{"title":"FEMT-FL: A novel flexible energy management technique using federated learning for energy management in IoT-based distributed green computing systems","authors":"Jaikumar R , Arun Sekar Rajasekaran , M.V. Nageswara Rao , Anand Nayyar","doi":"10.1016/j.csi.2025.104017","DOIUrl":"10.1016/j.csi.2025.104017","url":null,"abstract":"<div><div>Green Computing systems bank on sustainable energy sources for service management and request processing. The Internet of Things (IoT) assimilates such computing systems for resource sharing and service distribution. For providing optimized energy balancing and effective utilization of available energy, this research paper proposes a novel flexible energy management technique using federated learning i.e., (FEMT-FT) for reliable energy management between the computing IoT nodes. The equivalent energy management process verifies the energy availability for request processing whereas the reliable energy part identifies the terminating interval to replace the communicating devices. For this purpose, the computing devices' draining and required energy levels are identified in all the request processing and service disseminating instances. The learning trains different energy balancing models that achieve a better service dissemination ratio. In this method, interval termination and new interval allocations are continuous to maximize service dissemination and novel request processing. For the varying requests, the proposed method achieves 8.92 %, 12.31 %, and 8.55 % high service dissemination, energy conservation, and request processing rate respectively.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104017"},"PeriodicalIF":4.1,"publicationDate":"2025-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143948945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meijuan Huang , Jingjie Gan , Bo Yang , Hongzhen Du , Yanqi Zhao
{"title":"Efficient public key authenticated searchable encryption scheme without bilinear pairings","authors":"Meijuan Huang , Jingjie Gan , Bo Yang , Hongzhen Du , Yanqi Zhao","doi":"10.1016/j.csi.2025.104016","DOIUrl":"10.1016/j.csi.2025.104016","url":null,"abstract":"<div><div>The issue of searching for data within ciphertext files in cloud storage is effectively resolved through public key encryption with keyword search (PEKS). The main security problem it has is the internal keyword guessing attack (IKGA), for which Huang et al. proposed a novel scheme, public key authenticated encryption with keyword search (PAEKS), which employs a combination of encryption and authentication to enhance the security of the scheme. Most PAEKS algorithms utilize bilinear pairings, which are inherently costly from a computational perspective and also offer only single-keyword ciphertext security guarantees. In light of the aforementioned considerations, this paper presents a PAEKS scheme that does not employ bilinear pairings. The scheme is demonstrated to satisfy the criteria of multi-ciphertext and multi-trapdoor security, based on the DDH assumption. Furthermore, the parallel search method is employed during the search phase with the objective of enhancing the overall efficiency of the search process. Ultimately, the experimental results demonstrate that the computational time of the proposed scheme is reduced by a factor of 7 to 28 compared to other schemes using bilinear pairings, and our scheme has higher search efficiency and is more suitable for practical applications.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104016"},"PeriodicalIF":4.1,"publicationDate":"2025-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143922938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zeynep İlkiliç Aytaç , İsmail İşeri , Beşir Dandil
{"title":"A hybrid coot based CNN model for thyroid cancer detection","authors":"Zeynep İlkiliç Aytaç , İsmail İşeri , Beşir Dandil","doi":"10.1016/j.csi.2025.104018","DOIUrl":"10.1016/j.csi.2025.104018","url":null,"abstract":"<div><div>Thyroid cancer is one of the most common endocrine malignancies, and early diagnosis is crucial for effective treatment. Fine-needle aspiration biopsy (FNAB) is widely used for diagnosis, but its accuracy depends on expert interpretation, which can be subjective. Recent advances in deep learning, particularly Convolutional Neural Networks (CNNs), have shown promise in automating and improving diagnostic accuracy from biopsy images. However, optimizing CNN architectures remains a challenge, as selecting the best layer parameters significantly impacts performance. Traditional approaches for selecting optimal CNN parameters often depend on exhaustive trial-and-error methods, which are computationally expensive and do not always yield globally optimal solutions. This process is both time-consuming and does not guarantee the precise attainment of an optimal CNN model. In this study, a