Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (37)
  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    IGED: Towards Intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN

    Yanhua Liu1,2,3, Yuting Han1,2,3, Hui Chen1,2,3, Baokang Zhao4,*, Xiaofeng Wang4, Ximeng Liu1,2,3

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 1851-1866, 2024, DOI:10.32604/cmc.2024.051194 - 15 August 2024

    Abstract As the scale of the networks continually expands, the detection of distributed denial of service (DDoS) attacks has become increasingly vital. We propose an intelligent detection model named IGED by using improved generalized entropy and deep neural network (DNN). The initial detection is based on improved generalized entropy to filter out as much normal traffic as possible, thereby reducing data volume. Then the fine detection is based on DNN to perform precise DDoS detection on the filtered suspicious traffic, enhancing the neural network’s generalization capabilities. Experimental results show that the proposed method can efficiently distinguish More >

  • Open Access

    ARTICLE

    An Example of a Supporting Combination by Using GA to Evolve More Advanced and Deeper CNN Architecture

    Bah Mamoudou*

    Journal on Artificial Intelligence, Vol.5, pp. 163-180, 2023, DOI:10.32604/jai.2023.045324 - 26 December 2023

    Abstract It has become an annual tradition for Convolutional Neural Networks (CNNs) to continuously improve their performance in image classification and other applications. These advancements are often attributed to the adoption of more intricate network architectures, such as modules and skip connections, as well as the practice of stacking additional layers to create increasingly complex networks. However, the quest to identify the most optimized model is a daunting task, given that state of the art Convolutional Neural Network (CNN) models are manually engineered. In this research paper, we leveraged a conventional Genetic Algorithm (GA) to craft More >

  • Open Access

    ARTICLE

    Detecting and Mitigating DDOS Attacks in SDNs Using Deep Neural Network

    Gul Nawaz1, Muhammad Junaid1, Adnan Akhunzada2, Abdullah Gani2,*, Shamyla Nawazish3, Asim Yaqub3, Adeel Ahmed1, Huma Ajab4

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2157-2178, 2023, DOI:10.32604/cmc.2023.026952 - 29 November 2023

    Abstract Distributed denial of service (DDoS) attack is the most common attack that obstructs a network and makes it unavailable for a legitimate user. We proposed a deep neural network (DNN) model for the detection of DDoS attacks in the Software-Defined Networking (SDN) paradigm. SDN centralizes the control plane and separates it from the data plane. It simplifies a network and eliminates vendor specification of a device. Because of this open nature and centralized control, SDN can easily become a victim of DDoS attacks. We proposed a supervised Developed Deep Neural Network (DDNN) model that can… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267 - 26 May 2023

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Through Deep Learning in Routing MANET Networks

    Zainab Ali Abbood1,2,*, Doğu Çağdaş Atilla3,4, Çağatay Aydin5

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 269-281, 2023, DOI:10.32604/iasc.2023.035276 - 29 April 2023

    Abstract Deep learning (DL) is a subdivision of machine learning (ML) that employs numerous algorithms, each of which provides various explanations of the data it consumes; mobile ad-hoc networks (MANET) are growing in prominence. For reasons including node mobility, due to MANET’s potential to provide small-cost solutions for real-world contact challenges, decentralized management, and restricted bandwidth, MANETs are more vulnerable to security threats. When protecting MANETs from attack, encryption and authentication schemes have their limits. However, deep learning (DL) approaches in intrusion detection systems (IDS) can adapt to the changing environment of MANETs and allow a… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856 - 03 April 2023

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training… More >

  • Open Access

    ARTICLE

    Non-Contact Physiological Measurement System for Wearing Masks During the Epidemic

    Shu-Yin Chiang*, Dong-Ye Wu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2509-2526, 2023, DOI:10.32604/cmc.2023.036466 - 31 March 2023

    Abstract Physiological signals indicate a person’s physical and mental state at any given time. Accordingly, many studies extract physiological signals from the human body with non-contact methods, and most of them require facial feature points. However, under COVID-19, wearing a mask has become a must in many places, so how non-contact physiological information measurements can still be performed correctly even when a mask covers the facial information has become a focus of research. In this study, RGB and thermal infrared cameras were used to execute non-contact physiological information measurement systems for heart rate, blood pressure, respiratory… More >

  • Open Access

    ARTICLE

    Generalized Jaccard Similarity Based Recurrent DNN for Virtualizing Social Network Communities

    R. Gnanakumari1,*, P. Vijayalakshmi2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2719-2730, 2023, DOI:10.32604/iasc.2023.034145 - 15 March 2023

    Abstract In social data analytics, Virtual Community (VC) detection is a primary challenge in discovering user relationships and enhancing social recommendations. VC formation is used for personal interaction between communities. But the usual methods didn’t find the Suspicious Behaviour (SB) needed to make a VC. The Generalized Jaccard Suspicious Behavior Similarity-based Recurrent Deep Neural Network Classification and Ranking (GJSBS-RDNNCR) Model addresses these issues. The GJSBS-RDNNCR model comprises four layers for VC formation in Social Networks (SN). In the GJSBS-RDNNCR model, the SN is given as an input at the input layer. After that, the User’s Behaviors… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255 - 15 March 2023

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three More >

Displaying 1-10 on page 1 of 37. Per Page