting Immunotherapy Outcomes in Colorectal Cancer Using Machine Learning and Multi-Omic Biomarkers: Development of a Real-Time Predictive Web Application

    Thomas Kidu1, Harini Kethar2, Haben Gebrekidan3, Haleem Farman4, Ahmed Sedik4,5, Walid El-Shafai6,7, Jawad Khan8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.146, No.2, 2026, DOI:10.32604/cmes.2026.076798 - 26 February 2026

    Abstract Colorectal cancer is the third most diagnosed cancer worldwide, and immune checkpoint inhibitors have shown promising therapeutic outcomes in selected patient groups. This study performed a comprehensive analysis of multi-omics data from The Cancer Genome Atlas colorectal adenocarcinoma cohort (TCGA-COADREAD), accessed through cBioPortal, to develop machine learning models for predicting progression-free survival (PFS) following immunotherapy. The dataset included clinical variables, genomic alterations in Kirsten Rat Sarcoma Viral Oncogene Homolog (KRAS), B-Raf Proto-Oncogene (BRAF), and Neuroblastoma RAS Viral Oncogene Homolog (NRAS), microsatellite instability (MSI) status, tumor mutation burden (TMB), and expression of immune checkpoint genes. Kaplan–Meier… More >

  • Open Access

    ARTICLE

    Defending against Topological Information Probing for Online Decentralized Web Services

    Xinli Hao1, Qingyuan Gong2, Yang Chen1,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.073155 - 12 January 2026

    Abstract Topological information is very important for understanding different types of online web services, in particular, for online social networks (OSNs). People leverage such information for various applications, such as social relationship modeling, community detection, user profiling, and user behavior prediction. However, the leak of such information will also pose severe challenges for user privacy preserving due to its usefulness in characterizing users. Large-scale web crawling-based information probing is a representative way for obtaining topological information of online web services. In this paper, we explore how to defend against topological information probing for online web services,… More >

  • Open Access

    ARTICLE

    Multi-Criteria Discovery of Communities in Social Networks Based on Services

    Karim Boudjebbour1,2, Abdelkader Belkhir1, Hamza Kheddar2,*

    CMC-Computers, Materials & Continua, Vol.86, No.3, 2026, DOI:10.32604/cmc.2025.071532 - 12 January 2026

    Abstract Identifying the community structure of complex networks is crucial to extracting insights and understanding network properties. Although several community detection methods have been proposed, many are unsuitable for social networks due to significant limitations. Specifically, most approaches depend mainly on user–user structural links while overlooking service-centric, semantic, and multi-attribute drivers of community formation, and they also lack flexible filtering mechanisms for large-scale, service-oriented settings. Our proposed approach, called community discovery-based service (CDBS), leverages user profiles and their interactions with consulted web services. The method introduces a novel similarity measure, global similarity interaction profile (GSIP), which… More >

  • Open Access

    ARTICLE

    Cost and Time Optimization of Cloud Services in Arduino-Based Internet of Things Systems for Energy Applications

    Reza Nadimi1,*, Maryam Hashemi2, Koji Tokimatsu3

    Journal on Internet of Things, Vol.7, pp. 49-69, 2025, DOI:10.32604/jiot.2025.070822 - 30 September 2025

    Abstract Existing Internet of Things (IoT) systems that rely on Amazon Web Services (AWS) often encounter inefficiencies in data retrieval and high operational costs, especially when using DynamoDB for large-scale sensor data. These limitations hinder the scalability and responsiveness of applications such as remote energy monitoring systems. This research focuses on designing and developing an Arduino-based IoT system aimed at optimizing data transmission costs by concentrating on these services. The proposed method employs AWS Lambda functions with Amazon Relational Database Service (RDS) to facilitate the transmission of data collected from temperature and humidity sensors to the… More >

Displaying 1-10 on page 1 of 153. Per Page