Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks

VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …

Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach

A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …

Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes

VO Nyangaresi, ZA Abduljabbar, KAA Mutlaq, J Ma… - Applied Sciences, 2022 - mdpi.com
Highly sensitive information about people's social life and daily activities flows in smart
home networks. As such, if attackers can manage to capture or even eavesdrop on this …

An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN

HS Alwageed, I Keshta, RA Khan, A Alzahrani… - PloS one, 2024 - journals.plos.org
The significance of cloud computing methods in everyday life is growing as a result of the
exponential advancement and refinement of artificial technology. As cloud computing makes …

[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture

M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …

[CITATION][C] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023

[CITATION][C] Techniques and protocols for enhancing data privacy in cloud computing: A review

M Otieno - World Journal of Advanced …, 2023 - World Journal of Advanced …

[CITATION][C] A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service

D Odera, G Odiaga - World Journal …, 2023 - World Journal of Advanced …

[CITATION][C] Security challenges in cloud computing: A comprehensive analysis

JJ Ang'udi - World Journal of Advanced …, 2023 - World Journal of Advanced …

[CITATION][C] Safeguarding the future: A comprehensive analysis of security measures for smart grids

SA Wasumwa - World Journal of Advanced …, 2023 - World Journal of Advanced …