Novel intelligent architecture and approximate solution for future networks

A Sarhan, M Jemmali - Plos one, 2023 - journals.plos.org
Private networks have become popular for secure data sharing and anonymous
communication in many domains: enterprise environments, military, journalism …

A novel two-routers model based on category constraints secure data-dissemination-aware scheduling in next-generation communication networks

M Jemmali, A Ben Hmida, AY Sarhan - Journal of Network and Systems …, 2023 - Springer
Data breaches are a critical issue and have become one of the top widespread risks in
today's data-driven digital environment. Hence, Secure data outsourcing is essential in …

A novel smart multilevel security approach for secure data outsourcing in crisis

AY Sarhan - PeerJ Computer Science, 2023 - peerj.com
Abstract The Interconnected Network or the Internet has revolutionized digital
communications. It has expanded worldwide over the past four decades due to numerous …

An enhanced multilevel secure data dissemination approximate solution for future networks

MM Otoom, M Jemmali, AY Sarhan, I Achour… - Plos one, 2024 - journals.plos.org
Sensitive data, such as financial, personal, or classified governmental information, must be
protected throughout its cycle. This paper studies the problem of safeguarding transmitted …

Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment

J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng… - … –ESORICS 2020: 25th …, 2020 - Springer
Abstract Transport Layer Security Inspection (TLSI) enables enterprises to decrypt, inspect
and then re-encrypt users' traffic before it is routed to the destination. This breaks the end-to …

Privacy-preserving deep packet filtering over encrypted traffic in software-defined networks

YH Lin, SH Shen, MH Yang, DN Yang… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
Deep packet filtering (DPF) has been demonstrated as an essential technique for effective
fine-grained access controls, but it is commonly recognized that the technique may invade …

Time-slots transmission data algorithms into network

M Jemmali, H Alquhayz - 2020 international conference on …, 2020 - ieeexplore.ieee.org
In a critical constraint the network traffic must be more controlled than a normal situation. The
paper considers a router dispatching problem in case of bespoke communication and …

Using Artificial Intelligence (AI) and Internet of Things (IoT) for Improving Network Security by Hybrid Cryptography Approach

MS Sumathi, V Jain, GK Kumar, ZZ Khan - 2023 - catalog.lib.kyushu-u.ac.jp
Cryptography is defined as the analysis of encryption or secretive writing of information with
the use of mathematical & logical concepts in order to prevent data from being …

Risk-based packet routing for privacy and compliance-preserving SDN

KK Budhraja, A Malvankar, M Bahrami… - 2017 IEEE 10th …, 2017 - ieeexplore.ieee.org
Software Defined Networking (SDN) is increasingly being used in data centers as well as
enterprise networks. In an environment that has strict compliance requirements, such as …

Lightweight Privacy‐Preserving Data Sharing Scheme for Internet of Medical Things

Z Zhao, C Hsu, L Harn, Q Yang… - … and Mobile Computing, 2021 - Wiley Online Library
Internet of Medical Things (IoMT) is a kind of Internet of Things (IoT) that includes patients
and medical sensors. Patients can share real‐time medical data collected in IoMT with …