Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis

    Dahyeon Kim1, Namgi Kim2, Junho Ahn2,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3867-3889, 2024, DOI:10.32604/cmc.2024.046871 - 26 March 2024

    Abstract This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities, generating applicable guidelines based on real-world software. The existing analysis of software security vulnerabilities often focuses on specific features or modules. This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software. The key novelty lies in overcoming the constraints of partial approaches. The proposed framework utilizes data from various sources to create a comprehensive functionality profile, facilitating the derivation of real-world security guidelines.… More >

  • Open Access

    ARTICLE

    A Novel Approach for Network Vulnerability Analysis in IIoT

    K. Sudhakar*, S. Senthilkumar

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 263-277, 2023, DOI:10.32604/csse.2023.029680 - 16 August 2022

    Abstract Industrial Internet of Things (IIoT) offers efficient communication among business partners and customers. With an enlargement of IoT tools connected through the internet, the ability of web traffic gets increased. Due to the raise in the size of network traffic, discovery of attacks in IIoT and malicious traffic in the early stages is a very demanding issues. A novel technique called Maximum Posterior Dichotomous Quadratic Discriminant Jaccardized Rocchio Emphasis Boost Classification (MPDQDJREBC) is introduced for accurate attack detection with minimum time consumption in IIoT. The proposed MPDQDJREBC technique includes feature selection and categorization. First, the… More >

  • Open Access

    Vulnerability Analysis of MEGA Encryption Mechanism

    Qingbing Ji1,2,*, Zhihong Rao1,2, Lvlin Ni2, Wei Zhao2, Jing Fu3

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 817-829, 2022, DOI:10.32604/cmc.2022.026949 - 18 May 2022

    Abstract MEGA is an end-to-end encrypted cloud storage platform controlled by users. Moreover, the communication between MEGA client and server is carried out under the protection of Transport Layer Security (TLS) encryption, it is difficult to intercept the key data packets in the process of MEGA registration, login, file data upload, and download. These characteristics of MEGA have brought great difficulties to its forensics. This paper presents a method to attack MEGA to provide an effective method for MEGA’s forensics. By debugging the open-source code of MEGA and analyzing the security white paper published, this paper More >

  • Open Access

    ARTICLE

    Seismic Vulnerability Analysis of Single-Story Reinforced Concrete Industrial Buildings with Seismic Fortification

    Jieping Liu1, Lingxin Zhang1,*, Haohao Zhang2, Tao Liu1

    Structural Durability & Health Monitoring, Vol.13, No.2, pp. 123-142, 2019, DOI:10.32604/sdhm.2019.04486

    Abstract As there is a lack of earthquake damage data for factory buildings with seismic fortifications in China, seismic vulnerability analysis was performed by numerical simulation in this paper. The earthquake-structure analysis model was developed with considering the influence of uncertainties of the ground motion and structural model parameters. The small-size sampling was conducted based on the Latin hypercube sampling and orthogonal design methods. Using nonlinear analysis, the seismic vulnerability curves and damage probability matrix with various seismic fortification intensities (SFI) were obtained. The seismic capacity of the factory building was then evaluated. The results showed… More >

Displaying 1-10 on page 1 of 4. Per Page