novel approach is introduced to optimize CNN parameters by utilizing the COOT Metaheuristic Optimization Algorithm, proposing a new model named COOT-CNN for thyroid cancer detection. The COOT algorithm, formulated in 2021 and inspired by the behavioral optimization of waterfowl, is employed in this research to determine the optimal layers and parameters of the CNN model for thyroid cancer diagnosis. This method facilitates efficient optimization of layer parameters through a well-designed coding scheme. The model’s efficacy is assessed using thyroid fine needle aspiration biopsy data, categorized into two classes. Performance of the proposed approach is evaluated by comparing it with traditional CNN, Particle Swarm Optimization-based CNN model (PSO<img>CNN), and Gray Wolf Optimization-based CNN model (GWO<img>CNN). The proposed model was found to achieve higher accuracy compared to conventional CNN, PSO<img>CNN, and GWO<img>CNN models.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104018"},"PeriodicalIF":4.1,"publicationDate":"2025-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143922937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A contextual framework to standardise the communication of machine learning cyber security characteristics","authors":"Omar Alshaikh, Simon Parkinson, Saad Khan","doi":"10.1016/j.csi.2025.104015","DOIUrl":"10.1016/j.csi.2025.104015","url":null,"abstract":"<div><div>The widespread integration of machine learning (ML) across diverse application domains has substantially impacted business and personnel. Notably, ML applications in cybersecurity have gained increased prominence, reflecting a discernible trend towards adoption. However, the decisions surrounding ML adoption are susceptible to external influences, potentially resulting in misinterpreting ML capabilities. The communication used when for incorporating ML into cybersecurity applications lacks standardisation and is influenced by various factors such as personal experience, organisational reputation, and marketing strategies. Furthermore, the application of metrics to assess model performance is characterised by dependence, disarray, and subjectivity, introducing probabilities, uncertainties, and the potential for misinterpretation. The different metrics allow for variability in how capability is communicated, often dependent on the restrictive use case, leading to a lack of certainty in their interpretation. Previous research has highlighted the need for a standardised approach. Building upon our earlier work, this paper aims to authenticate beneficiaries' perception of Machine Learning Cybersecurity (MLCS) capabilities, before consulting with domain experts through a focus group to elucidate a prototype standard for comprehending MLCS capabilities, offering a pivotal roadmap and an initial framework for a comprehensive understanding and effective communication of MLCS capabilities in practical implementations.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104015"},"PeriodicalIF":4.1,"publicationDate":"2025-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143892341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human factors in phishing: Understanding susceptibility and resilience","authors":"Ufuk Oner, Orcun Cetin, Erkay Savas","doi":"10.1016/j.csi.2025.104014","DOIUrl":"10.1016/j.csi.2025.104014","url":null,"abstract":"<div><div>This study examines the demographic and organizational factors influencing phishing susceptibility and incident reporting behaviors among employees in a large European financial organization following realistic phishing simulations and how these factors correlate with susceptibility to phishing attacks. In the phishing simulations campaign with 8,102 participants, unannounced, monthly phishing emails with different templates are sent during regular work hours over a duration of 2 years, and the reactions (clicking the link and reporting the phishing email) are collected. The results are combined with demographic and relevant organizational data such as age, gender, level of education, department type, tenure, and job level. Multivariate logistic regression models are developed to analyze the relationship between these variables and phishing behaviors.</div><div>The analysis reveals significant differences in susceptibility to and resilience against phishing attacks across various demographic and organizational groups. Older employees are more susceptible to phishing, while males show lower vulnerability to phishing attacks. Additionally, our results revealed that higher-level employees often under report phishing emails. These findings highlight the necessity for targeted anti-phishing training tailored to different demographics and departments within the organization and the importance of fostering a culture of incident reporting. Recommendations include customized cyber awareness training programs, regular awareness sessions, and incentivizing reporting.