Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    A Model Training Method for DDoS Detection Using CTGAN under 5GC Traffic

    Yea-Sul Kim1, Ye-Eun Kim1, Hwankuk Kim2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1125-1147, 2023, DOI:10.32604/csse.2023.039550 - 26 May 2023

    Abstract With the commercialization of 5th-generation mobile communications (5G) networks, a large-scale internet of things (IoT) environment is being built. Security is becoming increasingly crucial in 5G network environments due to the growing risk of various distributed denial of service (DDoS) attacks across vast IoT devices. Recently, research on automated intrusion detection using machine learning (ML) for 5G environments has been actively conducted. However, 5G traffic has insufficient data due to privacy protection problems and imbalance problems with significantly fewer attack data. If this data is used to train an ML model, it will likely suffer… More >

  • Open Access

    ARTICLE

    Generating Time-Series Data Using Generative Adversarial Networks for Mobility Demand Prediction

    Subhajit Chatterjee1, Yung-Cheol Byun2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5507-5525, 2023, DOI:10.32604/cmc.2023.032843 - 28 December 2022

    Abstract The increasing penetration rate of electric kickboard vehicles has been popularized and promoted primarily because of its clean and efficient features. Electric kickboards are gradually growing in popularity in tourist and education-centric localities. In the upcoming arrival of electric kickboard vehicles, deploying a customer rental service is essential. Due to its free-floating nature, the shared electric kickboard is a common and practical means of transportation. Relocation plans for shared electric kickboards are required to increase the quality of service, and forecasting demand for their use in a specific region is crucial. Predicting demand accurately with… More >

  • Open Access

    ARTICLE

    Developing a Secure Framework Using Feature Selection and Attack Detection Technique

    Mahima Dahiya*, Nitin Nitin

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4183-4201, 2023, DOI:10.32604/cmc.2023.032430 - 31 October 2022

    Abstract Intrusion detection is critical to guaranteeing the safety of the data in the network. Even though, since Internet commerce has grown at a breakneck pace, network traffic kinds are rising daily, and network behavior characteristics are becoming increasingly complicated, posing significant hurdles to intrusion detection. The challenges in terms of false positives, false negatives, low detection accuracy, high running time, adversarial attacks, uncertain attacks, etc. lead to insecure Intrusion Detection System (IDS). To offset the existing challenge, the work has developed a secure Data Mining Intrusion detection system (DataMIDS) framework using Functional Perturbation (FP) feature… More >

  • Open Access

    ARTICLE

    Generating Synthetic Data to Reduce Prediction Error of Energy Consumption

    Debapriya Hazra, Wafa Shafqat, Yung-Cheol Byun*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3151-3167, 2022, DOI:10.32604/cmc.2022.020143 - 27 September 2021

    Abstract Renewable and nonrenewable energy sources are widely incorporated for solar and wind energy that produces electricity without increasing carbon dioxide emissions. Energy industries worldwide are trying hard to predict future energy consumption that could eliminate over or under contracting energy resources and unnecessary financing. Machine learning techniques for predicting energy are the trending solution to overcome the challenges faced by energy companies. The basic need for machine learning algorithms to be trained for accurate prediction requires a considerable amount of data. Another critical factor is balancing the data for enhanced prediction. Data Augmentation is a… More >

Displaying 1-10 on page 1 of 4. Per Page