A New Image Encryption Method Using an Optimized Smart Codebook
Information attacks have increased worldwide as more information is available in digital form. Image encryption is essential to prevent attackers from unauthorized access to confidential images. In this paper, we introduce a novel image encryption method
Rami Sihwail, Dyala Ibrahim
doaj +1 more source
Methodology for Predictive Cyber Security Risk Assessment (PCSRA)
Daniel Jorge Ferreira +2 more
openalex +1 more source
Named entity recognition model based on Multi‐BiLSTM and competition mechanism
A named entity recognition (NER) model based on multiple bidirectional long short‐term memory networks (Multi‐BiLSTM) and competition mechanism (CM) is proposed.
Yang Zhou +3 more
doaj +1 more source
Development of test benches of cyber-physical systems for security analysis
E. S. Basan, N. A. Proshkin
openalex +1 more source
Preschool Cyber Security Management System Based on Intelligent Agents. [PDF]
Song J.
europepmc +1 more source
Network traffic anomaly detection model based on feature grouping and multi‐autoencoders integration
This paper presents a network traffic anomaly detection model based on feature grouping and multiple autoencoders (multi‐AEs) integration. This model comprises four modules: feature grouping module, feature learning module, AUC and optimal threshold ...
Yang Zhou +3 more
doaj +1 more source
Accessible and Inclusive Cyber Security: A Nuanced and Complex Challenge. [PDF]
Renaud K, Coles-Kemp L.
europepmc +1 more source
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication
Private Set Intersection (PSI) is a cryptographic method in secure multi-party computation that allows entities to identify common elements in their datasets without revealing their private data.
Qian Feng +3 more
doaj +1 more source
Ransomware Detection Using Machine Learning: A Review, Research Limitations and Future Directions
Ransomware attacks are on the rise in terms of both frequency and impact. The shift to remote work due to the COVID-19 pandemic has led more people to work online, prompting companies to adapt quickly.
Jamil Ispahany +3 more
doaj +1 more source
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security. [PDF]
Yadav A, Kumar A, Singh V.
europepmc +1 more source

