Author:
Al-Tamimi Ahmed Y. A.,Snober Mohammad Abu,Al-Haija Qasem Abu
Publisher
Springer Nature Singapore
Reference14 articles.
1. Al-Haija QA (2021) On the security of cyber-physical systems against stochastic cyber-attacks models. In: IEEE international IoT, electronics and mechatronics conference (IEMTRONICS), pp 1–6.https://doi.org/10.1109/IEMTRONICS52119.2021.9422623
2. Al-Haija QA, Ishtaiwia A (2021) Machine learning based model to identify firewall decisions to improve cyber-defense. Int J Adv Sci Eng Inf Technol 11(4):1688–1695
3. Ahmad A, AbuHour Y, Younisse R, Alslman Y, Alnagi E, Abu Al-Haija Q (2022) MID-crypt: a cryptographic algorithm for advanced medical images protection. J Sens Actuator Netw 11:24. https://doi.org/10.3390/jsan11020024
4. Stallings W (2005) Cryptography and network security (4th ed)
5. Shetty A, Shravya K, Krithika K (2014) A review on asymmetric cryptography—RSA and ElGamal algorithm. Int J Innovative Res Comput Commun Eng 2(5)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Email Protection in the Digital Age: Evaluating Symmetric Cryptographic Algorithms;2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE);2024-01-24