Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology

F Shu, ST Chen, F Li, JY Zhang… - 2020 IEEE 5th …, 2020 - ieeexplore.ieee.org
Using artificial intelligence technology to help network security has become a major trend. At
present, major countries in the world have successively invested R & D force in the attack …

Maintenance requests labeling using machine learning classification

M Lafi, B Hawashin, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Follow-up maintenance reports are important and tedious work. Bug repository is usually
used to store maintenance reports which could be: fault repair, Functionality addition or …

Wireless Sensor Network Security Based on Improved Identity Encryption

H Zhou, H Bi - Scientific Programming, 2022 - Wiley Online Library
In order to protect network information security and improve the security of wireless sensor
networks, based on chaotic systems, we propose a wireless sensor algorithm based on …

A review paper: Text-to-image cryptography in color coding

NS Noor, DA Hammood, A Al-Naji - AIP Conference Proceedings, 2023 - pubs.aip.org
Encryption techniques are important on the Internet. The challenges of color-coding are still
hot topics. Many papers were published to develop encryption algorithms to prevent security …

Fault tolerance and security management in IoMT

R Hireche, H Mansouri, ASK Pathan - Towards a Wireless Connected …, 2022 - Springer
In recent years, there has been a growing interest in collecting and storing healthcare data
which eventually led to a revolution in this field. In fact, the development of IoT-enabled …

[PDF][PDF] Word-based encryption algorithm using dictionary indexing with variable encryption key length

A Al-Jarrah, A Albsharat, M Al-Jarrah - International Journal of …, 2022 - academia.edu
This paper proposes a new algorithm for text encryption utilizing English words as a unit of
encoding. The algorithm vanishes any feature that could be used to reveal the encrypted text …

Improved monkey tool for random testing in mobile applications

MS Osman, HA Wasmi - 2019 IEEE Jordan International Joint …, 2019 - ieeexplore.ieee.org
The growth of developing mobile application increases the need for mobile application
testing to create free of errors application. Random testing such as monkey tool is frequently …

Image Encryption Algorithm Based on Combination Chaotic System and DNA Coding

P Mao, X Zhang, W Jiang - 2022 4th International Conference …, 2022 - ieeexplore.ieee.org
In order to increase the chaotic parameter range, improve the initial sensitivity of the chaotic
system and the security of the image encryption algorithm, This paper proposed a new …

Cryptanalysis of a Tightly-Secure Authenticated Key Exchange without NAXOS Approach Based on Decision Linear Problem

Z Mohammad, AAA Alkhatib, M Lafi… - 2021 International …, 2021 - ieeexplore.ieee.org
Authenticated key exchange protocols are a fundamental cryptography building block for
establishing a secret shared key among participating parties over an open network model …

Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure

FK Jabor, B Al-Attar, HAH Al Naffakh… - Full Length …, 2024 - americaspg.com
Cryptography is a well-known technology for providing confidential data transfer via
asymmetric or symmetric algorithms with public or private keys. Secure data transmission …