Analyze quantum security in software design using fuzzy-AHP

M Nadeem - International Journal of Information Technology, 2024 - Springer
Quantum Security is a conceptual phenomenon of security that uses the quantum
mechanical concept in computing. Superposition and entanglement are the quantum …

[PDF][PDF] Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques

W Alosaimi, A Alharbi, H Alyami, B Alouffi, A Almulihi… - AIMS Math, 2024 - aimspress.com
Analyzing the impact of quantum computing on IoT security using computational based data
analytics techniques Page 1 AIMS Mathematics, 9(3): 7017–7039. DOI: 10.3934/math.2024342 …

Architecting lymphoma fusion: PROMETHEE-II guided optimization of combination therapeutic synergy

SA Ansar, S Arya, N Soni, MW Khan… - International Journal of …, 2024 - Springer
Lymphoma, a malignancy originating from the aberrant proliferation of lymphocytes in the
lymphatic system, becomes one of the prime concerns in health care across the world. The …

Scrutinization of Threats from a Cloud-based Network Traffic Environment

S Chopra, AG Sreedevi - 2024 11th International Conference …, 2024 - ieeexplore.ieee.org
In this age of digitalization, securing computer networks is of utmost importance to protect
sensitive data and critical infrastructure. Threat scrutinization plays an integral role in …

[HTML][HTML] Gestão de riscos e regulamentação: Implementação de sistemas de tomada de decisão algorítmica

V VASYUKOV, E KIRILLOVA, A FEDOROV… - Revista …, 2024 - revista.unicuritiba.edu.br
Objective: The widespread introduction and use of algorithmic decision-making systems
reduces time and transaction costs and saves human resources. However, in addition to …

[HTML][HTML] Supply Chain Risk Analysis through the Computational Method

T Althaqafi - International Journal of Fuzzy Logic and Intelligent …, 2024 - ijfis.org
Supply chain management (SCM) requires risk analysis for the sustainable development of
organizations such as retail, healthcare, information technology, and media. SCM has set …

[PDF][PDF] Computational analysis of the Logistics Supply Chain from a global trade perspective

T Althaqafi - Journal of Infrastructure, Policy and Development, 2024 - researchgate.net
Global trade is based on coordinated factors, that means labor and products are moved from
their point of origin to the point of use. Strategies have a significant impact on global trade …

Deep Learning Approach for Classifying DDoS Attack Traffic in SDN Environments

M Nadeem, S Dwivedi, R Akhtar… - Journal of …, 2024 - journals.nauss.edu.sa
This paper introduces a novel, deep knowledge-based approach for classifying Distributed
Denial of Service (DDoS) attacks in Software-Defined Networking (SDN) environments …

Secure Healthcare Predictive Modeling with Homomorphic Encryption

P Shekhu, S Sethi, A Chaudhary - 2024 11th International …, 2024 - ieeexplore.ieee.org
This project integrates TensorFlow, homomorphic encryption, and blockchain for secure
data analytics. Prioritizing user privacy and data integrity, the solution adeptly processes …

A Secure File Encapsulation System for File Sharing in the Absence of a Trusted Channel

P Chopra, MG Kulkarni - 2024 3rd Edition of IEEE Delhi Section …, 2024 - ieeexplore.ieee.org
A Secure File Encapsulation Program for file sharing facilitates their access only by
authorized parties by eliminating the need of a secure channel of transmission and also logs …