Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (130)
  • Open Access

    REVIEW

    Review of Techniques for Integrating Security in Software Development Lifecycle

    Hassan Saeed1, Imran Shafi1, Jamil Ahmad2, Adnan Ahmed Khan3, Tahir Khurshaid4,*, Imran Ashraf5,*

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 139-172, 2025, DOI:10.32604/cmc.2024.057587 - 03 January 2025

    Abstract Software-related security aspects are a growing and legitimate concern, especially with 5G data available just at our palms. To conduct research in this field, periodic comparative analysis is needed with the new techniques coming up rapidly. The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle (SDLC) by analyzing the articles published in the last two decades and to propose a way forward. This review follows Kitchenham’s review protocol. The review has been divided into three main stages including planning, execution, and analysis.… More >

  • Open Access

    ARTICLE

    A Secure Authentication Indexed Choice-Based Graphical Password Scheme for Web Applications and ATMs

    Sameh Zarif1,2,*, Hadier Moawad2, Khalid Amin2, Abdullah Alharbi3, Wail S. Elkilani4, Shouze Tang5, Marian Wagdy6

    Computer Systems Science and Engineering, Vol.49, pp. 79-98, 2025, DOI:10.32604/csse.2024.057439 - 03 January 2025

    Abstract Authentication is the most crucial aspect of security and a predominant measure employed in cybersecurity. Cloud computing provides a shared electronic device resource for users via the internet, and the authentication techniques used must protect data from attacks. Previous approaches failed to resolve the challenge of making passwords secure, memorable, usable, and time-saving. Graphical Password (GP) is still not widely utilized in reality because consumers suffer from multiple login stages. This paper proposes an Indexed Choice-Based Graphical Password (ICGP) scheme for improving the authentication part. ICGP consists of two stages: registration and authentication. At the… More >

  • Open Access

    ARTICLE

    Securing Web by Predicting Malicious URLs

    Imran Khan, Meenakshi Megavarnam*

    Journal of Cyber Security, Vol.6, pp. 117-130, 2024, DOI:10.32604/jcs.2024.048332 - 06 December 2024

    Abstract A URL (Uniform Resource Locator) is used to locate a digital resource. With this URL, an attacker can perform a variety of attacks, which can lead to serious consequences for both individuals and organizations. Therefore, attackers create malicious URLs to gain access to an organization’s systems or sensitive information. It is crucial to secure individuals and organizations against these malicious URLs. A combination of machine learning and deep learning was used to predict malicious URLs. This research contributes significantly to the field of cybersecurity by proposing a model that seamlessly integrates the accuracy of machine More >

  • Open Access

    REVIEW

    MicroRNAs in thyroid cancer with focus on medullary thyroid carcinoma: potential therapeutic targets and diagnostic/prognostic markers and web based tools

    ELHAM SHAKIBA1, SETI BOROOMAND2, SIMA KHERADMAND KIA3, MEHDI HEDAYATI4,*

    Oncology Research, Vol.32, No.6, pp. 1011-1019, 2024, DOI:10.32604/or.2024.049235 - 23 May 2024

    Abstract This review aimed to describe the inculpation of microRNAs (miRNAs) in thyroid cancer (TC) and its subtypes, mainly medullary thyroid carcinoma (MTC), and to outline web-based tools and databases for bioinformatics analysis of miRNAs in TC. Additionally, the capacity of miRNAs to serve as therapeutic targets and biomarkers in TC management will be discussed. This review is based on a literature search of relevant articles on the role of miRNAs in TC and its subtypes, mainly MTC. Additionally, web-based tools and databases for bioinformatics analysis of miRNAs in TC were identified and described. MiRNAs can… More > Graphic Abstract

    MicroRNAs in thyroid cancer with focus on medullary thyroid carcinoma: potential therapeutic targets and diagnostic/prognostic markers and web based tools

  • Open Access

    ARTICLE

    CMAES-WFD: Adversarial Website Fingerprinting Defense Based on Covariance Matrix Adaptation Evolution Strategy

    Di Wang, Yuefei Zhu, Jinlong Fei*, Maohua Guo

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2253-2276, 2024, DOI:10.32604/cmc.2024.049504 - 15 May 2024

    Abstract Website fingerprinting, also known as WF, is a traffic analysis attack that enables local eavesdroppers to infer a user’s browsing destination, even when using the Tor anonymity network. While advanced attacks based on deep neural network (DNN) can perform feature engineering and attain accuracy rates of over 98%, research has demonstrated that DNN is vulnerable to adversarial samples. As a result, many researchers have explored using adversarial samples as a defense mechanism against DNN-based WF attacks and have achieved considerable success. However, these methods suffer from high bandwidth overhead or require access to the target… More >

