Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (153)
  • Open Access

    ARTICLE

    Phishing Websites Detection by Using Optimized Stacking Ensemble Model

    Zeyad Ghaleb Al-Mekhlafi1, Badiea Abdulkarem Mohammed1,2,*, Mohammed Al-Sarem3, Faisal Saeed3, Tawfik Al-Hadhrami4, Mohammad T. Alshammari1, Abdulrahman Alreshidi1, Talal Sarheed Alshammari1

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 109-125, 2022, DOI:10.32604/csse.2022.020414 - 08 October 2021

    Abstract Phishing attacks are security attacks that do not affect only individuals’ or organizations’ websites but may affect Internet of Things (IoT) devices and networks. IoT environment is an exposed environment for such attacks. Attackers may use thingbots software for the dispersal of hidden junk emails that are not noticed by users. Machine and deep learning and other methods were used to design detection methods for these attacks. However, there is still a need to enhance detection accuracy. Optimization of an ensemble classification method for phishing website (PW) detection is proposed in this study. A Genetic More >

  • Open Access

    ARTICLE

    Hesitant Fuzzy-Sets Based Decision-Making Model for Security Risk Assessment

    Ahmed S. Alfakeeh1, Abdulmohsen Almalawi2, Fawaz Jaber Alsolami2, Yoosef B. Abushark2, Asif Irshad Khan2,*, Adel Aboud S. Bahaddad1, Alka Agrawal3, Rajeev Kumar4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2297-2317, 2022, DOI:10.32604/cmc.2022.020146 - 27 September 2021

    Abstract Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web… More >

  • Open Access

    ARTICLE

    Web Security: Emerging Threats and Defense

    Abdulwahed Awad Almutairi1, Shailendra Mishra2,*, Mohammed AlShehri1

    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1233-1248, 2022, DOI:10.32604/csse.2022.019427 - 24 September 2021

    Abstract Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applications a preferred target for intruders on the internet. Even with the support of security specialists, they remain highly problematic for the complexity of penetration and code reviewing methods. It requires considering different testing patterns in both codes reviewing and penetration testing. As a… More >

  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593 - 07 September 2021

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The… More >

  • Open Access

    REVIEW

    Ensemble Learning Models for Classification and Selection of Web Services: A Review

    Muhammad Hasnain1, Imran Ghani2, Seung Ryul Jeong3,*, Aitizaz Ali1

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 327-339, 2022, DOI:10.32604/csse.2022.018300 - 26 August 2021

    Abstract This paper presents a review of the ensemble learning models proposed for web services classification, selection, and composition. Web service is an evolutionary research area, and ensemble learning has become a hot spot to assess web services’ earlier mentioned aspects. The proposed research aims to review the state of art approaches performed on the interesting web services area. The literature on the research topic is examined using the preferred reporting items for systematic reviews and meta-analyses (PRISMA) as a research method. The study reveals an increasing trend of using ensemble learning in the chosen papers More >

  • Open Access

    ARTICLE

    In Vitro-Propagation of Agave tequilana Weber cv. azul in a Temporary Immersion System

    Otilio Vázquez-Martínez1, Héctor Gordon Núñez-Palenius1,*, Eugenio M. Pérez-Molphe Balch2,*, Mauricio Valencia-Posadas1, Luis Pérez-Moreno1, Graciela M. L. Ruiz-Aguilar1, M. Gómez-Lim3

    Phyton-International Journal of Experimental Botany, Vol.91, No.1, pp. 83-96, 2022, DOI:10.32604/phyton.2022.017281 - 16 August 2021

    Abstract In Mexico, there is a need to produce large quantities of plantlets for the establishment and replanting of blue (cv. azul) agave production areas. Most of these plots are within the origin denomination area (DOT, Spanish acronym) of the distilled product of this plant, known as tequila. The objective of this study was to develop an in vitro-propagation protocol for Agave tequilana Weber cv. azul using segmented stems in both: solid and liquid media. A disinfection and in vitro technique were developed to obtain shoots, through plantlets collected in commercial plots, which attained 100% surface-disinfection and budding rate.… More >

  • Open Access

    ARTICLE

    Definition and Development of a Control Concept Applied in Elements Distributed for Manage Them Using IoT

    Jesus Hamilton Ortiz1, Osamah Ibrahim Khalaf2, Fernando Velez Varela3,*, Nicolas Minotta Rodriguez3, Christian Andres Mosquera Gil3

    Journal on Internet of Things, Vol.3, No.3, pp. 87-97, 2021, DOI:10.32604/jiot.2021.014737 - 16 December 2021

    Abstract In recent years, the Internet has gradually developed into a mature tool, which can integrate technologies involved in different application scenarios. The Internet allows the integration of solutions to different problems, which benefits both users and companies. The Internet of Things is a further development of the Internet, which can further realize the interconnection of people, machines, and things. The work of this paper mainly focuses on the use of Internet of Things technology to achieve efficient management. A wireless device is designed in the paper, which can be integrated in a helmet. This helmet More >

  • Open Access

    ARTICLE

    Combinatorial Method with Static Analysis for Source Code Security in Web Applications

    Juan Ramón Bermejo Higuera1, Javier Bermejo Higuera1, Juan Antonio Sicilia Montalvo1, Tomás Sureda Riera2, Christopher I. Argyros3, Á. Alberto Magreñán4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 541-565, 2021, DOI:10.32604/cmes.2021.017213 - 08 October 2021

    Abstract Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed. To utilize the possible synergies different static analysis tools may process, this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives. Specifically, five static analysis More >

  • Open Access

    ARTICLE

    Alzheimer’s Disease Diagnosis Based on a Semantic Rule-Based Modeling and Reasoning Approach

    Nora Shoaip1, Amira Rezk1, Shaker EL-Sappagh2,3, Tamer Abuhmed4,*, Sherif Barakat1, Mohammed Elmogy5

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3531-3548, 2021, DOI:10.32604/cmc.2021.019069 - 24 August 2021

    Abstract Alzheimer’s disease (AD) is a very complex disease that causes brain failure, then eventually, dementia ensues. It is a global health problem. 99% of clinical trials have failed to limit the progression of this disease. The risks and barriers to detecting AD are huge as pathological events begin decades before appearing clinical symptoms. Therapies for AD are likely to be more helpful if the diagnosis is determined early before the final stage of neurological dysfunction. In this regard, the need becomes more urgent for biomarker-based detection. A key issue in understanding AD is the need… More >

  • Open Access

    ARTICLE

    SmartCrawler: A Three-Stage Ranking Based Web Crawler for Harvesting Hidden Web Sources

    Sawroop Kaur1, Aman Singh1,*, G. Geetha2, Mehedi Masud3, Mohammed A. Alzain4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 2933-2948, 2021, DOI:10.32604/cmc.2021.019030 - 24 August 2021

    Abstract Web crawlers have evolved from performing a meagre task of collecting statistics, security testing, web indexing and numerous other examples. The size and dynamism of the web are making crawling an interesting and challenging task. Researchers have tackled various issues and challenges related to web crawling. One such issue is efficiently discovering hidden web data. Web crawler’s inability to work with form-based data, lack of benchmarks and standards for both performance measures and datasets for evaluation of the web crawlers make it still an immature research domain. The applications like vertical portals and data integration… More >

Displaying 81-90 on page 9 of 153. Per Page