Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (664)
  • Open Access

    ARTICLE

    Unified Computational Modelling for Healthcare Device Security Assessment

    Shakeel Ahmed*, Abdulaziz Alhumam

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 1-18, 2021, DOI:10.32604/csse.2021.015775

    Abstract This article evaluates the security techniques that are used to maintain the healthcare devices, and proposes a mathematical model to list these in the order of priority and preference. To accomplish the stated objective, the article uses the Fuzzy Analytic Network Process (ANP) integrated with Technical for Order Preference by Similarities to Ideal Solution (TOPSIS) to find the suitable alternatives of the security techniques for securing the healthcare devices from trespassing. The methodology is enlisted to rank the alternatives/ techniques based on their weights’ satisfaction degree. Thereafter, the ranks of the alternatives determine the order of priority for the techniques… More >

  • Open Access

    ARTICLE

    TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators

    Zhengqiu Weng1,2, Timing Chen1,*, Tiantian Zhu1, Hang Dong1, Dan Zhou1, Osama Alfarraj3

    Computer Systems Science and Engineering, Vol.37, No.1, pp. 105-119, 2021, DOI:10.32604/csse.2021.015074

    Abstract Internet traffic encryption is a very common traffic protection method. Most internet traffic is protected by the encryption protocol called transport layer security (TLS). Although traffic encryption can ensure the security of communication, it also enables malware to hide its information and avoid being detected. At present, most of the malicious traffic detection methods are aimed at the unencrypted ones. There are some problems in the detection of encrypted traffic, such as high false positive rate, difficulty in feature extraction, and insufficient practicability. The accuracy and effectiveness of existing methods need to be improved. In this paper, we present TLSmell,… More >

  • Open Access

    ARTICLE

    An Effective Memory Analysis for Malware Detection and Classification

    Rami Sihwail*, Khairuddin Omar, Khairul Akram Zainol Ariffin

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2301-2320, 2021, DOI:10.32604/cmc.2021.014510

    Abstract The study of malware behaviors, over the last years, has received tremendous attention from researchers for the purpose of reducing malware risks. Most of the investigating experiments are performed using either static analysis or behavior analysis. However, recent studies have shown that both analyses are vulnerable to modern malware files that use several techniques to avoid analysis and detection. Therefore, extracted features could be meaningless and a distraction for malware analysts. However, the volatile memory can expose useful information about malware behaviors and characteristics. In addition, memory analysis is capable of detecting unconventional malware, such as in-memory and fileless malware.… More >

  • Open Access

    ARTICLE

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223

    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings processing power closer to the… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Using FKNN and Improved PSO

    Raniyah Wazirali*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1429-1445, 2021, DOI:10.32604/cmc.2021.014172

    Abstract Intrusion detection system (IDS) techniques are used in cybersecurity to protect and safeguard sensitive assets. The increasing network security risks can be mitigated by implementing effective IDS methods as a defense mechanism. The proposed research presents an IDS model based on the methodology of the adaptive fuzzy k-nearest neighbor (FKNN) algorithm. Using this method, two parameters, i.e., the neighborhood size (k) and fuzzy strength parameter (m) were characterized by implementing the particle swarm optimization (PSO). In addition to being used for FKNN parametric optimization, PSO is also used for selecting the conditional feature subsets for detection. To proficiently regulate the… More >

  • Open Access

    ARTICLE

    High Security for De-Duplicated Big Data Using Optimal SIMON Cipher

    A. Muthumari1, J. Banumathi2, S. Rajasekaran3, P. Vijayakarthik4, K. Shankar5, Irina V. Pustokhina6, Denis A. Pustokhin7,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1863-1879, 2021, DOI:10.32604/cmc.2021.013614

    Abstract Cloud computing offers internet location-based affordable, scalable, and independent services. Cloud computing is a promising and a cost-effective approach that supports big data analytics and advanced applications in the event of forced business continuity events, for instance, pandemic situations. To handle massive information, clusters of servers are required to assist the equipment which enables streamlining the widespread quantity of data, with elevated velocity and modified configurations. Data deduplication model enables cloud users to efficiently manage their cloud storage space by getting rid of redundant data stored in the server. Data deduplication also saves network bandwidth. In this paper, a new… More >

  • Open Access

    ARTICLE

    Blockchain Technology Based Information Classification Management Service

    Gi-Wan Hong1, Jeong-Wook Kim1, Hangbae Chang2,*

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1489-1501, 2021, DOI:10.32604/cmc.2021.013344

    Abstract Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. In terms of information security, it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets. Also, it has caused difficulties in managing those issues due to reasons such as mutual interference, countless security events and logs’ data, etc. Within this security environment, an organization should identify and classify assets based on the value of data and their security perspective, and… More >

  • Open Access

    ARTICLE

    Healthcare Device Security: Insights and Implications

    Wajdi Alhakami1, Abdullah Baz2, Hosam Alhakami3, Masood Ahmad4, Raees Ahmad Khan4,*

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 409-424, 2021, DOI:10.32604/iasc.2021.015351

    Abstract Healthcare devices play an essential role in tracking and managing patient’s safety. However, the complexities of healthcare devices often remain ambiguous due to hardware, software, or the interoperable healthcare system problems. There are essentially two critical factors for targeting healthcare: First, healthcare data is the most valuable entity on the dark web; and the second, it is the easiest to hack. Data pilferage has become a major hazard for healthcare organizations as the hackers now demand ransom and threaten to disclose the sensitive data if not paid within the stipulated timeline. The present study enlists a thorough research on the… More >

  • Open Access

    ARTICLE

    Device Security Assessment of Internet of Healthcare Things

    Abdulaziz Attaallah1, Masood Ahmad2, Md Tarique Jamal Ansari2, Abhishek Kumar Pandey2, Rajeev Kumar2,3,*, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 593-603, 2021, DOI:10.32604/iasc.2021.015092

    Abstract Security of the Internet of Healthcare Things (IoHT) devices plays a vital role in e-healthcare today and there has been a rapid increase in the use of networked devices of IoHT in the present healthcare services. However, these networked devices are also highly vulnerable to attackers who constantly target the security of devices and their components to gain access to the patients’ data. Infringement of patients’ data is not only a violation of privacy but can also jeopardize patients’ health if the health records are tampered with. Once the device has been intruded upon, attackers can not only change the… More >

  • Open Access

    ARTICLE

    AUV Global Security Path Planning Based on a Potential Field Bio-Inspired Neural Network in Underwater Environment

    Xiang Cao1,2,*, Ling Chen1, Liqiang Guo3, Wei Han4

    Intelligent Automation & Soft Computing, Vol.27, No.2, pp. 391-407, 2021, DOI:10.32604/iasc.2021.01002

    Abstract As one of the classical problems in autonomous underwater vehicle (AUV) research, path planning has obtained a lot of research results. Many studies have focused on planning an optimal path for AUVs. These optimal paths are sometimes too close to obstacles. In the real environment, it is difficult for AUVs to avoid obstacles according to such an optimal path. To solve the safety problem of AUV path planning in a dynamic uncertain environment, an algorithm combining a bio-inspired neural network and potential field is proposed. Based on the environmental information, the bio-inspired neural network plans the optimal path for the… More >

Displaying 541-550 on page 55 of 664. Per Page