To search, Click below search items.
All Published Papers Search Service
Title
Secure and Resilient Framework for Internet of Medical Things (IoMT) with an Effective Cybersecurity Risk Management
Author
Latifah Khalid Alabdulwahhab, Shaik Shakeel Ahamad
Vol. 24 No. 5 pp. 73-78
Keywords
Internet of Medical Things (IoMT); Risk Management; PILAR Risk Management Tool; Risk Impact Parameters (RIP), UICC (Universal Integrated Circuit Card); TPM (Trusted Platform Module)
Single Image Dehazing: An Analysis on Generative Adversarial Network
Amina Khatun, Mohammad Reduanul Haque , Rabeya Basri, and Mohammad Shorif Uddin
Vol. 24 No. 2 pp. 136-142
Image dehazing; deep learning; convolutional neural networks (CNN); generative adversarial networks (GAN).
Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System
Dr Prakash Kuppuswamy, Dr Saeed QY Al Khalidi, Dr Nithya Rekha Sivakumar
Vol. 24 No. 1 pp. 196-204
Cryptography, Hybrid encryption algorithms, data security, information security, RSA.
Adversarial Attacks and Defense Strategy in Deep Learning
Sarala D.V and Dr.Thippeswamy Gangappa
Vol. 24 No. 1 pp. 127-132
Adversarial Attack, Defenses, Deep Learning.