Results 111 to 120 of about 70,409 (156)
Robust zero-watermarking for color images using hybrid deep learning models and encryption. [PDF]
Gharib HA, Abdelnapi NMM, Hosny KM.
europepmc +1 more source
GraphFedAI framework for DDoS attack detection in IoT systems using federated learning and graph based artificial intelligence. [PDF]
Anjum M+6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Research on Network Security Protection System Based on Computer Big Data Era
2022 IEEE Conference on Telecommunications, Optics and Computer Science (TOCS), 2022This paper designs a network security protection system based on artificial intelligence technology from two aspects of hardware and software. The system can simultaneously collect Internet public data and secret-related data inside the unit, and encrypt
Xiuyun Lu, W. Zhao, Yuquan Zhu
semanticscholar +1 more source
Secure Virtual Machine Live Migration using Advanced Metric Encryption
Recent Advances in Computer Science and Communications, 2022Cloud is based on the underlying technology of virtualization. Here, the physical servers are divided into multiple virtual servers. Through the technology of virtualization, each virtual server contains virtual machines. Live virtual machine migration
R. Saravanaguru, Gokul Geetha Narayanan
semanticscholar +1 more source
Semi-Transparent Encryption to Prevent Leakage of Sensitive Information
2022 IEEE 2nd International Conference on Mobile Networks and Wireless Communications (ICMNWC), 2022With the continuous progress and development of science and technology, the application of computers has been popularized in all aspects of human life, providing great flexibility for human work and study.
Wei Zhan, Xian Luo, Fei Long, Guoru Deng
semanticscholar +1 more source
A Brief Review on Various Aspects of Steganography Followed by Cryptographic Analysis
2022 IEEE 7th International conference for Convergence in Technology (I2CT), 2022Owing to cyberattacks risks as well as other accidental alterations while active communication across an unsecured network, establishing a secure connection betwixt two communicative parties is becoming a complex job.
A. Agarwal, Sandeep Malik
semanticscholar +1 more source
Hybrid Cryptosystems MRC-4 Algorithm and RSA Dual Modulus to Secure Data
2023 International Conference of Computer Science and Information Technology (ICOSNIKOM), 2023Cryptography is very important when we talk about the security of data. Cryptography is a science that studies techniques, both mathematical and intuitive, related to aspects of data security.
B. Hutagaol+2 more
semanticscholar +1 more source
2023 IEEE 3rd Mysore Sub Section International Conference (MysuruCon), 2023
Cloud computing is a nascent paradigm in the field of data technology and computer science which is predicated on the use of the Internet, often known as the World Wide Web. One of the prominent concerns within this field is the security aspects of cloud
Deepika, Rajneesh Kumar, Dalip
semanticscholar +1 more source
Cloud computing is a nascent paradigm in the field of data technology and computer science which is predicated on the use of the Internet, often known as the World Wide Web. One of the prominent concerns within this field is the security aspects of cloud
Deepika, Rajneesh Kumar, Dalip
semanticscholar +1 more source