Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (139)
  • Open Access

    ARTICLE

    Machine Learning-Based Advertisement Banner Identification Technique for Effective Piracy Website Detection Process

    Lelisa Adeba Jilcha1, Jin Kwak2,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2883-2899, 2022, DOI:10.32604/cmc.2022.023167 - 07 December 2021

    Abstract In the contemporary world, digital content that is subject to copyright is facing significant challenges against the act of copyright infringement. Billions of dollars are lost annually because of this illegal act. The current most effective trend to tackle this problem is believed to be blocking those websites, particularly through affiliated government bodies. To do so, an effective detection mechanism is a necessary first step. Some researchers have used various approaches to analyze the possible common features of suspected piracy websites. For instance, most of these websites serve online advertisement, which is considered as their… More >

  • Open Access

    ARTICLE

    Webpage Matching Based on Visual Similarity

    Mengmeng Ge1, Xiangzhan Yu1,*, Lin Ye1,2, Jiantao Shi1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3393-3405, 2022, DOI:10.32604/cmc.2022.017220 - 07 December 2021

    Abstract With the rapid development of the Internet, the types of webpages are more abundant than in previous decades. However, it becomes severe that people are facing more and more significant network security risks and enormous losses caused by phishing webpages, which imitate the interface of real webpages and deceive the victims. To better identify and distinguish phishing webpages, a visual feature extraction method and a visual similarity algorithm are proposed. First, the visual feature extraction method improves the Vision-based Page Segmentation (VIPS) algorithm to extract the visual block and calculate its signature by perceptual hash… More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open Access

    ARTICLE

    Hybrid Metaheuristics Web Service Composition Model for QoS Aware Services

    P. Rajeswari*, K. Jayashree

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 511-524, 2022, DOI:10.32604/csse.2022.020352 - 25 October 2021

    Abstract Recent advancements in cloud computing (CC) technologies signified that several distinct web services are presently developed and exist at the cloud data centre. Currently, web service composition gains maximum attention among researchers due to its significance in real-time applications. Quality of Service (QoS) aware service composition concerned regarding the election of candidate services with the maximization of the whole QoS. But these models have failed to handle the uncertainties of QoS. The resulting QoS of composite service identified by the clients become unstable and subject to risks of failing composition by end-users. On the other… More >

  • Open Access

    ARTICLE

    Semantic Based Greedy Levy Gradient Boosting Algorithm for Phishing Detection

    R. Sakunthala Jenni*, S. Shankar

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 525-538, 2022, DOI:10.32604/csse.2022.019300 - 25 October 2021

    Abstract The detection of phishing and legitimate websites is considered a great challenge for web service providers because the users of such websites are indistinguishable. Phishing websites also create traffic in the entire network. Another phishing issue is the broadening malware of the entire network, thus highlighting the demand for their detection while massive datasets (i.e., big data) are processed. Despite the application of boosting mechanisms in phishing detection, these methods are prone to significant errors in their output, specifically due to the combination of all website features in the training state. The upcoming big data… More >

  • Open Access

    ARTICLE

    An OWL-Based Specification of Database Management Systems

    Sabin C. Buraga1,*, Daniel Amariei1, Octavian Dospinescu2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5537-5550, 2022, DOI:10.32604/cmc.2022.021714 - 11 October 2021

    Abstract In the context of a proliferation of Database Management Systems (DBMSs), we have envisioned and produced an OWL 2 ontology able to provide a high-level machine-processable description of the DBMSs domain. This conceptualization aims to facilitate a proper execution of various software engineering processes and database-focused administration tasks. Also, it can be used to improve the decision-making process for determining/selecting the appropriate DBMS, subject to specific requirements. The proposed model describes the most important features and aspects regarding the DBMS domain, including the support for various paradigms (relational, graph-based, key-value, tree-like, etc.), query languages, platforms… More >

  • Open Access

    ARTICLE

    Ontology Based Ocean Knowledge Representation for Semantic Information Retrieval

    Anitha Velu*, Menakadevi Thangavelu

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4707-4724, 2022, DOI:10.32604/cmc.2022.020095 - 11 October 2021

    Abstract The drastic growth of coastal observation sensors results in copious data that provide weather information. The intricacies in sensor-generated big data are heterogeneity and interpretation, driving high-end Information Retrieval (IR) systems. The Semantic Web (SW) can solve this issue by integrating data into a single platform for information exchange and knowledge retrieval. This paper focuses on exploiting the SW base system to provide interoperability through ontologies by combining the data concepts with ontology classes. This paper presents a 4-phase weather data model: data processing, ontology creation, SW processing, and query engine. The developed Oceanographic Weather More >

  • Open Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414 - 08 October 2021

    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146 - 27 September 2021

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web… More >

  • Open Access

    ARTICLE

    Web Security: Emerging Threats and Defense

    Abdulwahed Awad Almutairi1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1233-1248, 2022, DOI:10.32604/csse.2022.019427 - 24 September 2021

    Abstract Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applications a preferred target for intruders on the internet. Even with the support of security specialists, they remain highly problematic for the complexity of penetration and code reviewing methods. It requires considering different testing patterns in both codes reviewing and penetration testing. As a… More >

Displaying 61-70 on page 7 of 139. Per Page