Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,435)
  • Open Access

    ARTICLE

    Heuristic and Bent Key Exchange Secured Energy Efficient Data Transaction for Traffic Offloading in Mobile Cloud

    Nithya Rekha Sivakumar1, *, Sara Ghorashi1, Mona Jamjoom1, Mai Alduailij1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1925-1943, 2020, DOI:10.32604/cmc.2020.011505

    Abstract In today’s world, smart phones offer various applications namely face detection, augmented-reality, image and video processing, video gaming and speech recognition. With the increasing demand for computing resources, these applications become more complicated. Cloud Computing (CC) environment provides access to unlimited resource pool with several features, including on demand self-service, elasticity, wide network access, resource pooling, low cost, and ease of use. Mobile Cloud Computing (MCC) aimed at overcoming drawbacks of smart phone devices. The task remains in combining CC technology to the mobile devices with improved battery life and therefore resulting in significant performance. For remote execution, recent studies… More >

  • Open Access

    ARTICLE

    Analysis and Dynamics of Illicit Drug Use Described by Fractional Derivative with Mittag-Leffler Kernel

    Berat Karaagac1, 2, Kolade Matthew Owolabi1, 3, *, Kottakkaran Sooppy Nisar4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1905-1924, 2020, DOI:10.32604/cmc.2020.011623

    Abstract Illicit drug use is a significant problem that causes great material and moral losses and threatens the future of the society. For this reason, illicit drug use and related crimes are the most significant criminal cases examined by scientists. This paper aims at modeling the illegal drug use using the Atangana-Baleanu fractional derivative with Mittag-Leffler kernel. Also, in this work, the existence and uniqueness of solutions of the fractional-order Illicit drug use model are discussed via Picard-Lindelöf theorem which provides successive approximations using a convergent sequence. Then the stability analysis for both disease-free and endemic equilibrium states is conducted. A… More >

  • Open Access

    ARTICLE

    Analysis of Feature Importance and Interpretation for Malware Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2, *

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1891-1904, 2020, DOI:10.32604/cmc.2020.010933

    Abstract This study was conducted to enable prompt classification of malware, which was becoming increasingly sophisticated. To do this, we analyzed the important features of malware and the relative importance of selected features according to a learning model to assess how those important features were identified. Initially, the analysis features were extracted using Cuckoo Sandbox, an open-source malware analysis tool, then the features were divided into five categories using the extracted information. The 804 extracted features were reduced by 70% after selecting only the most suitable ones for malware classification using a learning model-based feature selection method called the recursive feature… More >

  • Open Access

    ARTICLE

    Edge-Computing with Graph Computation: A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN

    Rashid Amin1, *, Mudassar Hussain2, Mohammed Alhameed3, Syed Mohsan Raza4, Fathe Jeribi3, Ali Tahir3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1869-1890, 2020, DOI:10.32604/cmc.2020.011758

    Abstract Software Defined Networking (SDN) being an emerging network control model is widely recognized as a control and management platform. This model provides efficient techniques to control and manage the enterprise network. Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller. This data processing at the edge nodes reduces the latency and bandwidth requirements. In SDN, the controller is a single point of failure. Several security issues related to the traditional network can be solved by using SDN central management and control. Address Spoofing and Network Intrusion… More >

  • Open Access

    ARTICLE

    Guarantee Mechanism of Data Continuity for Electronic Record Based on Linked Data

    Yuyi Huo1, Shi Zhou3, Ruiguo Hu1, Yongjun Ren1,2,*, Jinyue Xia4

    Journal of Cyber Security, Vol.2, No.3, pp. 151-156, 2020, DOI:10.32604/jcs.2020.010963

    Abstract In the field of electronic record management, especially in the current big data environment, data continuity has become a new topic that is as important as security and needs to be studied. This paper decomposes the data continuity guarantee of electronic record into a set of data protection requirements consisting of data relevance, traceability and comprehensibility, and proposes to use the associated data technology to provide an integrated guarantee mechanism to meet the above three requirements. More >

  • Open Access

    ARTICLE

    Efficient Virtual Resource Allocation in Mobile Edge Networks Based on Machine Learning