</div><div>Future research is encouraged to prioritize investigating the root causes of phishing behaviors and evaluating the effectiveness of training programs.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104014"},"PeriodicalIF":4.1,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143874775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaboration with Generative AI to improve Requirements Change","authors":"Yuan Kong, Nan Zhang, Zhenhua Duan, Bin Yu","doi":"10.1016/j.csi.2025.104013","DOIUrl":"10.1016/j.csi.2025.104013","url":null,"abstract":"<div><div>Requirements Change (RC) is a critical aspect of the software development process, involving modifications throughout almost the entire software life cycle. Despite its significance, RC remains a highly challenging process due to the complexity of software systems and the inherent uncertainty associated with changes. While Large Language Models (LLMs) have demonstrated promising potential in various fields, particularly in Software Engineering (SE), there is limited research on LLMs for SE specifically addressing real software systems RC. To solve this, we propose an innovative approach, named Satisfy Requirements Change (SRC), which utilizes prompt engineering to improve the RC of actual software systems through human-machine collaboration. Specifically, ChatGPT is prompted to complete the entire RC process, encompassing system modeling, confirmation positioning, program modification, and property verification. Additionally, we conduct a RC application case on a real Java system and demonstrate through case study that our approach is effective in improving RC.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104013"},"PeriodicalIF":4.1,"publicationDate":"2025-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143899320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Harnessing generative AI for personalized E-commerce product descriptions: A framework and practical insights","authors":"Adam Wasilewski","doi":"10.1016/j.csi.2025.104012","DOIUrl":"10.1016/j.csi.2025.104012","url":null,"abstract":"<div><div>The role of electronic commerce (e-commerce) in the global economy has been steadily increasing, highlighting the benefits of business digitization for flexibility and resilience in response to environmental changes. Among emerging trends, the integration of artificial intelligence (AI) and machine learning is particularly notable, especially the application of large language models to personalize user interactions throughout the customer journey. A promising future direction is the use of generative AI to create customized e-commerce product descriptions for personalized, multivariant user interfaces. To validate this approach, a framework and metrics are proposed to assess the impact of segment-specific information on generated text. This led to the positioning of AI-generated content within a multivariant user interface architecture and the adaptation of a cosine similarity measure to evaluate text differentiation. The findings confirmed that the specific characteristics of e-commerce customer clusters enable generative AI to produce significantly distinct product descriptions. While differences were not statistically significant in 26.7% of cases, full differentiation was achieved for descriptions of sufficient length.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104012"},"PeriodicalIF":4.1,"publicationDate":"2025-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143848114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sadegh Bamohabbat Chafjiri, Phil Legg, Michail-Antisthenis Tsompanas, Jun Hong
{"title":"Leveraging activation and optimisation layers as dynamic strategies in the multi-task fuzzing scheme","authors":"Sadegh Bamohabbat Chafjiri, Phil Legg, Michail-Antisthenis Tsompanas, Jun Hong","doi":"10.1016/j.csi.2025.104011","DOIUrl":"10.1016/j.csi.2025.104011","url":null,"abstract":"<div><div>Fuzzing is a common technique for identifying vulnerabilities in software. Recent approaches, like She et al.’s Multi-Task Fuzzing (MTFuzz), use neural networks to improve fuzzing efficiency. However, key elements like network architecture and hyperparameter tuning are still not well-explored. Factors like activation layers, optimisation function design, and vanishing gradient strategies can significantly impact fuzzing results by improving test case selection. This paper delves into these aspects to improve neural network-driven fuzz testing.</div><div>We focus on three key neural network parameters to improve fuzz testing: the Leaky Rectified Linear Unit (LReLU) activation, Nesterov-accelerated Adaptive Moment Estimation (Nadam) optimisation, and sensitivity analysis. LReLU adds non-linearity, aiding feature extraction, while Nadam helps to improve weight updates by considering both current and future gradient directions. Sensitivity analysis optimises layer selection for gradient calculation, enhancing fuzzing efficiency.