Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A comparative review of data encryption methods in the USA and Europe

A Atadoga, OA Farayola, BS Ayinla, OO Amoo… - Computer Science & IT …, 2024 - fepbl.com
Data encryption is a critical aspect of modern information security, and understanding the
approaches taken by different regions is vital for a comprehensive analysis. In the United …

Color image cryptosystem based on sine chaotic map, 4d chen hyperchaotic map of fractional-order and hybrid dna coding

W Alexan, M Gabr, E Mamdouh, R Elias… - IEEE …, 2023 - ieeexplore.ieee.org
With advancements in computer and communication technologies, the production, utilization
and applications of digital images is at an unprecedented rate. Recent applications include …

Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes

M Gabr, R Elias, K Hosny, GA Papakostas… - IEEE …, 2023 - ieeexplore.ieee.org
The fast-paced advancement in multimedia production and exchanges over unsecured
networks have led to a dire need to develop security applications. In this regard, chaos …

SIX-Trust for 6G: Towards a Secure and Trustworthy Future Network

Y Wang, X Kang, T Li, H Wang, C Cheng, Z Lei - IEEE Access, 2023 - ieeexplore.ieee.org
Recent years have witnessed a digital explosion in the deployment of 5G and the
proliferation of 5G-enabled innovations. Compared with 5G, 6G is envisioned to achieve a …

How do organizations seek cyber assurance? Investigations on the adoption of the common criteria and beyond

N Sun, CT Li, H Chan, MZ Islam, MR Islam… - Ieee …, 2022 - ieeexplore.ieee.org
Cyber assurance, which is the ability to operate under the onslaught of cyber attacks and
other unexpected events, is essential for organizations facing inundating security threats on …

[PDF][PDF] An efficient cyber security system based on flow-based anomaly detection using Artificial neural network

JJ Hephzipah, RR Vallem, MS Sheela… - … Journal of Cybersecurity, 2023 - iasj.net
Cyber security is developing factor for protecting internet resources by handing various
monitoring feature based support to improve the security. Increasing internet cries in the …

Capacity-Raising Reversible Data Hiding Using Empirical Plus–Minus One in Dual Images

CT Huang, CY Weng, NS Shongwe - Mathematics, 2023 - mdpi.com
Electronic records of a patient's health history are often shared among healthcare providers,
and patient data must be kept secure to maintain the privacy of patients. One way of doing …

Integrating human intelligence to bypass information asymmetry in procurement decision-making

PJ Caven, SR Gopavaram… - MILCOM 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
President Biden's Executive Order on Improving the Nation's Cybersecurity included two
core components to enhance the security and integrity of the software supply chain: Labels …

[PDF][PDF] Image Encryption Based on Base-n PRNGs Key Application and Parallel Base-n S-boxes

MK Gabr - 2023 - researchgate.net
The fast-paced advancement in multimedia production and exchange over unsecured
networks have lead to a dire need for the development of security applications. In this …