Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

Performance assessment of supervised classifiers for designing intrusion detection systems: a comprehensive review and recommendations for future research

R Panigrahi, S Borah, AK Bhoi, MF Ijaz, M Pramanik… - Mathematics, 2021 - mdpi.com
Supervised learning and pattern recognition is a crucial area of research in information
retrieval, knowledge engineering, image processing, medical imaging, and intrusion …

[HTML][HTML] Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection

M Schmitt - Journal of Industrial Information Integration, 2023 - Elsevier
The last decades have been characterized by unprecedented technological advances,
many of them powered by modern technologies such as Artificial Intelligence (AI) and …

Cybersecurity risk assessment in smart city infrastructures

M Kalinin, V Krundyshev, P Zegzhda - Machines, 2021 - mdpi.com
The article is devoted to cybersecurity risk assessment of the dynamic device-to-device
networks of a smart city. Analysis of the modern security threats at the IoT/IIoT, VANET, and …

Integration and applications of fog computing and cloud computing based on the internet of things for provision of healthcare services at home

M Ijaz, G Li, L Lin, O Cheikhrouhou, H Hamam, A Noor - Electronics, 2021 - mdpi.com
Due to the COVID-19 pandemic, the world has faced a significant challenge in the increase
of the rate of morbidity and mortality among people, particularly the elderly aged patients …

[HTML][HTML] Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms

A Sharma, UK Singh - Global Transitions Proceedings, 2022 - Elsevier
Major backbone of today's competitive and upcoming market is definitely becoming Cloud
computing & hence corporate utilize capabilities of cloud computing services. To improve …

[HTML][HTML] Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder

AL Yaser, HM Mousa, M Hussein - Future Internet, 2022 - mdpi.com
Software-defined networking (SDN) is an innovative network paradigm, offering substantial
control of network operation through a network's architecture. SDN is an ideal platform for …

Cyber threat: its origins and consequence and the use of qualitative and quantitative methods in cyber risk assessment

J Crotty, E Daniel - Applied Computing and Informatics, 2022 - emerald.com
Purpose Consumers increasingly rely on organisations for online services and data storage
while these same institutions seek to digitise the information assets they hold to create …

Explainable artificial intelligence enabled intrusion detection technique for secure cyber-physical systems

L Almuqren, MS Maashi, M Alamgeer, H Mohsen… - Applied Sciences, 2023 - mdpi.com
A cyber-physical system (CPS) can be referred to as a network of cyber and physical
components that communicate with each other in a feedback manner. A CPS is essential for …

[HTML][HTML] Blockchain and machine learning-based hybrid IDS to protect smart networks and preserve privacy

S Mishra - Electronics, 2023 - mdpi.com
The cyberspace is a convenient platform for creative, intellectual, and accessible works that
provide a medium for expression and communication. Malware, phishing, ransomware, and …