Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS

    Kenian Wang1,2,*, Yuan Hong1,2, Chunxiao Li2

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 1123-1142, 2024, DOI:10.32604/cmc.2024.052088 - 18 July 2024

    Abstract With the exponential increase in information security risks, ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment. However, experts possess a limited understanding of fundamental security elements, such as assets, threats, and vulnerabilities, due to the confidentiality of airborne networks, resulting in cognitive uncertainty. Therefore, the Pythagorean fuzzy Analytic Hierarchy Process (AHP) Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks. First, Pythagorean fuzzy AHP is employed to construct an index system… More >

  • Open Access

    REVIEW

    IoMT-Based Healthcare Systems: A Review

    Tahir Abbas1,*, Ali Haider Khan2, Khadija Kanwal3, Ali Daud4,*, Muhammad Irfan5, Amal Bukhari6, Riad Alharbey6

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 871-895, 2024, DOI:10.32604/csse.2024.049026 - 17 July 2024

    Abstract The integration of the Internet of Medical Things (IoMT) and the Internet of Things (IoT), which has revolutionized patient care through features like remote critical care and real-time therapy, is examined in this study in response to the changing healthcare landscape. Even with these improvements, security threats are associated with the increased connectivity of medical equipment, which calls for a thorough assessment. With a primary focus on addressing security and performance enhancement challenges, the research classifies current IoT communication devices, examines their applications in IoMT, and investigates important aspects of IoMT devices in healthcare. The More >

  • Open Access

    ARTICLE

    A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems

    Jingyu Zhang1,2, Pian Zhou1, Jin Wang1, Osama Alfarraj3, Saurabh Singh4, Min Zhu5,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1613-1633, 2024, DOI:10.32604/cmes.2023.044418 - 29 January 2024

    Abstract Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system. This technology has been widely used and has developed rapidly in big data systems across various fields. An increasing number of users are participating in application systems that use blockchain as their underlying architecture. As the number of transactions and the capital involved in blockchain grow, ensuring information security becomes imperative. Addressing the verification of transactional information security and privacy has emerged as a critical challenge. Blockchain-based verification methods can effectively eliminate the need… More >

  • Open Access

    ARTICLE

    Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method

    Wenshu Xu, Mingwei Lin*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 199-222, 2023, DOI:10.32604/cmc.2023.041475 - 31 October 2023

    Abstract Industrial control systems (ICSs) are widely used in various fields, and the information security problems of ICSs are increasingly serious. The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts. Thus, this paper introduces the probabilistic linguistic term sets (PLTSs) to model the evaluation information of experts. Meanwhile, we propose a probabilistic linguistic multi-criteria decision-making (PL-MCDM) method to solve the information security assessment problem of ICSs. Firstly, we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods. Secondly, we use the Best Worst… More >

  • Open Access

    ARTICLE

    Ensuring Information Security in Electronic Health Record System Using Cryptography and Cuckoo Search Algorithm

    Arkan Kh Shakr Sabonchi1,*, Zainab Hashim Obaid2

    Journal of Information Hiding and Privacy Protection, Vol.5, pp. 1-18, 2023, DOI:10.32604/jihpp.2023.041972 - 07 September 2023

    Abstract In the contemporary era, the abundant availability of health information through internet and mobile technology raises concerns. Safeguarding and maintaining the confidentiality of patients’ medical data becomes paramount when sharing such information with authorized healthcare providers. Although electronic patient records and the internet have facilitated the exchange of medical information among healthcare providers, concerns persist regarding the security of the data. The security of Electronic Health Record Systems (EHRS) can be improved by employing the Cuckoo Search Algorithm (CS), the SHA-256 algorithm, and the Elliptic Curve Cryptography (ECC), as proposed in this study. The suggested… More >

  • Open Access

    ARTICLE

    3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling

    Yongsheng Hu*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1819-1838, 2023, DOI:10.32604/csse.2023.040729 - 28 July 2023

    Abstract 3D models are essential in virtual reality, game development, architecture design, engineering drawing, medicine, and more. Compared to digital images, 3D models can provide more realistic visual effects. In recent years, significant progress has been made in the field of digital image encryption, and researchers have developed new algorithms that are more secure and efficient. However, there needs to be more research on 3D model encryption. This paper proposes a new 3D model encryption algorithm, called the 1D map with sin and logistic coupling (1D-MWSLC), because existing digital image encryption algorithms cannot be directly applied… More >

  • Open Access

    ARTICLE

    A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6323-6336, 2023, DOI:10.32604/cmc.2023.034668 - 29 April 2023

    Abstract With the increasing use of distributed electric vehicles (EV), energy management in the Internet of vehicles (IoV) has attracted more attention, especially demand response (DR) management to achieve efficient energy management in IoV. Therefore, it is a tendency to introduce distributed energy such as renewable energy into the existing supply system. For optimizing the energy internet (EI) for IoV, in this paper, we introduce blockchain into energy internet and propose a secure EI scheme for IoV based on post-quantum blockchain, which provides the new information services and an incentive cooperation mechanism for the current energy… More >

  • Open Access

    ARTICLE

    BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things

    Sahar Badri1, Sana Ullah Jan2,*, Daniyal Alghazzawi1, Sahar Aldhaheri1, Nikolaos Pitropakis2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3667-3684, 2023, DOI:10.32604/csse.2023.037531 - 03 April 2023

    Abstract Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating More >

  • Open Access

    ARTICLE

    Mechanisms Influencing Learning Gains Under Information Security: Structural Equation Modeling with Mediating Effect

    Teng Zong1,2,*, Fengsi Wang3, Xin Wei2, Yibo Liu1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3447-3468, 2023, DOI:10.32604/iasc.2023.035456 - 15 March 2023

    Abstract With the expanding enrollments in higher education, the quality of college education and the learning gains of students have attracted much attention. It is important to study the influencing factors and mechanisms of individual students’ acquisition of learning gains to improve the quality of talent cultivation in colleges. However, in the context of information security, the original data of learning situation surveys in various universities involve the security of educational evaluation data and daily privacy of teachers and students. To protect the original data, data feature mining and correlation analyses were performed at the model… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270 - 09 February 2023

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A… More >

Displaying 1-10 on page 1 of 45. Per Page