Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Hybrid Computational Modeling for Web Application Security Assessment

    Adil Hussain Seh1, Jehad F. Al-Amri2, Ahmad F. Subahi3, Md Tarique Jamal Ansari1, Rajeev Kumar4,*, Mohammad Ubaidullah Bokhari5, Raees Ahmad Khan1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 469-489, 2022, DOI:10.32604/cmc.2022.019593 - 07 September 2021

    Abstract Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a significant role However, from the beginning, software security remains a serious issue for all levels of stakeholders. Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data, compromising the organizations’ reputation that translates into, financial losses as well. Most of the data breaches are financially motivated, especially in the healthcare sector. The… More >

  • Open Access

    ARTICLE

    Definition and Development of a Control Concept Applied in Elements Distributed for Manage Them Using IoT

    Jesus Hamilton Ortiz1, Osamah Ibrahim Khalaf2, Fernando Velez Varela3,*, Nicolas Minotta Rodriguez3, Christian Andres Mosquera Gil3

    Journal on Internet of Things, Vol.3, No.3, pp. 87-97, 2021, DOI:10.32604/jiot.2021.014737 - 16 December 2021

    Abstract In recent years, the Internet has gradually developed into a mature tool, which can integrate technologies involved in different application scenarios. The Internet allows the integration of solutions to different problems, which benefits both users and companies. The Internet of Things is a further development of the Internet, which can further realize the interconnection of people, machines, and things. The work of this paper mainly focuses on the use of Internet of Things technology to achieve efficient management. A wireless device is designed in the paper, which can be integrated in a helmet. This helmet More >

  • Open Access

    ARTICLE

    Combinatorial Method with Static Analysis for Source Code Security in Web Applications

    Juan Ramón Bermejo Higuera1, Javier Bermejo Higuera1, Juan Antonio Sicilia Montalvo1, Tomás Sureda Riera2, Christopher I. Argyros3, Á. Alberto Magreñán4,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.129, No.2, pp. 541-565, 2021, DOI:10.32604/cmes.2021.017213 - 08 October 2021

    Abstract Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code security differs and therefore each tool finds a different number of each weakness type for which it is designed. To utilize the possible synergies different static analysis tools may process, this work uses a new method to combine several source codes aiming to investigate how to increase the performance of security weakness detection while reducing the number of false positives. Specifically, five static analysis More >

  • Open Access

    ARTICLE

    Development of a Web-Based Telemedicine System for Covid-19 Patients

    Morshedul Bari Antor1, A. H. M. Shafayet Jamil1, Maliha Mamtaz1, Mohammad Monirujjaman Khan1,*, Sultan S. Alshamrani2, Mehedi Masud3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 899-915, 2021, DOI:10.32604/iasc.2021.018914 - 20 August 2021

    Abstract In the Covid-19 pandemic, people have been very concerned about the safety and are avoiding crowded places like hospitals. An online telemedicine web-based technology can help to overcome this situation. This paper presents an online telemedicine system that helps to promote collaboration between doctors, hospitals, and patients. The system allows doctors to serve patients from remote areas. The system also allows both doctors and patients to communicate through video calls or text messages. Patients using the system can store information about their health, search for doctors, and consult medical professionals using text messages and video More >

  • Open Access

    ARTICLE

    Development of a Multi-feature Web-based Physiotherapy Service System

    Sadman Ahmed1, Mohammad Monirujjaman Khan1,*, Roobaea Alroobaea2, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 43-54, 2021, DOI:10.32604/iasc.2021.015914 - 12 May 2021

    Abstract Physiotherapy is important to people with arthritis, and physiotherapists help them to resume or continue active, independent lives at home and work. Physiotherapy addresses many pain categories; however, this important treatment is still overlooked in Bangladesh, where many people suffer from physical pain. This study presents a multi-feature web-based physiotherapy application. A user can register as a doctor or patient via email or phone using the web application. A therapist’s information is verified manually by a system administrator. Using the application, patients can select a variety of features for treatment. Patients can watch physiotherapy video More >

  • Open Access

    ARTICLE

    Investigain: A Productive Asset Management Web Application

    Rabbani Rasha1, Mohammad Monirujjaman Khan1,*, Mehedi Masud2, Mohammed A. AlZain3

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 151-164, 2021, DOI:10.32604/csse.2021.015314 - 23 April 2021

    Abstract The Investigain is a progressive web application to make mutual funds investments through a Systematic Investment Plan. The application utilizes the web’s modern capabilities, such as Asynchronous JavaScript and XML (AJAX), JavaScript, and Hypertext Marker Language (HTML5). The application also uses a powerful relational database management system, such as MySQL, to display asset management information. The application has two portals, one for investors and one for a particular asset manager or asset management company. Each investor has an account in the investor portal. The investor can view his/her profile, current balance, balance history, dividends, the More >

  • Open Access

    ARTICLE

    Web Application Commercial Design for Financial Entities Based on Business Intelligence

    Carlos Andrés Tavera Romero1,*, Jesus Hamilton Ortiz2, Osamah Ibrahim Khalaf3, Andrea Ríos Prado4

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3177-3188, 2021, DOI:10.32604/cmc.2021.014738 - 01 March 2021

    Abstract Multiple customer data management has become a focus of attention in big organizations. Although much information is available, it does not translate into significant profitable value-added services. We present a design of a commercial web application based on business intelligence that generates information on social and financial behavior of clients in an organization; with the purpose of obtain additional information that allows to get more profits. This app will provide a broader perspective for making strategic decisions to increase profits and reduce internal investment costs. A case in point is the financial sector, a group… More >

  • Open Access

    ARTICLE

    Estimating Security Risk of Healthcare Web Applications: A Design Perspective

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 187-209, 2021, DOI:10.32604/cmc.2021.014007 - 12 January 2021

    Abstract In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field… More >

  • Open Access

    ARTICLE

    Evaluating the Impact of Software Security Tactics: A Design Perspective

    Mamdouh Alenezi1, Abhishek Kumar Pandey2, Richa Verma3, Mohd Faizan2, Shalini Chandra3, Alka Agrawal2, Rajeev Kumar2,4,*, Raees Ahmad Khan2

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2283-2299, 2021, DOI:10.32604/cmc.2021.013579 - 28 December 2020

    Abstract Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP)… More >

  • Open Access

    ARTICLE

    Fuzzy Based Decision-Making Approach for Estimating Usable-Security of Healthcare Web Applications

    Fahad A. Alzahrani*

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2599-2625, 2021, DOI:10.32604/cmc.2021.013124 - 28 December 2020

    Abstract Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments,… More >

Displaying 11-20 on page 2 of 24. Per Page