Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,094)
  • Open Access

    ARTICLE

    Lightweight Hash-Based Post-Quantum Signature Scheme for Industrial Internet of Things

    Chia-Hui Liu*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-18, 2026, DOI:10.32604/cmc.2025.072887 - 09 December 2025

    Abstract The Industrial Internet of Things (IIoT) has emerged as a cornerstone of Industry 4.0, enabling large-scale automation and data-driven decision-making across factories, supply chains, and critical infrastructures. However, the massive interconnection of resource-constrained devices also amplifies the risks of eavesdropping, data tampering, and device impersonation. While digital signatures are indispensable for ensuring authenticity and non-repudiation, conventional schemes such as RSA and ECC are vulnerable to quantum algorithms, jeopardizing long-term trust in IIoT deployments. This study proposes a lightweight, stateless, hash-based signature scheme that achieves post-quantum security while addressing the stringent efficiency demands of IIoT. The… More >

  • Open Access

    ARTICLE

    Structural and Helix Reversal Defects of Carbon Nanosprings: A Molecular Dynamics Study

    Alexander V. Savin1,2, Elena A. Korznikova3,4, Sergey V. Dmitriev5,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.072786 - 09 December 2025

    Abstract Due to their chiral structure, carbon nanosprings possess unique properties that are promising for nanotechnology applications. The structural transformations of carbon nanosprings in the form of spiral macromolecules derived from planar coronene and kekulene molecules (graphene helicoids and spiral nanoribbons) are analyzed using molecular dynamics simulations. The interatomic interactions are described by a force field including valence bonds, bond angles, torsional and dihedral angles, as well as van der Waals interactions. While the tension/compression of such nanosprings has been analyzed in the literature, this study investigates other modes of deformation, including bending and twisting. Depending… More >

  • Open Access

    ARTICLE

    Log-Based Anomaly Detection of System Logs Using Graph Neural Network

    Eman Alsalmi, Abeer Alhuzali*, Areej Alhothali

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-20, 2026, DOI:10.32604/cmc.2025.071012 - 09 December 2025

    Abstract Log anomaly detection is essential for maintaining the reliability and security of large-scale networked systems. Most traditional techniques rely on log parsing in the reprocessing stage and utilize handcrafted features that limit their adaptability across various systems. In this study, we propose a hybrid model, BertGCN, that integrates BERT-based contextual embedding with Graph Convolutional Networks (GCNs) to identify anomalies in raw system logs, thereby eliminating the need for log parsing. The BERT module captures semantic representations of log messages, while the GCN models the structural relationships among log entries through a text-based graph. This combination More >

  • Open Access

    ARTICLE

    Smart Assessment of Flight Quality for Trajectory Planning in Internet of Flying Things

    Weiping Zeng1, Xiangping Bryce Zhai1,2,3,*, Cheng Sun1, Liusha Jiang1,2, Yicong Du3, Xuefeng Yan1,3

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-15, 2026, DOI:10.32604/cmc.2025.070777 - 09 December 2025

    Abstract With the expanding applications of unmanned aerial vehicles (UAVs), precise flight evaluation has emerged as a critical enabler for efficient path planning, directly impacting operational performance and safety. Traditional path planning algorithms typically combine Dubins curves with local optimization to minimize trajectory length under 3D spatial constraints. However, these methods often overlook the correlation between pilot control quality and UAV flight dynamics, limiting their adaptability in complex scenarios. In this paper, we propose an intelligent flight evaluation model specifically designed to enhance multi-waypoint trajectory optimization algorithms. Our model leverages a decision tree to integrate attitude More >

  • Open Access

    ARTICLE

    Improving Real-Time Animal Detection Using Group Sparsity in YOLOv8: A Solution for Animal-Toy Differentiation

    Zia Ur Rehman1, Ahmad Syed2,*, Abu Tayab3, Ghanshyam G. Tejani4,5,*, Doaa Sami Khafaga6, El-Sayed M. El-kenawy7,8

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.070310 - 09 December 2025

    Abstract Object detection, a major challenge in computer vision and pattern recognition, plays a significant part in many applications, crossing artificial intelligence, face recognition, and autonomous driving. It involves focusing on identifying the detection, localization, and categorization of targets in images. A particularly important emerging task is distinguishing real animals from toy replicas in real-time, mostly for smart camera systems in both urban and natural environments. However, that difficult task is affected by factors such as showing angle, occlusion, light intensity, variations, and texture differences. To tackle these challenges, this paper recommends Group Sparse YOLOv8 (You… More >

