Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,489)
  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086 - 01 June 2022

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular… More >

  • Open Access

    ARTICLE

    Design of Clustering Techniques in Cognitive Radio Sensor Networks

    R. Ganesh Babu1,*, D. Hemanand2, V. Amudha3, S. Sugumaran4

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 441-456, 2023, DOI:10.32604/csse.2023.024049 - 01 June 2022

    Abstract In recent decades, several optimization algorithms have been developed for selecting the most energy efficient clusters in order to save power during transmission to a shorter distance while restricting the Primary Users (PUs) interference. The Cognitive Radio (CR) system is based on the Adaptive Swarm Distributed Intelligent based Clustering algorithm (ASDIC) that shows better spectrum sensing among group of multiusers in terms of sensing error, power saving, and convergence time. In this research paper, the proposed ASDIC algorithm develops better energy efficient distributed cluster based sensing with the optimal number of clusters on their connectivity.… More >

  • Open Access

    ARTICLE

    Community Detection Using Jaacard Similarity with SIM-Edge Detection Techniques

    K. Chitra*, A. Tamilarasi

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 327-337, 2023, DOI:10.32604/csse.2023.023920 - 01 June 2022

    Abstract The structure and dynamic nature of real-world networks can be revealed by communities that help in promotion of recommendation systems. Social Media platforms were initially developed for effective communication, but now it is being used widely for extending and to obtain profit among business community. The numerous data generated through these platforms are utilized by many companies that make a huge profit out of it. A giant network of people in social media is grouped together based on their similar properties to form a community. Community detection is recent topic among the research community due… More >

  • Open Access

    ARTICLE

    Enforcing a Source-end Cooperative Multilevel Defense Mechanism to Counter Flooding Attack

    Saraswathi Shunmuganathan*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 67-79, 2023, DOI:10.32604/csse.2023.023858 - 01 June 2022

    Abstract The exponential advancement in telecommunication embeds the Internet in every aspect of communication. Interconnections of networks all over the world impose monumental risks on the Internet. A Flooding Attack (FA) is one of the major intimidating risks on the Internet where legitimate users are prevented from accessing network services. Irrespective of the protective measures incorporated in the communication infrastructure, FA still persists due to the lack of global cooperation. Most of the existing mitigation is set up either at the traffic starting point or at the traffic ending point. Providing mitigation at one or the… More >

  • Open Access

    ARTICLE

    Copy-Move Geometric Tampering Estimation Through Enhanced SIFT Detector Method

    J. S. Sujin1,*, S. Sophia2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 157-171, 2023, DOI:10.32604/csse.2023.023747 - 01 June 2022

    Abstract Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements in image processing and the availability of sophisticated software, picture fabrication may hide evidence and hinder the detection of such criminal cases. The practice of modifying original photographic images to generate a forged image is known as digital image forging. A section of an image is copied and pasted into another part of the same image to hide an item or duplicate particular image elements in copy-move forgery. In order to make the forgeries real and inconspicuous,… More >

  • Open Access

    ARTICLE

    Multiple Object Tracking through Background Learning

    Deependra Sharma*, Zainul Abdin Jaffery

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 191-204, 2023, DOI:10.32604/csse.2023.023728 - 01 June 2022

    Abstract This paper discusses about the new approach of multiple object tracking relative to background information. The concept of multiple object tracking through background learning is based upon the theory of relativity, that involves a frame of reference in spatial domain to localize and/or track any object. The field of multiple object tracking has seen a lot of research, but researchers have considered the background as redundant. However, in object tracking, the background plays a vital role and leads to definite improvement in the overall process of tracking. In the present work an algorithm is proposed More >

  • Open Access

    ARTICLE

    Full Duplex Media Access Control Protocol for Multihop Network Computing

    J. Avila Selvi Therase1,*, S. Allwin1, A. Ahilan2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 297-309, 2023, DOI:10.32604/csse.2023.023515 - 01 June 2022

    Abstract Intelligent communication technologies beyond the network are proposed by using a new full-duplex protocol. The Media Access Control (MAC) is a data interaction network protocol, which outperforms the IEEE 802.15.4e. This research discusses the planning and execution of full-duplex (FD) pipeline MAC protocol for multihop wireless networks (MWN). The design uses a combination of Radio frequency and baseband methods to realize full-duplexing with smallest impact on cross layer functions. The execution and trial results specify that Pipeline Media Access Control (PiMAC) protocol considerably develops network implementation in terms of transmission protocol (TP) and transmission delay.… More >

  • Open Access

    ARTICLE

    Fuzzy User Access Trust Model for Cloud Access Control

    Aakib Jawed Khan*, Shabana Mehfuz

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 113-128, 2023, DOI:10.32604/csse.2023.023378 - 01 June 2022

    Abstract Cloud computing belongs to a set of policies, protocols, technologies through which one can access shared resources such as storage, applications, networks, and services at relatively low cost. Despite the tremendous advantages of cloud computing, one big threat which must be taken care of is data security in the cloud. There are a dozen of threats that we are being exposed to while availing cloud services. Insufficient identity and access management, insecure interfaces and Applications interfaces (APIs), hijacking, advanced persistent threats, data threats, and many more are certain security issues with the cloud platform. APIs… More >

  • Open Access

    ARTICLE

    Efficient Centralized Cooperative Spectrum Sensing Techniques for Cognitive Networks

    P. Gnanasivam1, G. T. Bharathy1,*, V. Rajendran2, T. Tamilselvi1

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 55-65, 2023, DOI:10.32604/csse.2023.023374 - 01 June 2022

    Abstract Wireless Communication is a system for communicating information from one point to other, without utilizing any connections like wire, cable, or other physical medium. Cognitive Radio (CR) based systems and networks are a revolutionary new perception in wireless communications. Spectrum sensing is a vital task of CR to avert destructive intrusion with licensed primary or main users and discover the accessible spectrum for the efficient utilization of the spectrum. Centralized Cooperative Spectrum Sensing (CSS) is a kind of spectrum sensing. Most of the test metrics designed till now for sensing the spectrum is produced by… More >

  • Open Access

    ARTICLE

    Improved Load-Balanced Clustering for Energy-Aware Routing (ILBC-EAR) in WSNs

    D. Loganathan1,*, M. Balasubramani1, R. Sabitha2, S. Karthik2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 99-112, 2023, DOI:10.32604/csse.2023.023120 - 01 June 2022

    Abstract Sensors are considered as important elements of electronic devices. In many applications and service, Wireless Sensor Networks (WSNs) are involved in significant data sharing that are delivered to the sink node in energy efficient manner using multi-hop communications. But, the major challenge in WSN is the nodes are having limited battery resources, it is important to monitor the consumption rate of energy is very much needed. However, reducing energy consumption can increase the network lifetime in effective manner. For that, clustering methods are widely used for optimizing the rate of energy consumption among the sensor… More >

Displaying 881-890 on page 89 of 1489. Per Page