Cyber-physical systems security: A systematic review

H Harkat, LM Camarinha-Matos, J Goes… - Computers & Industrial …, 2024 - Elsevier
In recent years, cyber-physical systems (CPS) have been to many vital areas, including
medical devices, smart cars, industrial systems, energy grid, etc. As these systems …

A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing

O Can, F Thabit, AO Aljahdali, S Al-Homdy… - Cybernetics and …, 2023 - Taylor & Francis
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …

[HTML][HTML] A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions

F Thabit, S Alhomdy, S Jagtap - International Journal of Intelligent Networks, 2021 - Elsevier
With the rapid development of distributed system technologies, one of the biggest
challenges facing the digital world is ensuring the security of sensitive and confidential data …

[HTML][HTML] Cancelable ECG biometric based on combination of deep transfer learning with DNA and amino acid approaches for human authentication

AS Sakr, P Pławiak, R Tadeusiewicz, M Hammad - Information Sciences, 2022 - Elsevier
Recently, electrocardiogram (ECG) signals have received a high level of attention as a
physiological signal in the field of biometrics. It has presented great possibilities for its …

A novel cryptosystem based on DNA cryptography, hyperchaotic systems and a randomly generated Moore machine for cyber physical systems

P Pavithran, S Mathew, S Namasudra… - Computer …, 2022 - Elsevier
Nowadays, a large amount of data is transmitted over the Internet and in Cyber–Physical
Systems (CPS). A significant portion of this data is highly confidential. Bank account details …

Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms

F Thabit, O Can, RUZ Wani, MA Qasem… - Concurrency and …, 2023 - Wiley Online Library
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …

A secured cryptographic system based on DNA and a hybrid key generation approach

MI Reddy, APS Kumar, KS Reddy - Biosystems, 2020 - Elsevier
Cryptography is a method for preventing illegitimate access to information and data. In this
paper, a bio-inspired cryptographic DNA system has been proposed. The proposed method …

[HTML][HTML] A symmetric DNA encryption process with a biotechnical hardware

E Şatir, O Kendirli - Journal of King Saud University-Science, 2022 - Elsevier
The growing rate of internet/network technologies day by day dramatically increases the
formation of data in the world. As the flow of information increases on the network, time …

A novel DNA-inspired encryption strategy for concealing cloud storage

A Majumdar, A Biswas, A Majumder, SK Sood… - Frontiers of Computer …, 2021 - Springer
Over the last few years, the need of a cloud environment with the ability to detect illegal
behaviours along with a secured data storage capability has increased largely. This study …

Quantum image encryption based on quantum DNA codec and pixel-level scrambling

J Gao, Y Wang, Z Song, S Wang - Entropy, 2023 - mdpi.com
In order to increase the security and robustness of quantum images, this study combined the
quantum DNA codec with quantum Hilbert scrambling to offer an enhanced quantum image …