  • Open Access

    ARTICLE

    Searchable Attribute-Based Encryption with Multi-Keyword Fuzzy Matching for Cloud-Based IoT

    He Duan, Shi Zhang*, Dayu Li

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-25, 2026, DOI:10.32604/cmc.2025.069628 - 09 December 2025

    Abstract Internet of Things (IoT) interconnects devices via network protocols to enable intelligent sensing and control. Resource-constrained IoT devices rely on cloud servers for data storage and processing. However, this cloud-assisted architecture faces two critical challenges: the untrusted cloud services and the separation of data ownership from control. Although Attribute-based Searchable Encryption (ABSE) provides fine-grained access control and keyword search over encrypted data, existing schemes lack of error tolerance in exact multi-keyword matching. In this paper, we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search (FCS-ABMSE) scheme that avoids computationally expensive bilinear pairing… More >

  • Open Access

    ARTICLE

    MWaOA: A Bio-Inspired Metaheuristic Algorithm for Resource Allocation in Internet of Things

    Rekha Phadke1, Abdul Lateef Haroon Phulara Shaik2, Dayanidhi Mohapatra3, Doaa Sami Khafaga4,*, Eman Abdullah Aldakheel4, N. Sathyanarayana5

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-26, 2026, DOI:10.32604/cmc.2025.067564 - 09 December 2025

    Abstract Recently, the Internet of Things (IoT) technology has been utilized in a wide range of services and applications which significantly transforms digital ecosystems through seamless interconnectivity between various smart devices. Furthermore, the IoT plays a key role in multiple domains, including industrial automation, smart homes, and intelligent transportation systems. However, an increasing number of connected devices presents significant challenges related to efficient resource allocation and system responsiveness. To address these issue, this research proposes a Modified Walrus Optimization Algorithm (MWaOA) for effective resource management in smart IoT systems. In the proposed MWaOA, a crowding process… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving Convolutional Neural Network Inference Framework for AIoT Applications

    Haoran Wang1, Shuhong Yang2, Kuan Shao2, Tao Xiao2, Zhenyong Zhang2,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-18, 2026, DOI:10.32604/cmc.2025.069404 - 10 November 2025

    Abstract With the rapid development of the Artificial Intelligence of Things (AIoT), convolutional neural networks (CNNs) have demonstrated potential and remarkable performance in AIoT applications due to their excellent performance in various inference tasks. However, the users have concerns about privacy leakage for the use of AI and the performance and efficiency of computing on resource-constrained IoT edge devices. Therefore, this paper proposes an efficient privacy-preserving CNN framework (i.e., EPPA) based on the Fully Homomorphic Encryption (FHE) scheme for AIoT application scenarios. In the plaintext domain, we verify schemes with different activation structures to determine the… More >

  • Open Access

    ARTICLE

    Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction

    Abeer Alnuaim*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-33, 2026, DOI:10.32604/cmc.2025.069110 - 10 November 2025

    Abstract The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats. In the evolving landscape of cybersecurity, the efficacy of Intrusion Detection Systems (IDS) is increasingly measured by technical performance, operational usability, and adaptability. This study introduces and rigorously evaluates a Human-Computer Interaction (HCI)-Integrated IDS with the utilization of Convolutional Neural Network (CNN), CNN-Long Short Term Memory (LSTM), and Random Forest (RF) against both a Baseline Machine Learning (ML) and a Traditional IDS model, through an extensive experimental framework encompassing many performance metrics, including detection latency, accuracy, alert prioritization, classification… More >

  • Open Access

    ARTICLE

    Lightweight Multi-Agent Edge Framework for Cybersecurity and Resource Optimization in Mobile Sensor Networks

    Fatima Al-Quayed*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-16, 2026, DOI:10.32604/cmc.2025.069102 - 10 November 2025

    Abstract Due to the growth of smart cities, many real-time systems have been developed to support smart cities using Internet of Things (IoT) and emerging technologies. They are formulated to collect the data for environment monitoring and automate the communication process. In recent decades, researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations. However, the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity. These systems are vulnerable to a variety of cyberattacks, including unauthorized access,… More >

Displaying 11-20 on page 2 of 1094. Per Page