Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks

SW Zahra, M Nadeem, A Arshad, S Riaz, W Ahmed… - Symmetry, 2024 - mdpi.com
Researchers have created cryptography algorithms that encrypt data using a public or
private key to secure it from intruders. It is insufficient to protect the data by using such a key …

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

M Nadeem, A Arshad, S Riaz, SW Zahra, AK Dutta… - Applied Sciences, 2022 - mdpi.com
The ratio at which the number of users is increasing in cloud computing, the same as the
number of data destruction, has doubled. Various algorithms have been designed to secure …

Advanced set containment deep learned Rabin certificateless signcryption for secured transmission with big data in cloud

G Sakthivel, P Madhubala - Concurrency and Computation …, 2024 - Wiley Online Library
Cloud computing is distributed type of technology to offers distant services by the internet to
manage, access, and store data on their server. The cloud server manages and distributes …

Nussbaum gain adaptive control for full‐state constrained cyber‐physical system under network attacks and actuator failures

B Miao, S Li, L Liu - … Journal of Robust and Nonlinear Control, 2024 - Wiley Online Library
In this article, an adaptive security control scheme is proposed for a class of nonlinear time‐
varying full‐state constrained cyber‐physical system with false data injection attacks and …

[PDF][PDF] Adaptive fuzzy fixed time formation control of state constrained nonlinear multi-agent systems against FDI attacks

J Du, L Liu - Mathematical Biosciences and Engineering, 2024 - aimspress.com
In this manuscript, based on nonlinear multi-agent systems (MASs) with full state constraints
and considering security control problem under false data injection (FDI) attacks, the fixed …