Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (68)
  • Open Access

    ARTICLE

    Security Analysis in Smart Agriculture: Insights from a Cyber-Physical System Application

    Ahmed Redha Mahlous*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4781-4803, 2024, DOI:10.32604/cmc.2024.050821

    Abstract Smart agriculture modifies traditional farming practices, and offers innovative approaches to boost production and sustainability by leveraging contemporary technologies. In today’s world where technology is everything, these technologies are utilized to streamline regular tasks and procedures in agriculture, one of the largest and most significant industries in every nation. This research paper stands out from existing literature on smart agriculture security by providing a comprehensive analysis and examination of security issues within smart agriculture systems. Divided into three main sections—security analysis, system architecture and design and risk assessment of Cyber-Physical Systems (CPS) applications—the study delves… More >

  • Open Access

    ARTICLE

    Enabling Efficient Data Transmission in Wireless Sensor Networks-Based IoT Applications

    Ibraheem Al-Hejri1, Farag Azzedin1,*, Sultan Almuhammadi1, Naeem Firdous Syed2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 4197-4218, 2024, DOI:10.32604/cmc.2024.047117

    Abstract The use of the Internet of Things (IoT) is expanding at an unprecedented scale in many critical applications due to the ability to interconnect and utilize a plethora of wide range of devices. In critical infrastructure domains like oil and gas supply, intelligent transportation, power grids, and autonomous agriculture, it is essential to guarantee the confidentiality, integrity, and authenticity of data collected and exchanged. However, the limited resources coupled with the heterogeneity of IoT devices make it inefficient or sometimes infeasible to achieve secure data transmission using traditional cryptographic techniques. Consequently, designing a lightweight secure More >

  • Open Access

    REVIEW

    A Review of Hybrid Cyber Threats Modelling and Detection Using Artificial Intelligence in IIoT

    Yifan Liu1, Shancang Li1,*, Xinheng Wang2, Li Xu3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1233-1261, 2024, DOI:10.32604/cmes.2024.046473

    Abstract The Industrial Internet of Things (IIoT) has brought numerous benefits, such as improved efficiency, smart analytics, and increased automation. However, it also exposes connected devices, users, applications, and data generated to cyber security threats that need to be addressed. This work investigates hybrid cyber threats (HCTs), which are now working on an entirely new level with the increasingly adopted IIoT. This work focuses on emerging methods to model, detect, and defend against hybrid cyber attacks using machine learning (ML) techniques. Specifically, a novel ML-based HCT modelling and analysis framework was proposed, in which regularisation and Random Forest were More >

  • Open Access

    ARTICLE

    Robust Malicious Executable Detection Using Host-Based Machine Learning Classifier

    Khaled Soliman1,*, Mohamed Sobh2, Ayman M. Bahaa-Eldin2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1419-1439, 2024, DOI:10.32604/cmc.2024.048883

    Abstract The continuous development of cyberattacks is threatening digital transformation endeavors worldwide and leads to wide losses for various organizations. These dangers have proven that signature-based approaches are insufficient to prevent emerging and polymorphic attacks. Therefore, this paper is proposing a Robust Malicious Executable Detection (RMED) using Host-based Machine Learning Classifier to discover malicious Portable Executable (PE) files in hosts using Windows operating systems through collecting PE headers and applying machine learning mechanisms to detect unknown infected files. The authors have collected a novel reliable dataset containing 116,031 benign files and 179,071 malware samples from diverse… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the… More >

  • Open Access

    ARTICLE

    DeepSVDNet: A Deep Learning-Based Approach for Detecting and Classifying Vision-Threatening Diabetic Retinopathy in Retinal Fundus Images

    Anas Bilal1, Azhar Imran2, Talha Imtiaz Baig3,4, Xiaowen Liu1,*, Haixia Long1, Abdulkareem Alzahrani5, Muhammad Shafiq6

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 511-528, 2024, DOI:10.32604/csse.2023.039672

