Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (70)
  • Open Access

    ARTICLE

    An Improved Blockchain-Based Cloud Auditing Scheme Using Dynamic Aggregate Signatures

    Haibo Lei1,2, Xu An Wang1,*, Wenhao Liu1, Lingling Wu1, Chao Zhang1, Weiwei Jiang3, Xiao Zou4

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-31, 2026, DOI:10.32604/cmc.2025.070030 - 09 December 2025

    Abstract With the rapid expansion of the Internet of Things (IoT), user data has experienced exponential growth, leading to increasing concerns about the security and integrity of data stored in the cloud. Traditional schemes relying on untrusted third-party auditors suffer from both security and efficiency issues, while existing decentralized blockchain-based auditing solutions still face shortcomings in correctness and security. This paper proposes an improved blockchain-based cloud auditing scheme, with the following core contributions: Identifying critical logical contradictions in the original scheme, thereby establishing the foundation for the correctness of cloud auditing; Designing an enhanced mechanism that… More >

  • Open Access

    REVIEW

    Toward Robust Deepfake Defense: A Review of Deepfake Detection and Prevention Techniques in Images

    Ahmed Abdel-Wahab1, Mohammad Alkhatib2,*

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-34, 2026, DOI:10.32604/cmc.2025.070010 - 09 December 2025

    Abstract Deepfake is a sort of fake media made by advanced AI methods like Generative Adversarial Networks (GANs). Deepfake technology has many useful uses in education and entertainment, but it also raises a lot of ethical, social, and security issues, such as identity theft, the dissemination of false information, and privacy violations. This study seeks to provide a comprehensive analysis of several methods for identifying and circumventing Deepfakes, with a particular focus on image-based Deepfakes. There are three main types of detection methods: classical, machine learning (ML) and deep learning (DL)-based, and hybrid methods. There are… More >

  • Open Access

    ARTICLE

    E-AAPIV: Merkle Tree-Based Real-Time Android Manifest Integrity Verification for Mobile Payment Security

    Mostafa Mohamed Ahmed Mohamed Alsaedy1,*, Atef Zaki Ghalwash1, Aliaa Abd Elhalim Yousif2, Safaa Magdy Azzam1

    Journal of Cyber Security, Vol.7, pp. 653-674, 2025, DOI:10.32604/jcs.2025.073547 - 24 December 2025

    Abstract Mobile financial applications and payment systems face significant security challenges from reverse engineering attacks. Attackers can decompile Android Package Kit (APK) files, modify permissions, and repackage applications with malicious capabilities. This work introduces E-AAPIV (Enhanced Android Apps Permissions Integrity Verifier), an advanced framework that uses Merkle Tree technology for real-time manifest integrity verification. The proposed system constructs cryptographic Merkle Tree from AndroidManifest.xml permission structures. It establishes secure client-server connections using Elliptic Curve Diffie-Hellman Protocol (ECDH-P384) key exchange. Root hashes are encrypted with Advanced Encryption Standard-256-Galois/Counter Mode (AES-256-GCM), integrated with hardware-backed Android Keystore for enhanced security. More >

  • Open Access

    ARTICLE

    Stress Intensity Factor, Plastic Limit Pressure and Service Life Assessment of a Transportation-Damaged Pipe with a High-Aspect-Ratio Axial Surface Crack

    Božo Damjanović*, Pejo Konjatić, Marko Katinić

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 1735-1753, 2025, DOI:10.32604/cmes.2025.072256 - 26 November 2025

    Abstract Ensuring the structural integrity of piping systems is crucial in industrial operations to prevent catastrophic failures and minimize shutdown time. This study investigates a transportation-damaged pipe exposed to high-temperature conditions and cyclic loading, representing a realistic challenge in plant operation. The objective was to evaluate the service life and integrity assessment parameters of the damaged pipe, subjected to 22,000 operational cycles under two daily charge and discharge conditions. The flaw size in the damaged pipe was determined based on a failure assessment procedure, ensuring a conservative and reliable input. The damage was characterized as a… More >

  • Open Access

    ARTICLE

    Use of Scaled Models to Evaluate Reinforcement Efficiency in Damaged Main Gas Pipelines to Prevent Avalanche Failure

    Nurlan Zhangabay1,*, Marco Bonopera2,*, Konstantin Avramov3, Maryna Chernobryvko3, Svetlana Buganova4

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 241-261, 2025, DOI:10.32604/cmes.2025.069544 - 30 October 2025

    Abstract This research extends ongoing efforts to develop methods for reinforcing damaged main gas pipelines to prevent catastrophic failure. This study establishes the use of scaled-down experimental models for assessing the dynamic strength of damaged pipeline sections reinforced with wire wrapping or composite sleeves. A generalized dynamic model is introduced for numerical simulation to evaluate the effectiveness of reinforcement techniques. The model incorporates the elastoplastic behavior of pipe and wire materials, the influence of temperature on mechanical properties, the contact interaction between the pipe and the reinforcement components (including pretensioning), and local material failure under transient… More >

