Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Abeer Tariq MaoLood"'
Publikováno v:
Telecom, Vol 5, Iss 3, Pp 892-906 (2024)
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust
Externí odkaz:
https://doaj.org/article/9139270587cc4793be29e2c081d10dbc
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 11 (2024)
In this modern age of electronic interactions, more secure methods are required to protect vital information. Passwords are indeed a prominent and secure method, but they are subject to being forgotten, especially if they are long and complex. A more
Externí odkaz:
https://doaj.org/article/2b88a9600a184e4b959f223a55a4d4b5
Publikováno v:
Symmetry, Vol 16, Iss 7, p 872 (2024)
The lack of an S-Box in some lightweight cryptography algorithms, like Speck and Tiny Encryption Algorithm, or the presence of a fixed S-Box in others, like Advanced Encryption Standard, makes them more vulnerable to attacks. This proposal presents a
Externí odkaz:
https://doaj.org/article/8a9a1d314a8948dd89d773f5e5a49508
Publikováno v:
Wasit Journal of Computer and Mathematics Science (2021)
Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance comp
Externí odkaz:
https://doaj.org/article/a6d2b27d94bf4f5f950c0bcb540a6600
Autor:
Alaa Kadhim Farhan, Nadia M.G. Al-Saidi, Abeer Tariq Maolood, Fahimeh Nazarimehr, Iqtadar Hussain
Publikováno v:
Entropy, Vol 21, Iss 10, p 958 (2019)
Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This new system is thoroughly ana
Externí odkaz:
https://doaj.org/article/7fdd976dd75d4b20969f268cfbfc0736
Autor:
Abeer Tariq Maolood, Alaa Kadhim Farhan, Wageda I. El-Sobky, Hany Nasry Zaky, Hossam L. Zayed, Hossam E. Ahmed, Tamer O. Diab
Publikováno v:
Security and Communication Networks.
IoT is one of the most popular technologies in recent years due to the interconnection of various infrastructures, physical devices, and software. To guarantee the security of Internet of Things (IoT) pervasiveness, lightweight cryptographic solution
Publikováno v:
2022 International Conference on Data Science and Intelligent Computing (ICDSIC).
In the recent years, an increasing demand for securing visual resource-constrained devices become a challenging problem due to the characteristics of these devices. Visual resource-constrained devices are suffered from limited storage space and lower
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::397e87ff6ed7230708db73c49b804134
https://zenodo.org/record/7069292
https://zenodo.org/record/7069292
Publikováno v:
Wasit Journal of Computer and Mathematics Science. 1:66-83
Network Intrusion Detection System (NIDS) detects normal and malicious behavior by analyzing network traffic, this analysis has the potential to detect novel attacks especially in IoT environments. Deep Learning (DL)has proven its outperformance comp
Publikováno v:
Tikrit Journal of Pure Science. 25:114-125
Block encryption algorithms rely on the two most important features of their complexity and ease of use to support security requirements (confidentiality, data integrity, and non-repudiation) to prevent unauthorized users from entering the system and