Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (83)
  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    REVIEW

    Computing Challenges of UAV Networks: A Comprehensive Survey

    Altaf Hussain1, Shuaiyong Li2, Tariq Hussain3, Xianxuan Lin4,*, Farman Ali5,*, Ahmad Ali AlZubi6

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 1999-2051, 2024, DOI:10.32604/cmc.2024.056183 - 18 November 2024

    Abstract Devices and networks constantly upgrade, leading to rapid technological evolution. Three-dimensional (3D) point cloud transmission plays a crucial role in aerial computing terminology, facilitating information exchange. Various network types, including sensor networks and 5G mobile networks, support this transmission. Notably, Flying Ad hoc Networks (FANETs) utilize Unmanned Aerial Vehicles (UAVs) as nodes, operating in a 3D environment with Six Degrees of Freedom (6DoF). This study comprehensively surveys UAV networks, focusing on models for Light Detection and Ranging (LiDAR) 3D point cloud compression/transmission. Key topics covered include autonomous navigation, challenges in video streaming infrastructure, motivations for More >

  • Open Access

    REVIEW

    A Review of Generative Adversarial Networks for Intrusion Detection Systems: Advances, Challenges, and Future Directions

    Monirah Al-Ajlan*, Mourad Ykhlef

    CMC-Computers, Materials & Continua, Vol.81, No.2, pp. 2053-2076, 2024, DOI:10.32604/cmc.2024.055891 - 18 November 2024

    Abstract The ever-growing network traffic threat landscape necessitates adopting accurate and robust intrusion detection systems (IDSs). IDSs have become a research hotspot and have seen remarkable performance improvements. Generative adversarial networks (GANs) have also garnered increasing research interest recently due to their remarkable ability to generate data. This paper investigates the application of (GANs) in (IDS) and explores their current use within this research field. We delve into the adoption of GANs within signature-based, anomaly-based, and hybrid IDSs, focusing on their objectives, methodologies, and advantages. Overall, GANs have been widely employed, mainly focused on solving the More >

  • Open Access

    PROCEEDINGS

    Challenges and Advances in Spot Joining Processes of Automotive Bodies

    Yongbing Li1,*, Yunwu Ma1, Yujun Xia1, Ming Lou1

    The International Conference on Computational & Experimental Engineering and Sciences, Vol.30, No.4, pp. 1-1, 2024, DOI:10.32604/icces.2024.012602

    Abstract The implementation of lightweight materials and structures in automotive body manufacturing is a strategic approach to improve fuel efficiency of energy-efficient vehicles and driving range of new energy vehicles. However, high specific strength low-ductility light metals (like 7xxx aluminum, magnesium and cast aluminum), ultra-high strength steels, high-stiffness profile structures and their mixed use poses a big challenge to existing commercial spot joining processes, such as resistance spot welding and self-piercing riveting. In this talk, the challenges which new lightweight materials and structures pose to spot joining process will be presented, the bottleneck of the existing More >

  • Open Access

    ARTICLE

    Post-COVID-19 Challenges for Full-Time Employees in China: Job Insecurity, Workplace Anxiety and Work-Life Conflict

    Tianfei Yang1, Xianyi Long2,*

    International Journal of Mental Health Promotion, Vol.26, No.9, pp. 719-730, 2024, DOI:10.32604/ijmhp.2024.053705 - 20 September 2024

    Abstract Background: Though the COVID-19 pandemic recedes, and our society gradually returns to normal, Chinese people’s work and lifestyles are still influenced by the “pandemic aftermath”. In the post-pandemic era, employees may feel uncertainty at work due to the changed organizational operations and management and perceive the external environment to be more dynamic. Both these perceptions may increase employees’ negative emotions and contribute to conflicts between work and life. Drawing from the ego depletion theory, this study aimed to examine the impact of job insecurity during the post-pandemic era on employees’ work-life conflicts, and the mediating… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    REVIEW

    The Impact of Domain Name Server (DNS) over Hypertext Transfer Protocol Secure (HTTPS) on Cyber Security: Limitations, Challenges, and Detection Techniques

