Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    ARTICLE

    Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning

    Shuangxing Deng, Man Li*, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2919-2939, 2023, DOI:10.32604/iasc.2023.039985 - 11 September 2023

    Abstract Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic… More >

  • Open Access

    ARTICLE

    An Immutable Framework for Smart Healthcare Using Blockchain Technology

    Faneela1, Muazzam A. Khan1, Suliman A. Alsuhibany2,*, Walid El-Shafai3,4, Mujeeb Ur Rehman5, Jawad Ahmad6

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 165-179, 2023, DOI:10.32604/csse.2023.035066 - 20 January 2023

    Abstract The advancements in sensing technologies, information processing, and communication schemes have revolutionized the healthcare sector. Electronic Healthcare Records (EHR) facilitate the patients, doctors, hospitals, and other stakeholders to maintain valuable data and medical records. The traditional EHRs are based on cloud-based architectures and are susceptible to multiple cyberattacks. A single attempt of a successful Denial of Service (DoS) attack can compromise the complete healthcare system. This article introduces a secure and immutable blockchain-based framework for the Internet of Medical Things (IoMT) to address the stated challenges. The proposed architecture is on the idea of a More >

  • Open Access

    ARTICLE

    Evaluating the Impacts of Security-Durability Characteristic: Data Science Perspective

    Abdullah Alharbi1, Masood Ahmad2, Wael Alosaimi1, Hashem Alyami3, Alka Agrawal2, Rajeev Kumar4,*, Abdul Wahid5, Raees Ahmad Khan2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 557-567, 2022, DOI:10.32604/csse.2022.020843 - 25 October 2021

    Abstract Security has always been a vital research topic since the birth of web application. A great deal of research has been conducted to determine the ways of identifying and classifying security issues or goals However, in the recent years, it has been noticed that high secure web applications have less durability; thus reducing their business continuity. High security features of a web application are worthless unless they provide effective services to the user and meet the standards of commercial viability. Hence, there is a need to bridge the gap between security and durability of the… More >

  • Open Access

    ARTICLE

    Cloud Security Service for Identifying Unauthorized User Behaviour

    D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2581-2600, 2022, DOI:10.32604/cmc.2022.020213 - 27 September 2021

    Abstract Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization More >

  • Open Access

    ARTICLE

    Design of an Information Security Service for Medical Artificial Intelligence

    Yanghoon Kim1, Jawon Kim2, Hangbae Chang3,*

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 679-694, 2022, DOI:10.32604/cmc.2022.015610 - 07 September 2021

    Abstract The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliable services focused on security internalization, it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment information in medical artificial More >

Displaying 1-10 on page 1 of 6. Per Page