  • Open Access

    ARTICLE

    Evaluation of Tubing Integrity with Rectangular Corrosion under Thermo-Chemical-Mechanical Coupling

    Yi Huang1,*, Ming Luo1, Zhujun Li1, Donglei Jiang1, Ping Xiao1, Mingyuan Yao2, Jia He2

    FDMP-Fluid Dynamics & Materials Processing, Vol.21, No.8, pp. 1839-1860, 2025, DOI:10.32604/fdmp.2025.065459 - 12 September 2025

    Abstract This study presents a comprehensive mechanical analysis of P110S oil tubing subjected to thermal and chemical coupling effects, with particular attention to the presence of rectangular corrosion defects. Drawing on the material’s stress–strain constitutive behavior, thermal expansion coefficient, thermal conductivity, and electrochemical test data, the research incorporates geometric nonlinearities arising from large deformations induced by corrosion. A detailed three-dimensional finite element (FE) model of the corroded P110S tubing is developed to simulate its response under complex loading conditions. The proposed model is rigorously validated through full-scale burst experiments and analytical calculations based on theoretical formulations.… More >

  • Open Access

    ARTICLE

    Future-Proofing CIA Triad with Authentication for Healthcare: Integrating Hybrid Architecture of ML & DL with IDPS for Robust IoMT Security

    Saad Awadh Alanazi1, Fahad Ahmad2,3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 769-800, 2025, DOI:10.32604/cmc.2025.066753 - 29 August 2025

    Abstract This study presents a comprehensive and secure architectural framework for the Internet of Medical Things (IoMT), integrating the foundational principles of the Confidentiality, Integrity, and Availability (CIA) triad along with authentication mechanisms. Leveraging advanced Machine Learning (ML) and Deep Learning (DL) techniques, the proposed system is designed to safeguard Patient-Generated Health Data (PGHD) across interconnected medical devices. Given the increasing complexity and scale of cyber threats in IoMT environments, the integration of Intrusion Detection and Prevention Systems (IDPS) with intelligent analytics is critical. Our methodology employs both standalone and hybrid ML & DL models to… More >

  • Open Access

    ARTICLE

    Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification

    Rim Amdouni1,2,*, Mahdi Madani3, Mohamed Ali Hajjaji1,4, El Bay Bourennane3, Mohamed Atri5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5527-5553, 2025, DOI:10.32604/cmc.2025.065356 - 30 July 2025

    Abstract Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector. In the context of security, this paper proposes a novel encryption algorithm that integrates Blockchain technology, aiming to improve the security and privacy of transmitted data. The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps: The logistic Map, the Tent Map, and the Henon Map used to generate three encryption keys. The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.… More >

  • Open Access

    ARTICLE

    C-BIVM: A Cognitive-Based Integrity Verification Model for IoT-Driven Smart Cities

    Radhika Kumari1, Kiranbir Kaur1, Ahmad Almogren2, Ayman Altameem3, Salil Bharany4,*, Yazeed Yasin Ghadi5, Ateeq Ur Rehman6,*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5509-5525, 2025, DOI:10.32604/cmc.2025.064247 - 30 July 2025

    Abstract The exponential growth of the Internet of Things (IoT) has revolutionized various domains such as healthcare, smart cities, and agriculture, generating vast volumes of data that require secure processing and storage in cloud environments. However, reliance on cloud infrastructure raises critical security challenges, particularly regarding data integrity. While existing cryptographic methods provide robust integrity verification, they impose significant computational and energy overheads on resource-constrained IoT devices, limiting their applicability in large-scale, real-time scenarios. To address these challenges, we propose the Cognitive-Based Integrity Verification Model (C-BIVM), which leverages Belief-Desire-Intention (BDI) cognitive intelligence and algebraic signatures to… More >

  • Open Access

    ARTICLE

    Upholding Academic Integrity amidst Advanced Language Models: Evaluating BiLSTM Networks with GloVe Embeddings for Detecting AI-Generated Scientific Abstracts

    Lilia-Eliana Popescu-Apreutesei, Mihai-Sorin Iosupescu, Sabina Cristiana Necula, Vasile-Daniel Păvăloaia*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2605-2644, 2025, DOI:10.32604/cmc.2025.064747 - 03 July 2025

    Abstract The increasing fluency of advanced language models, such as GPT-3.5, GPT-4, and the recently introduced DeepSeek, challenges the ability to distinguish between human-authored and AI-generated academic writing. This situation is raising significant concerns regarding the integrity and authenticity of academic work. In light of the above, the current research evaluates the effectiveness of Bidirectional Long Short-Term Memory (BiLSTM) networks enhanced with pre-trained GloVe (Global Vectors for Word Representation) embeddings to detect AI-generated scientific abstracts drawn from the AI-GA (Artificial Intelligence Generated Abstracts) dataset. Two core BiLSTM variants were assessed: a single-layer approach and a dual-layer… More >

Displaying 1-10 on page 1 of 70. Per Page