  • Open Access

    ARTICLE

    FusionNN: A Semantic Feature Fusion Model Based on Multimodal for Web Anomaly Detection

    Li Wang1,2,3,*, Mingshan Xia1,2,*, Hao Hu1, Jianfang Li1,2, Fengyao Hou1,2, Gang Chen1,2,3

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2991-3006, 2024, DOI:10.32604/cmc.2024.048637 - 15 May 2024

    Abstract With the rapid development of the mobile communication and the Internet, the previous web anomaly detection and identification models were built relying on security experts’ empirical knowledge and attack features. Although this approach can achieve higher detection performance, it requires huge human labor and resources to maintain the feature library. In contrast, semantic feature engineering can dynamically discover new semantic features and optimize feature selection by automatically analyzing the semantic information contained in the data itself, thus reducing dependence on prior knowledge. However, current semantic features still have the problem of semantic expression singularity, as… More >

  • Open Access

    ARTICLE

    A Web Application Fingerprint Recognition Method Based on Machine Learning

    Yanmei Shi1, Wei Yu2,*, Yanxia Zhao3,*, Yungang Jia4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 887-906, 2024, DOI:10.32604/cmes.2024.046140 - 16 April 2024

    Abstract Web application fingerprint recognition is an effective security technology designed to identify and classify web applications, thereby enhancing the detection of potential threats and attacks. Traditional fingerprint recognition methods, which rely on preannotated feature matching, face inherent limitations due to the ever-evolving nature and diverse landscape of web applications. In response to these challenges, this work proposes an innovative web application fingerprint recognition method founded on clustering techniques. The method involves extensive data collection from the Tranco List, employing adjusted feature selection built upon Wappalyzer and noise reduction through truncated SVD dimensionality reduction. The core… More >

  • Open Access

    ARTICLE

    WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC

    Mai Alzamel1,*, Hamza Ali Rizvi2, Najwa Altwaijry1, Isra Al-Turaiki1

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4177-4204, 2024, DOI:10.32604/cmc.2024.048370 - 26 March 2024

    Abstract Scalability and information personal privacy are vital for training and deploying large-scale deep learning models. Federated learning trains models on exclusive information by aggregating weights from various devices and taking advantage of the device-agnostic environment of web browsers. Nevertheless, relying on a main central server for internet browser-based federated systems can prohibit scalability and interfere with the training process as a result of growing client numbers. Additionally, information relating to the training dataset can possibly be extracted from the distributed weights, potentially reducing the privacy of the local data used for training. In this research… More >

  • Open Access

    ARTICLE

    Dynamic Response Impact of Vehicle Braking on Simply Supported Beam Bridges with Corrugated Steel Webs Based on Vehicle-Bridge Coupled Vibration Analysis

    Yan Wang*, Siwen Li, Na Wei

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3467-3493, 2024, DOI:10.32604/cmes.2024.046454 - 11 March 2024

    Abstract A novel approach for analyzing coupled vibrations between vehicles and bridges is presented, taking into account spatiotemporal effects and mechanical phenomena resulting from vehicle braking. Efficient modeling and solution of bridge vibrations induced by vehicle deceleration are realized using this method. The method’s validity and reliability are substantiated through numerical examples. A simply supported beam bridge with a corrugated steel web is taken as an example and the effects of parameters such as the initial vehicle speed, braking acceleration, braking location, and road surface roughness on the mid-span displacement and impact factor of the bridge… More >

  • Open Access

    ARTICLE

    A Measurement Study of the Ethereum Underlying P2P Network

    Mohammad Z. Masoud1, Yousef Jaradat1, Ahmad Manasrah2, Mohammad Alia3, Khaled Suwais4,*, Sally Almanasra4

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 515-532, 2024, DOI:10.32604/cmc.2023.044504 - 30 January 2024

    Abstract This work carried out a measurement study of the Ethereum Peer-to-Peer (P2P) network to gain a better understanding of the underlying nodes. Ethereum was applied because it pioneered distributed applications, smart contracts, and Web3. Moreover, its application layer language “Solidity” is widely used in smart contracts across different public and private blockchains. To this end, we wrote a new Ethereum client based on Geth to collect Ethereum node information. Moreover, various web scrapers have been written to collect nodes’ historical data from the Internet Archive and the Wayback Machine project. The collected data has been… More >

Displaying 1-10 on page 1 of 130. Per Page