To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10445

Title

Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks

Author

Ezaz Aldahasi and Talal Alkharobi

Citation

Vol. 23  No. 12  pp. 1-12

Keywords

SCADA/ICS security; Reconnaissance attacks; Critical infrastructure; Imbalanced dataset handling techniques; Ensemble methods; Feature Engineering


Title

Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques

Author

Ahmad AbdulQadir AlRababah

Citation

Vol. 23  No. 12  pp. 13-26

Keywords

wireless network; cognitive wireless network; radio frequency spectrum; operational frequencies; natural limitations of frequency; quality requirements; artificial intelligence; data transmission.


Title

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

Author

Noot A. Alissa and Waleed A. Alrodhan

Citation

Vol. 23  No. 12  pp. 27-80

Keywords

Self-sovereign identity, blockchain-based identity management, decentralized digital identity, emerging identity solutions, identity management models.


Title

Trust based Mutual Authentication Mechanism for Cloud Computing

Author

Mandeeep Kaur and Dr. Prachi Garg

Citation

Vol. 23  No. 12  pp. 81-90

Keywords

Access control, Mutual Authentication, Cloud Computing, Data Security, S-box.


[1] ... [prev] [2541] [2542] [2543] [2544] [2545] [2546] [2547] [2548] [2549] [2550] [next] ... [2612]