Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches

A Mughaid, S AlZu'bi, A Alnajjar, E AbuElsoud… - Multimedia Tools and …, 2023 - Springer
Abstract Non Orthogonal Multiple Access (NOMA) successfully drew attention to the
deployment of 5th Generation (5G) wireless communication systems, and it is now …

A novel machine learning and face recognition technique for fake accounts detection system on cyber social networks

A Mughaid, I Obeidat, S AlZu'bi, EA Elsoud… - Multimedia Tools and …, 2023 - Springer
Abstract Online Social Networks (OSN) such as Facebook, Instagram, Twitter, and others
have seen rapid growth in recent years. Such applications provide attractive online social …

Examining Digital Forensic Evidence for Android Applications

MR Al-Mousa, Q Al-Zaqebah… - … Arab Conference on …, 2022 - ieeexplore.ieee.org
The examination of digital forensic evidence is a science highlighting the main areas of
progress in forensic science. Various social media sites (SNS) providing e-mail services …

Secure transmission of noisy images over fiber optic communication

S AlZu'Bi, SA Abushanap, I AlTalahin… - … on Internet of Things …, 2022 - ieeexplore.ieee.org
Optical fiber has become the medium of choice for reliable high speed and high capacity
data transfer. Signal to Noise Ratio (SNR) and Bit Error Rate (BER) are two important …

Security Challenges Review in Agile and DevOps Practices

S Afaneh, MR Al-Mousa, HS Al-hamid… - 2023 International …, 2023 - ieeexplore.ieee.org
Agile and DevOps methodologies are becoming increasingly popular in software
development, as they offer many benefits to software development teams and the …

GS3: A lightweight method of Generating data blocks with Shuffling, Scrambling, and Substituting data for constrained IoT devices

F Alcaraz-Velasco, JM Palomares… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The enabling devices and sensors of the Internet of Things (IoT) are characterized by
devices with limited resources, where the computation and the energy consumption should …

A novel high capacity reversible data hiding through encryption scheme by permuting encryption key and entropy analysis

H Dhane, P Agarwal… - 2022 4th International …, 2022 - ieeexplore.ieee.org
A Reversible data hiding through encryption (RDTE) scheme will consider an original image
and a sequence of bits as the input and generate an encrypted image as the output. This …

Efficient Braille Transformation for Secure Password Hashing

H Touil, N El Akkad, K Satori, NF Soliman… - IEEE …, 2024 - ieeexplore.ieee.org
In this work, we propose a novel approach to enhancing the security of passwords before
storing them in databases. Our method utilizes Braille transformation to encrypt the …

A high‐speed and low‐latency hardware implementation of RC4 cryptographic algorithm

C Sun, W Liu, J Cheng, N Sun, Z Peng… - … Journal of Circuit …, 2023 - Wiley Online Library
In this letter, a high‐speed and low‐latency Ron Rivest‐4 (RC4) encryption algorithm is
designed based on SMIC 14 nm process. Since the key issue of limiting the throughput of …

An authentication model based on cryptography

I Obeidat, AAL Arjan, RAL Amrat, RAL Ajmi - arXiv preprint arXiv …, 2021 - arxiv.org
In this paper we proposed an authentication technique based on the user cards, to improve
the authentication process in systems that allows remote access for the users, and raise the …