    Abstract Artificial Intelligence (AI) is being increasingly used for diagnosing Vision-Threatening Diabetic Retinopathy (VTDR), which is a leading cause of visual impairment and blindness worldwide. However, previous automated VTDR detection methods have mainly relied on manual feature extraction and classification, leading to errors. This paper proposes a novel VTDR detection and classification model that combines different models through majority voting. Our proposed methodology involves preprocessing, data augmentation, feature extraction, and classification stages. We use a hybrid convolutional neural network-singular value decomposition (CNN-SVD) model for feature extraction and selection and an improved SVM-RBF with a Decision Tree More >

  • Open Access

    ARTICLE

    NFT Security Matrix: Towards Modeling NFT Ecosystem Threat

    Peng Liao1, Chaoge Liu2, Jie Yin1,3,*, Zhi Wang2, Xiang Cui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3255-3285, 2024, DOI:10.32604/cmes.2024.043855

    Abstract Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens (NFTs). To be specific, the total trading volume of digital assets reached an astounding $55.5 billion in 2022. Nevertheless, numerous security concerns have been raised by the rapid expansion of the NFT ecosystem. NFT holders are exposed to a plethora of scams and traps, putting their digital assets at risk of being lost. However, academic research on NFT security is scarce, and the security issues have aroused rare attention. In this study, the NFT ecological process is comprehensively explored. This… More >

  • Open Access

    ARTICLE

    Self-Compassion Moderates the Effect of Contingent Self-Esteem on Well-Being: Evidence from Cross-Sectional Survey and Experiment

    Ruirui Zhang1, Xuguang Zhang2, Minxin Yang3, Haoran Zhang4,5,*

    International Journal of Mental Health Promotion, Vol.26, No.2, pp. 117-126, 2024, DOI:10.32604/ijmhp.2023.045819

    Abstract Contingent self-esteem captures the fragile nature of self-esteem and is often regarded as suboptimal to psychological functioning. Self-compassion is another important self-related concept assumed to promote mental health and well-being. However, research on the relation of self-compassion to contingent self-esteem is lacking. Two studies were conducted to explore the role of self-compassion, either as a personal characteristic or an induced mindset, in influencing the effects of contingent self-esteem on well-being. Study 1 recruited 256 Chinese college students (30.4% male, mean age = 21.72 years) who filled out measures of contingent self-esteem, self-compassion, and well-being. The… More >

  • Open Access

    REVIEW

    A Comprehensive Survey for Privacy-Preserving Biometrics: Recent Approaches, Challenges, and Future Directions

    Shahriar Md Arman1, Tao Yang1,*, Shahadat Shahed2, Alanoud Al Mazroa3, Afraa Attiah4, Linda Mohaisen4

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2087-2110, 2024, DOI:10.32604/cmc.2024.047870

    Abstract The rapid growth of smart technologies and services has intensified the challenges surrounding identity authentication techniques. Biometric credentials are increasingly being used for verification due to their advantages over traditional methods, making it crucial to safeguard the privacy of people’s biometric data in various scenarios. This paper offers an in-depth exploration for privacy-preserving techniques and potential threats to biometric systems. It proposes a noble and thorough taxonomy survey for privacy-preserving techniques, as well as a systematic framework for categorizing the field’s existing literature. We review the state-of-the-art methods and address their advantages and limitations in More >

  • Open Access

    ARTICLE

    Detecting APT-Exploited Processes through Semantic Fusion and Interaction Prediction

    Bin Luo1,2,3, Liangguo Chen1,2,3, Shuhua Ruan1,2,3,*, Yonggang Luo2,3,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1731-1754, 2024, DOI:10.32604/cmc.2023.045739

    Abstract Considering the stealthiness and persistence of Advanced Persistent Threats (APTs), system audit logs are leveraged in recent studies to construct system entity interaction provenance graphs to unveil threats in a host. Rule-based provenance graph APT detection approaches require elaborate rules and cannot detect unknown attacks, and existing learning-based approaches are limited by the lack of available APT attack samples or generally only perform graph-level anomaly detection, which requires lots of manual efforts to locate attack entities. This paper proposes an APT-exploited process detection approach called ThreatSniffer, which constructs the benign provenance graph from attack-free audit… More >

Displaying 1-10 on page 1 of 68. Per Page