Journals / CMC / Vol.,
Table of Content

Research Article

BEST PAPER 2021

Advanced IoT Industrial Solutions and Cyber Security Threats in Communication Networks


Submission Deadline: 29 August 2021 (closed)

Abstract

This article has no abstract.

Keywords

IoT networks, Wireless Sensor Network, Smart Systems, Mobile and Wireless Communication, Big data, Machine Learning, Computational intelligence, Intelligent Data Processing, Control Systems and Robotics, Cloud Computing, Security and Networks
  • Research Article

    BEST PAPER 2021

    DNNBoT: Deep Neural Network-Based Botnet Detection and Classification

    Mohd Anul Haq, Mohd Abdul Rahim Khan* CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1729-1750, 2022, DOI:10.32604/cmc.2022.020938
    Abstract The evolution and expansion of IoT devices reduced human efforts, increased resource utilization, and saved time; however, IoT devices create significant challenges such as lack of security and privacy, making them more vulnerable to IoT-based botnet attacks. There is a need to develop efficient and faster models which can work in real-time with efficiency and stability. The present investigation developed two novels, Deep Neural Network (DNN) models, DNNBoT1 and DNNBoT2, to detect and classify well-known IoT botnet attacks such as Mirai and BASHLITE from nine compromised industrial-grade IoT devices. The utilization of PCA was made to feature extraction and improve… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Machine Learning Approaches to Detect DoS and Their Effect on WSNs Lifetime

    Raniyah Wazirali1, Rami Ahmad2,* CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4922-4946, 2022, DOI:10.32604/cmc.2022.020044
    Abstract Energy and security remain the main two challenges in Wireless Sensor Networks (WSNs). Therefore, protecting these WSN networks from Denial of Service (DoS) and Distributed DoS (DDoS) is one of the WSN networks security tasks. Traditional packet deep scan systems that rely on open field inspection in transport layer security packets and the open field encryption trend are making machine learning-based systems the only viable choice for these types of attacks. This paper contributes to the evaluation of the use machine learning algorithms in WSN nodes traffic and their effect on WSN network life time. We examined the performance metrics… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    A Secure Intrusion Detection System in Cyberphysical Systems Using a Parameter-Tuned Deep-Stacked Autoencoder

    Nojood O. Aljehane* CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 3915-3929, 2021, DOI:10.32604/cmc.2021.017905
    Abstract Cyber physical systems (CPSs) are a networked system of cyber (computation, communication) and physical (sensors, actuators) elements that interact in a feedback loop with the assistance of human interference. Generally, CPSs authorize critical infrastructures and are considered to be important in the daily lives of humans because they form the basis of future smart devices. Increased utilization of CPSs, however, poses many threats, which may be of major significance for users. Such security issues in CPSs represent a global issue; therefore, developing a robust, secure, and effective CPS is currently a hot research topic. To resolve this issue, an intrusion… More >

    Graphic Abstract

  • Research Article

    BEST PAPER 2021

    Steganography-Based Transmission of Medical Images Over Unsecure Network for Telemedicine Applications

    Romany F. Mansour1,*, Moheb R. Girgis2 CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 4069-4085, 2021, DOI:10.32604/cmc.2021.017064
    Abstract Steganography is one of the best techniques to hide secret data. Several steganography methods are available that use an image as a cover object, which is called image steganography. In image steganography, the major features are the cover object quality and hiding data capacity. Due to poor image quality, attackers could easily hack the secret data. Therefore, the hidden data quantity should be improved, while keeping stego-image quality high. The main aim of this study is combining several steganography techniques, for secure transmission of data without leakage and unauthorized access. In this paper, a technique, which combines various steganography-based techniques,… More >

    Graphic Abstract

Share Link

WeChat scan