Journals / CMC / Vol.,
Table of Content

Research Article

BEST PAPER 2021

Machine Learning-based Secured and Privacy-preserved Smart City


Submission Deadline: 18 October 2020 (closed)

Abstract

This article has no abstract.

Keywords

Security, Privacy, Machine Learning, Deep Learning, Artificial Intelligence, Security Attacks, Smart City, Internet of Things, Blockchain, Trust. Defense Mechanisms.
  • Research Article

    BEST PAPER 2021

    Smart Dynamic Traffic Monitoring and Enforcement System

    Youssef El-Hansali1, Fatma Outay2,*, Ansar Yasar1, Siham Farrag1,3, Muhammad Shoaib4, Muhammad Imran4, Hammad Hussain Awan5 CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2797-2806, 2021, DOI:10.32604/cmc.2021.014812
    Abstract Enforcement of traffic rules and regulations involves a wide range of complex tasks, many of which demand the use of modern technologies. variable speed limits (VSL) control is to change the current speed limit according to the current traffic situation based on the observed traffic conditions. The aim of this study is to provide a simulation-based methodological framework to evaluate (VSL) as an effective Intelligent Transportation System (ITS) enforcement system. The focus of the study is on measuring the effectiveness of the dynamic traffic control strategy on traffic performance and safety considering various performance indicators such as total travel time,… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    M-IDM: A Multi-Classification Based Intrusion Detection Model in Healthcare IoT

    Jae Dong Lee1,2, Hyo Soung Cha1, Shailendra Rathore2, Jong Hyuk Park2,* CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1537-1553, 2021, DOI:10.32604/cmc.2021.014774
    Abstract In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Machine Learning-Enabled Power Scheduling in IoT-Based Smart Cities

    Nabeela Awan1, Salman Khan2, Mohammad Khalid Imam Rahmani3, Muhammad Tahir3, Nur Alam MD4,*, Ryan Alturki5, Ihsan Ullah6 CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2449-2462, 2021, DOI:10.32604/cmc.2021.014386
    Abstract Recent advancements in hardware and communication technologies have enabled worldwide interconnection using the internet of things (IoT). The IoT is the backbone of smart city applications such as smart grids and green energy management. In smart cities, the IoT devices are used for linking power, price, energy, and demand information for smart homes and home energy management (HEM) in the smart grids. In complex smart grid-connected systems, power scheduling and secure dispatch of information are the main research challenge. These challenges can be resolved through various machine learning techniques and data analytics. In this paper, we have proposed a particle… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    A Cyber Kill Chain Approach for Detecting Advanced Persistent Threats

    Yussuf Ahmed1,*, A.Taufiq Asyhari1, Md Arafatur Rahman2 CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2497-2513, 2021, DOI:10.32604/cmc.2021.014223
    Abstract The number of cybersecurity incidents is on the rise despite significant investment in security measures. The existing conventional security approaches have demonstrated limited success against some of the more complex cyber-attacks. This is primarily due to the sophistication of the attacks and the availability of powerful tools. Interconnected devices such as the Internet of Things (IoT) are also increasing attack exposures due to the increase in vulnerabilities. Over the last few years, we have seen a trend moving towards embracing edge technologies to harness the power of IoT devices and 5G networks. Edge technology brings processing power closer to the… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Security Requirement Management for Cloud-Assisted and Internet of Things—Enabled Smart City

    Muhammad Usman Tariq1, Muhammad Babar2, Mian Ahmad Jan3,4,5,*, Akmal Saeed Khattak6, Mohammad Dahman Alshehri7, Abid Yahya8 CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 625-639, 2021, DOI:10.32604/cmc.2021.014165
    Abstract The world is rapidly changing with the advance of information technology. The expansion of the Internet of Things (IoT) is a huge step in the development of the smart city. The IoT consists of connected devices that transfer information. The IoT architecture permits on-demand services to a public pool of resources. Cloud computing plays a vital role in developing IoT-enabled smart applications. The integration of cloud computing enhances the offering of distributed resources in the smart city. Improper management of security requirements of cloud-assisted IoT systems can bring about risks to availability, security, performance, confidentiality, and privacy. The key reason… More >

    Graphic Abstract

Share Link

WeChat scan