Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    Optimized Artificial Neural Network Techniques to Improve Cybersecurity of Higher Education Institution

    Abdullah Saad AL-Malaise AL-Ghamdi1, Mahmoud Ragab2,3,4,*, Maha Farouk S. Sabir1, Ahmed Elhassanein5,6, Ashraf A. Gouda4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3385-3399, 2022, DOI:10.32604/cmc.2022.026477

    Abstract Education acts as an important part of economic growth and improvement in human welfare. The educational sectors have transformed a lot in recent days, and Information and Communication Technology (ICT) is an effective part of the education field. Almost every action in university and college, right from the process from counselling to admissions and fee deposits has been automated. Attendance records, quiz, evaluation, mark, and grade submissions involved the utilization of the ICT. Therefore, security is essential to accomplish cybersecurity in higher security institutions (HEIs). In this view, this study develops an Automated Outlier Detection… More >

Displaying 1-10 on page 1 of 2. Per Page