Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (293)
  • Open Access

    ARTICLE

    BArcherFuzzer: An Android System Services Fuzzier via Transaction Dependencies of BpBinder

    Jiawei Qin1,2, Hua Zhang1,*, Hanbing Yan2, Tian Zhu2, Song Hu1, Dingyu Yan2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 527-544, 2024, DOI:10.32604/iasc.2024.047509

    Abstract By the analysis of vulnerabilities of Android native system services, we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server. The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage. In this paper, we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy. Based on the above method, More >

  • Open Access

    REVIEW

    Ecosystem Services of Grazed Grasslands in the Flooding Pampa

    Elizabeth J. Jacobo1,#,*, Adriana M. Rodríguez2,#

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1179-1202, 2024, DOI:10.32604/phyton.2024.050928

    Abstract The Flooding Pampa grasslands are the last remnant of the Rio de la Plata grasslands in Argentina. Anthropogenic interventions have led to severe degradation and, as a result, the ecosystem services provided by the grasslands are declining, in terms of provisioning, regulating, and supporting services. We synthesized the existing literature on the ecosystem goods and services provided by these grasslands under grazing in different conditions and conservation status. We found that plant and animal diversity and primary production are the most studied ecosystem services, while climate regulation, water supply, nutrient cycling, meat production and erosion… More >

  • Open Access

    ARTICLE

    Multiscale Simulation of Microstructure Evolution during Preparation and Service Processes of Physical Vapor Deposited c-TiAlN Coatings

    Yehao Long, Jing Zhong*, Tongdi Zhang, Li Chen, Lijun Zhang*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3435-3453, 2024, DOI:10.32604/cmc.2024.051629

    Abstract Physical Vapor Deposited (PVD) TiAlN coatings are extensively utilized as protective layers for cutting tools, renowned for their excellent comprehensive performance. To optimize quality control of TiAlN coatings for cutting tools, a multi-scale simulation approach is proposed that encompasses the microstructure evolution of coatings considering the entire preparation and service lifecycle of PVD TiAlN coatings. This scheme employs phase-field simulation to capture the essential microstructure of the PVD-prepared TiAlN coatings. Moreover, cutting simulation is used to determine the service temperature experienced during cutting processes at varying rates. Cahn-Hilliard modeling is finally utilized to consume the More >

  • Open Access

    ARTICLE

    Adaptive Cloud Intrusion Detection System Based on Pruned Exact Linear Time Technique

    Widad Elbakri1, Maheyzah Md. Siraj1,*, Bander Ali Saleh Al-rimy1, Sultan Noman Qasem2, Tawfik Al-Hadhrami3

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3725-3756, 2024, DOI:10.32604/cmc.2024.048105

    Abstract Cloud computing environments, characterized by dynamic scaling, distributed architectures, and complex workloads, are increasingly targeted by malicious actors. These threats encompass unauthorized access, data breaches, denial-of-service attacks, and evolving malware variants. Traditional security solutions often struggle with the dynamic nature of cloud environments, highlighting the need for robust Adaptive Cloud Intrusion Detection Systems (CIDS). Existing adaptive CIDS solutions, while offering improved detection capabilities, often face limitations such as reliance on approximations for change point detection, hindering their precision in identifying anomalies. This can lead to missed attacks or an abundance of false alarms, impacting overall… More >

  • Open Access

    ARTICLE

    Failure to Rescue as a Quality Metric in Congenital Heart Surgeries in a High-Complexity Service Provider Institution Located in a Middle-Income Country

    Gustavo Cruz1,*, Santiago Pedroza2, Juan F. Vélez3, Jessica Largo2, Juan F. Tejada4, Jorge H. Mejía-Mantilla5

    Congenital Heart Disease, Vol.19, No.2, pp. 207-218, 2024, DOI:10.32604/chd.2024.044244

    Abstract Background: Failure to rescue has been an effective quality metric in congenital heart surgery. Conversely, morbidity and mortality depend greatly on non-modifiable individual factors and have a weak correlation with better-quality performance. We aim to measure the complications, mortality, and risk factors in pediatric patients undergoing congenital heart surgery in a high-complexity institution located in a middle-income country and compare it with other institutions that have conducted a similar study. Methods: A retrospective observational study was conducted in a high-complexity service provider institution, in Cali, Colombia. All pediatric patients undergoing any congenital heart surgery between… More >

  • Open Access

    ARTICLE

    Experience of Mental Health Professionals Collaborating with Peer Supporters in a Community Mental Health Service Team

    Sowon Lee1, Boyoung Kim1,*, Chung Kil Park2,*

    International Journal of Mental Health Promotion, Vol.26, No.4, pp. 251-260, 2024, DOI:10.32604/ijmhp.2024.048803

    Abstract This study explored how mental health professionals collaborate with peer supporters with mental disabilities in a community mental health institution. From January 19 to February 23, 2021, three 60 min interviews were conducted with six mental health professionals working at a Korean community center. The results were qualitatively analyzed and divided into four themes and eight categories. The four themes were the perceptions of and challenges in working with peer supporters with mental disabilities, conflict and confusion about working with peer supporters, forming partnerships with peer supporters, and policy support for peer supporters’ job security.… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Approach for Improvised QoE in Video Services over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3195-3213, 2024, DOI:10.32604/cmc.2023.046911

    Abstract Video streaming applications have grown considerably in recent years. As a result, this becomes one of the most significant contributors to global internet traffic. According to recent studies, the telecommunications industry loses millions of dollars due to poor video Quality of Experience (QoE) for users. Among the standard proposals for standardizing the quality of video streaming over internet service providers (ISPs) is the Mean Opinion Score (MOS). However, the accurate finding of QoE by MOS is subjective and laborious, and it varies depending on the user. A fully automated data analytics framework is required to… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open Access

    ARTICLE

    RESTlogic: Detecting Logic Vulnerabilities in Cloud REST APIs

    Ziqi Wang*, Weihan Tian, Baojiang Cui

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1797-1820, 2024, DOI:10.32604/cmc.2023.047051

    Abstract The API used to access cloud services typically follows the Representational State Transfer (REST) architecture style. RESTful architecture, as a commonly used Application Programming Interface (API) architecture paradigm, not only brings convenience to platforms and tenants, but also brings logical security challenges. Security issues such as quota bypass and privilege escalation are closely related to the design and implementation of API logic. Traditional code level testing methods are difficult to construct a testing model for API logic and test samples for in-depth testing of API logic, making it difficult to detect such logical vulnerabilities. We… More >

Displaying 1-10 on page 1 of 293. Per Page