SECURING

作品数:98被引量:62H指数:4
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:文伯屏周楠更多>>
相关机构:湖南大学中国社会科学院悉尼大学西安电子科技大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金重庆市自然科学基金广东省自然科学基金河北省自然科学基金更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=Computer Systems Science & Engineeringx
条 记 录,以下是1-9
视图:
排序:
CeTrivium:A Stream Cipher Based on Cellular Automata for Securing Real-Time Multimedia Transmission
《Computer Systems Science & Engineering》2023年第12期2895-2920,共26页Osama S.Younes Abdulmohsen Alharbi Ali Yasseen Faisal Alshareef Faisal Albalawi Umar A.Albalawi 
Due to their significant correlation and redundancy,conventional block cipher cryptosystems are not efficient in encryptingmultimedia data.Streamciphers based onCellularAutomata(CA)can provide amore effective solution...
关键词:Stream ciphers cellular automata securing real-time streaming CRYPTOGRAPHY CeTrivium 
Securing Healthcare Data in IoMT Network Using Enhanced Chaos Based Substitution and Diffusion
《Computer Systems Science & Engineering》2023年第11期2361-2380,共20页Musheer Ahmad Reem Ibrahim Alkanhel Naglaa FSoliman Abeer D.Algarni Fathi E.Abd El-Samie Walid El-Shafai 
funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University,through the Research Funding Program,Grant No.(FRP-1443-11).
Patient privacy and data protection have been crucial concerns in Ehealthcare systems for many years.In modern-day applications,patient data usually holds clinical imagery,records,and other medical details.Lately,the ...
关键词:Secure communication healthcare data encryption Internet of Medical Things(IoMT) discrete chaotic map substitution box(S-box) 
Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi
《Computer Systems Science & Engineering》2023年第11期1967-1986,共20页Doaa Sami Khafaga Sarah M.Alhammad Amal Magdi Osama ElKomy Nabil ALashin Khalid M.Hosny 
funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number (PNURSP2023R442)。
Image authentication techniques have recently received a lot of attention for protecting images against unauthorized access.Due to the wide use of the Internet nowadays,the need to ensure data integrity and authentica...
关键词:Zero watermarking Raspberry Pi advanced encryption standard 
Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System
《Computer Systems Science & Engineering》2023年第10期453-469,共17页Turke Althobaiti Yousef Sanjalawe Naeem Ramzan 
The authors gratefully acknowledge the approval and the support of this research study by grant no.SCIA-2022-11-1551 from the Deanship of Scientific Research at Northern Border University,Arar,K.S.A.
Flash Crowd attacks are a form of Distributed Denial of Service(DDoS)attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing(CC).Botnets are often...
关键词:Cloud computing CNN flash crowd attack intrusion detection system LightGBM White Shark Optimizer 
HybridWatermarking and Encryption Techniques for Securing Medical Images
《Computer Systems Science & Engineering》2023年第7期403-416,共14页Amel Ali Alhussan Hanaa A.Abdallah Sara Alsodairi Abdelhamied A.Ateya 
This work was supported by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R308);Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Waterma...
关键词:WATERMARKING discrete wavelet transform discrete cosine transform singular value decomposition circular encryption chaotic encryption 
Hybrid Smart Contracts for Securing IoMT Data
《Computer Systems Science & Engineering》2023年第1期457-469,共13页D.Palanikkumar Adel Fahad Alrasheedi P.Parthasarathi S.S.Askar Mohamed Abouhawwash 
Research Supporting Project number(RSP-2021/323);King Saud University,Riyadh,Saudi Arabia.
Data management becomes essential component of patient healthcare.Internet of Medical Things(IoMT)performs a wireless communication between E-medical applications and human being.Instead of consulting a doctor in the ...
关键词:PoW byzantine fault tolerance IoMT cloud computing health care data 
A Usability Management Framework for Securing Healthcare Information System
《Computer Systems Science & Engineering》2022年第9期1015-1030,共16页Hosam Alhakami Abdullah Baz Wajdi Alhakami Abhishek Kumar Pandey Alka Agrawal Raees Ahmad Khan 
supporting this work by Grant Code:(20UQU0066DSR);This project was supported by Taif University Researchers Supporting Project number(TURSP-2020/107),Taif University,Taif,Saudi Arabia.
Transformation from conventional business management systems tosmart digital systems is a recurrent trend in the current era. This has led to digitalrevolution, and in this context, the hardwired technologies in the s...
关键词:Smart healthcare healthcare industry USABILITY SECURITY 
Securing Privacy Using Optimization and Statistical Models in Cognitive Radio Networks
《Computer Systems Science & Engineering》2022年第8期523-533,共11页R.Neelaveni B.Sridevi J.Sivasankari 
Cognitive Radio Networks(CRN)are the possible and ideal solution for meeting the spectrum needs of next-generation communication systems.CRN is a promising alternative approach that allows spectrum sharing in many app...
关键词:ATTACKS secondary users cognitive radio networks SECURITY 
Impact of Tools and Techniques for Securing Consultancy Services被引量:1
《Computer Systems Science & Engineering》2021年第6期347-360,共14页Wael Alosaimi Abdullah Alharbi Hashem Alyami Masood Ahmad Abhishek Kumar Pandey Rajeev Kumar Raees Ahmad Khan 
Funding for this study was received from the Taif University Researchers Supporting Projects at Taif University,Kingdom of Saudi Arabia under Grant No.TURSP-2020/254.
In a digital world moving at a breakneck speed,consultancy services have emerged as one of the prominent resources for seeking effective,sustainable and economically viable solutions to a given crisis.The present day ...
关键词:Consultancy services fuzzy AHP fuzzy TOPSIS consultancy tools and techniques security evaluation 
检索报告 对象比较 聚类工具 使用帮助 返回顶部