To search, Click below search items.
All Published Papers Search Service
Title
Securing SCADA Systems: A Comprehensive Machine Learning Approach for Detecting Reconnaissance Attacks
Author
Ezaz Aldahasi and Talal Alkharobi
Vol. 23 No. 12 pp. 1-12
Keywords
SCADA/ICS security; Reconnaissance attacks; Critical infrastructure; Imbalanced dataset handling techniques; Ensemble methods; Feature Engineering
Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques
Ahmad AbdulQadir AlRababah
Vol. 23 No. 12 pp. 13-26
wireless network; cognitive wireless network; radio frequency spectrum; operational frequencies; natural limitations of frequency; quality requirements; artificial intelligence; data transmission.
Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements
Noot A. Alissa and Waleed A. Alrodhan
Vol. 23 No. 12 pp. 27-80
Self-sovereign identity, blockchain-based identity management, decentralized digital identity, emerging identity solutions, identity management models.
Trust based Mutual Authentication Mechanism for Cloud Computing
Mandeeep Kaur and Dr. Prachi Garg
Vol. 23 No. 12 pp. 81-90
Access control, Mutual Authentication, Cloud Computing, Data Security, S-box.