Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Fine-Tuning Cyber Security Defenses: Evaluating Supervised Machine Learning Classifiers for Windows Malware Detection

    Islam Zada1,*, Mohammed Naif Alatawi2, Syed Muhammad Saqlain1, Abdullah Alshahrani3, Adel Alshamran4, Kanwal Imran5, Hessa Alfraihi6

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2917-2939, 2024, DOI:10.32604/cmc.2024.052835 - 15 August 2024

    Abstract Malware attacks on Windows machines pose significant cybersecurity threats, necessitating effective detection and prevention mechanisms. Supervised machine learning classifiers have emerged as promising tools for malware detection. However, there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware detection. Addressing this gap can provide valuable insights for enhancing cybersecurity strategies. While numerous studies have explored malware detection using machine learning techniques, there is a lack of systematic comparison of supervised classifiers for Windows malware detection. Understanding the relative effectiveness of these classifiers can inform the selection of… More >

  • Open Access

    ARTICLE

    Requirements Engineering: Conflict Detection Automation Using Machine Learning

    Hatim Elhassan1, Mohammed Abaker1, Abdelzahir Abdelmaboud2, Mohammed Burhanur Rehman1,*

    Intelligent Automation & Soft Computing, Vol.33, No.1, pp. 259-273, 2022, DOI:10.32604/iasc.2022.023750 - 05 January 2022

    Abstract The research community has well recognized the importance of requirement elicitation. Recent research has shown the continuous decreasing success rate of IS projects in the last five years due to the complexity of the requirement conflict refinement process. Requirement conflict is at the heart of requirement elicitation. It is also considered the prime reason for deciding the success or failure of the intended Information System (IS) project. This paper introduces the requirements conflict detection automation model based on the Mean shift clustering unsupervised machine learning model. It utilizes the advantages of Artificial Intelligence in detecting… More >

  • Open Access

    ARTICLE

    Intelligent Identification and Resolution of Software Requirement Conflicts: Assessment and Evaluation

    Maysoon Aldekhail1, Marwah Almasri2,*

    Computer Systems Science and Engineering, Vol.40, No.2, pp. 469-489, 2022, DOI:10.32604/csse.2022.018269 - 09 September 2021

    Abstract Considerable research has demonstrated how effective requirements engineering is critical for the success of software projects. Requirements engineering has been established and recognized as one of the most important aspects of software engineering as of late. It is noteworthy to mention that requirement consistency is a critical factor in project success, and conflicts in requirements lead to waste of cost, time, and effort. A considerable number of research studies have shown the risks and problems caused by working with requirements that are in conflict with other requirements. These risks include running overtime or over budget,… More >

  • Open Access

    ARTICLE

    Effective Hybrid Content-Based Collaborative Filtering Approach for Requirements Engineering

    Qusai Y. Shambour*, Abdelrahman H. Hussein, Qasem M. Kharma, Mosleh M. Abualhaj

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 113-125, 2022, DOI:10.32604/csse.2022.017221 - 26 August 2021

    Abstract Requirements engineering (RE) is among the most valuable and critical processes in software development. The quality of this process significantly affects the success of a software project. An important step in RE is requirements elicitation, which involves collecting project-related requirements from different sources. Repositories of reusable requirements are typically important sources of an increasing number of reusable software requirements. However, the process of searching such repositories to collect valuable project-related requirements is time-consuming and difficult to perform accurately. Recommender systems have been widely recognized as an effective solution to such problem. Accordingly, this study proposes More >

  • Open Access

    ARTICLE

    Crowdsourced Requirements Engineering Challenges and Solutions: A Software Industry Perspective

    Huma Hayat Khan1,*, Muhammad Noman Malik2, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 221-236, 2021, DOI:10.32604/csse.2021.016510 - 20 July 2021

    Abstract Software crowdsourcing (SW CS) is an evolving software development paradigm, in which crowds of people are asked to solve various problems through an open call (with the encouragement of prizes for the top solutions). Because of its dynamic nature, SW CS has been progressively accepted and adopted in the software industry. However, issues pertinent to the understanding of requirements among crowds of people and requirements engineers are yet to be clarified and explained. If the requirements are not clear to the development team, it has a significant effect on the quality of the software product.… More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610 - 22 March 2021

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process… More >

  • Open Access

    REVIEW

    Economical Requirements Elicitation Techniques During COVID-19: A Systematic Literature Review

    Tauqeer ul Amin1,*, Basit Shahzad1, Fazal-e-Amin2, Muhammad Shoaib2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2665-2680, 2021, DOI:10.32604/cmc.2021.013263 - 05 February 2021

    Abstract Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements. This phase is cost- and time-intensive, and a project may fail if there are excessive costs and schedule overruns. COVID-19 has affected the software industry by reducing interactions between developers and customers. Such a lack of interaction is a key reason for the failure of software projects. Projects can also fail when customers do not know precisely what they want. Furthermore, selecting the unsuitable elicitation technique can also cause project failure.… More >

Displaying 1-10 on page 1 of 7. Per Page