    Muhammad Dawood1, Shanshan Tu1, Chuangbai Xiao1, Muhammad Haris2, Hisham Alasmary3, Muhammad Waqas4,5,*, Sadaqat Ur Rehman6

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4513-4542, 2024, DOI:10.32604/cmc.2024.050049 - 12 September 2024

    Abstract The DNS over HTTPS (Hypertext Transfer Protocol Secure) (DoH) is a new technology that encrypts DNS traffic, enhancing the privacy and security of end-users. However, the adoption of DoH is still facing several research challenges, such as ensuring security, compatibility, standardization, performance, privacy, and increasing user awareness. DoH significantly impacts network security, including better end-user privacy and security, challenges for network security professionals, increasing usage of encrypted malware communication, and difficulty adapting DNS-based security measures. Therefore, it is important to understand the impact of DoH on network security and develop new privacy-preserving techniques to allow More >

  • Open Access

    REVIEW

    A Review on the Advancement of Renewable Natural Fiber Hybrid Composites: Prospects, Challenges, and Industrial Applications

    Mohammed Mohammed1,2,*, Jawad K. Oleiwi3, Aeshah M. Mohammed4, Anwar Ja’afar Mohamad Jawad5, Azlin F. Osman1,2, Tijjani Adam6, Bashir O. Betar7, Subash C. B. Gopinath2,8,9

    Journal of Renewable Materials, Vol.12, No.7, pp. 1237-1290, 2024, DOI:10.32604/jrm.2024.051201 - 21 August 2024

    Abstract Natural fibre (NFR) reinforced functional polymer composites are quickly becoming an indispensable sustainable material in the transportation industry because of their lightweight, lower cost in manufacture, and adaptability to a wide variety of goods. However, the major difficulties of using these fibres are their existing poor dimensional stability and the extreme hydrophilicity. In assessing the mechanical properties (MP) of composites, the interfacial bonding (IB) happening between the NFR and the polymer matrix (PM) plays an incredibly significant role. When compared to NFR/synthetic fibre hybrid composites, hybrid composites (HC) made up of two separate NFR are… More > Graphic Abstract

    A Review on the Advancement of Renewable Natural Fiber Hybrid Composites: Prospects, Challenges, and Industrial Applications

  • Open Access

    REVIEW

    Security and Privacy Challenges in SDN-Enabled IoT Systems: Causes, Proposed Solutions, and Future Directions

    Ahmad Rahdari1,6, Ahmad Jalili2, Mehdi Esnaashari3, Mehdi Gheisari1,4,7,8,*, Alisa A. Vorobeva5, Zhaoxi Fang1, Panjun Sun1,*, Viktoriia M. Korzhuk5, Ilya Popov5, Zongda Wu1, Hamid Tahaei1

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2511-2533, 2024, DOI:10.32604/cmc.2024.052994 - 15 August 2024

    Abstract Software-Defined Networking (SDN) represents a significant paradigm shift in network architecture, separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment. Concurrently, the Internet of Things (IoT) connects numerous devices to the Internet, enabling autonomous interactions with minimal human intervention. However, implementing and managing an SDN-IoT system is inherently complex, particularly for those with limited resources, as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration. The findings of this study underscore the primary security and privacy challenges across application, control, and data planes.… More >

  • Open Access

    ARTICLE

    Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection

    Islam Zada1,*, Mohammed Naif Alatawi2, Syed Muhammad Saqlain1, Abdullah Alshahrani3, Adel Alshamran4, Kanwal Imran5, Hessa Alfraihi6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2917-2939, 2024, DOI:10.32604/cmc.2024.052835 - 15 August 2024

    Abstract Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However, there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection. Addressing this gap can provide valuable insights for enhancing cybersecurity strategies. While numerous studies have explored malware detection using machine learning techniques, there is a lack of systematic comparison of supervised classifiers for Windows malware detection. Understanding the relative effectiveness of these classifiers can inform the selection of… More >

Displaying 1-10 on page 1 of 83. Per Page