Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption

A Mehmood, A Shafique, SA Chaudhry… - Journal of Information …, 2023 - Elsevier
Due to the exponential rise of multimedia technologies, digital information privacy is now
more crucial than ever. The process of transmitting data across a channel such as the …

Chaos and cellular automata-based substitution box and its application in cryptography

A Shafique, KH Khan, MM Hazzazi, I Bahkali, Z Bassfar… - Mathematics, 2023 - mdpi.com
Substitution boxes are the key factor in symmetric-key cryptosystems that determines their
ability to resist various cryptanalytic attacks. Creating strong substitution boxes that have …

Memory visualization-based malware detection technique

SSH Shah, N Jamil, AUR Khan - Sensors, 2022 - mdpi.com
Advanced Persistent Threat is an attack campaign in which an intruder or team of intruders
establishes a long-term presence on a network to mine sensitive data, which becomes more …

Blockchain-based autonomous authentication and integrity for internet of battlefield things in c3i system

A Rashid, AUR Khan - IEEE Access, 2022 - ieeexplore.ieee.org
In the Internet of Battlefield Things (IoBT), users and sensor-equipped entities send multiple
messages to the Command Control Center (CCC) over the network. The authentication and …

Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos

AA Abdul-Kareem… - Journal of Electronic …, 2023 - spiedigitallibrary.org
Growing reliance on digital communications has necessitated development of dependable
and secure technologies to ensure that the transmission and reception of images over the …

Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT

H Nazari, MM Bidgoli, H Ghasvari - IET Image Processing, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) has grown rapidly over the past few years. The main
challenges for people who design and make these systems are to make them use less …

Performance optimization of hydroelectric power-plants using computational intelligence techniques

A Kumar, VS Maan, M Saini - International Journal of Information …, 2024 - Springer
Due to the increasing complexity of industrial systems, transportation systems etc. traditional
optimization techniques fail to provide a global solution of performance related issues. Most …