    Li Li1,*, Yifei Wei1, Lianping Zhang2, Xiaojun Wang3

    Journal of Cyber Security, Vol.2, No.3, pp. 141-150, 2020, DOI:10.32604/jcs.2020.010764

    Abstract The rapid growth of Internet content, applications and services require more computing and storage capacity and higher bandwidth. Traditionally, internet services are provided from the cloud (i.e., from far away) and consumed on increasingly smart devices. Edge computing and caching provides these services from nearby smart devices. Blending both approaches should combine the power of cloud services and the responsiveness of edge networks. This paper investigates how to intelligently use the caching and computing capabilities of edge nodes/cloudlets through the use of artificial intelligence-based policies. We first analyze the scenarios of mobile edge networks with edge computing and caching abilities,… More >

  • Open Access

    ARTICLE

    Extracting Campus’ Road Network from Walking GPS Trajectories

    Yizhi Liu, Rutian Qing, Jianxun Liu*, Zhuhua Liao, Yijiang Zhao, Hong Ouyang

    Journal of Cyber Security, Vol.2, No.3, pp. 131-140, 2020, DOI:10.32604/jcs.2020.010625

    Abstract Road network extraction is vital to both vehicle navigation and road planning. Existing approaches focus on mining urban trunk roads from GPS trajectories of floating cars. However, path extraction, which plays an important role in earthquake relief and village tour, is always ignored. Addressing this issue, we propose a novel approach of extracting campus’ road network from walking GPS trajectories. It consists of data preprocessing and road centerline generation. The patrolling GPS trajectories, collected at Hunan University of Science and Technology, were used as the experimental data. The experimental evaluation results show that our approach is able to effectively and… More >

  • Open Access

    ARTICLE

    Image Feature Computation in Encrypted Domain Based on Mean Value

    Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1

    Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703

    Abstract In smart environments, more and more teaching data sources are uploaded to remote cloud centers which promote the development of the smart campus. The outsourcing of massive teaching data can reduce storage burden and computational cost, but causes some privacy concerns because those teaching data (especially personal image data) may contain personal private information. In this paper, a privacy-preserving image feature extraction algorithm is proposed by using mean value features. Clients use block scrambling and chaotic map to encrypt original images before uploading to the remote servers. Cloud servers can directly extract image mean value features from encrypted images. Experiments… More >

  • Open Access

    ARTICLE

    High Visual Quality Image Steganography Based on Encoder-Decoder Model

    Yan Wang*, Zhangjie Fu, Xingming Sun

    Journal of Cyber Security, Vol.2, No.3, pp. 115-121, 2020, DOI:10.32604/jcs.2020.012275

    Abstract Nowadays, with the popularization of network technology, more and more people are concerned about the problem of cyber security. Steganography, a technique dedicated to protecting peoples’ private data, has become a hot topic in the research field. However, there are still some problems in the current research. For example, the visual quality of dense images generated by some steganographic algorithms is not good enough; the security of the steganographic algorithm is not high enough, which makes it easy to be attacked by others. In this paper, we propose a novel high visual quality image steganographic neural network based on encoder-decoder… More >

  • Open Access

    ARTICLE

    Long-Term Bending Behaviour of Prestressed Glulam Bamboo-Wood Beam Based on Creep Effect

    Nan Guo1,*, Huajing Xiong1, Mingtao Wu1, Hongliang Zuo1, Fengguo Jiang2, Xiaofeng Hou3, Dabo Xin1

    Structural Durability & Health Monitoring, Vol.14, No.3, pp. 229-248, 2020, DOI:10.32604/sdhm.2020.09104

    Abstract Creep is an important characteristic of bamboo and wood materials under long-term loading. This paper aims to study the long-term bending behaviour of prestressed glulam bamboo-wood beam (GBWB). For this, 14 pre-stressed GBWBs were selected and subjected to a long-term loading test for 60 days. Then, a comparative analysis was performed for the effects of pretension values, the number of pre-stressed wires, and long-term load on the stress variation of the steel wire and the long-term deflection of the beam midspan. The test results showed that with the number of prestressed wires increasing, the total stress of the steel wire… More >

Displaying 14161-14170 on page 1417 of 22435. Per Page