New direction of cryptography: A review on text-to-image encryption algorithms based on RGB color value

A Abusukhon, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Data encryption techniques are important for answering the question: How secure is the
Internet for sending sensitive data. Keeping data secure while they are sent through the …

Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map

J Zheng, LF Liu - IET image processing, 2020 - Wiley Online Library
The one‐dimensional (2D) chaotic encryption algorithm has good encryption performance.
For its properties, such as the excellent complexity, pseudo‐randomness, and sensitivity to …

Load balancing techniques in software-defined cloud computing: an overview

AAA AlKhatib, T Sawalha… - 2020 seventh international …, 2020 - ieeexplore.ieee.org
With the expansion of the network and increasing their users, as well as emerging new
technologies, such as cloud computing and big data, managing traditional networks is …

An efficient cold start solution for recommender systems based on machine learning and user interests

B Hawashin, S Alzubi, A Mughaid… - … on software defined …, 2020 - ieeexplore.ieee.org
Recommender Systems are used to provide suggestions to users based on their interests.
One of the well-known problems in recommender systems is the cold start problem, which …

A survey on symmetric and asymmetric key based image encryption

S Kumar, BK Singh, S Pundir, S Batra… - … conference on data …, 2020 - ieeexplore.ieee.org
Image Encryption is a technique where an algorithm along with a set of characters called
key encrypts the data into cipher text. The cipher text can be converted back into plaintext by …

Mimic encryption box for network multimedia data security

X Zhou, B Li, Y Qi, W Dong - Security and Communication …, 2020 - Wiley Online Library
With the rapid development of the Internet, the security of network multimedia data has
attracted increasingly more attention. The moving target defense (MTD) and cyber mimic …

Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology

F Shu, ST Chen, F Li, JY Zhang… - 2020 IEEE 5th …, 2020 - ieeexplore.ieee.org
Using artificial intelligence technology to help network security has become a major trend. At
present, major countries in the world have successively invested R & D force in the attack …

Maintenance requests labeling using machine learning classification

M Lafi, B Hawashin, S AlZu'bi - 2020 Seventh International …, 2020 - ieeexplore.ieee.org
Follow-up maintenance reports are important and tedious work. Bug repository is usually
used to store maintenance reports which could be: fault repair, Functionality addition or …

Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys

YB Prastyo, IWW Pradnyana… - … , Multimedia, Cyber and …, 2020 - ieeexplore.ieee.org
Data security is an issue that must be a concern in the current era of information technology.
Medical data in the form of medical digital images is also important data to protect its …