</div><div>Based on these insights, we propose LMTFuzz, a novel fuzzing scheme optimised for these Machine Learning (ML) strategies. We explore the individual and combined effects of LReLU, Nadam, and sensitivity analysis, as well as their hybrid configurations, across six different software targets. Experimental results demonstrate that LReLU, individually or when paired with sensitivity analysis, significantly enhances fuzz testing performance. However, when combined with Nadam, LReLU shows improvement on some targets, though less pronounced than its combination with sensitivity analysis. This combination improves accuracy, reduces loss, and increases edge coverage, with improvements of up to 23.8%. Furthermore, it leads to a significant increase in unique bug detection, with some targets detecting up to 2.66 times more bugs than baseline methods.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104011"},"PeriodicalIF":4.1,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143828761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Validation of inter-parameter dependencies in API gateways","authors":"Saman Barakat, Sergio Segura","doi":"10.1016/j.csi.2025.104010","DOIUrl":"10.1016/j.csi.2025.104010","url":null,"abstract":"<div><div>Web APIs usually include inter-parameter dependencies that constrain how input parameters can be combined to form valid calls to the services. API calls often violate these dependencies, resulting in unnecessary message exchanges, wasted time, and quota usage. Additionally, services may fail to adequately validate whether input requests meet these dependencies, causing critical failures or generating uninformative error messages. In this article, we propose extending API gateways to detect and explain inter-parameter dependency violations. We leverage the Inter-parameter Dependency Language (IDL) for specifying dependencies between input parameters in web APIs, and IDLReasoner, a constraint-based IDL analysis engine. We implemented our approach into a prototype tool, IDLFilter, on top of Spring Cloud Gateway. Evaluation results with 12 industrial API operations and about 30K automatically and manually generated API calls show that our approach effectively blocks invalid calls due to dependency violations, providing informative error messages and minimizing potential input validation failures. IDLFilter introduces a small 7% overhead when processing valid API calls, while reducing the response time of requests violating dependencies by 59%.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104010"},"PeriodicalIF":4.1,"publicationDate":"2025-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143848113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-preserving authentication protocol for user personal device security in Brain–Computer Interface","authors":"Sunil Prajapat , Aryan Rana , Pankaj Kumar , Ashok Kumar Das , Willy Susilo","doi":"10.1016/j.csi.2025.104009","DOIUrl":"10.1016/j.csi.2025.104009","url":null,"abstract":"<div><div>Brain–Computer Interface (BCI) technology has emerged as a transformative tool, particularly for individuals with severe motor disabilities. Non-invasive BCI systems, leveraging Electroencephalography (EEG), offer a direct interface between users and external devices, bypassing the need for muscular control. However, ensuring the security and privacy of users’ neural data remains a critical challenge. In this paper, we propose a novel privacy-preserving authentication scheme for EEG-based BCI systems, utilizing elliptic curve cryptography (ECC). Our scheme balances robust security with computational efficiency, making it suitable for resource-constrained environments. Since we are addressing security in a resource-constrained environment, such as EEG in BCI, we have constructed a lightweight authentication algorithm to meet the stringent requirements of minimal computational resources and energy consumption. The security analysis and performance evaluation of the authentication protocol show that our scheme is resistant to various attacks, such as replay, offline password guessing, privilege insider, user impersonation, and smart card stolen attacks. It offers mutual authentication and key agreement, requiring only 1632 bits of communication cost and 15.67139 ms of computational cost for the entire login authentication and key agreement phase. Our study lays a solid foundation for future investigation of innovative solutions for BCI security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104009"},"PeriodicalIF":4.1,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143816344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}