Author:
Al-Tamimi Ahmed Y. A.,Snober Mohammad Abu,Al-Haija Qasem Abu
Publisher
Springer Nature Singapore
Reference14 articles.
1. Al-Haija QA (2021) On the security of cyber-physical systems against stochastic cyber-attacks models. In: IEEE international IoT, electronics and mechatronics conference (IEMTRONICS), pp 1–6.https://doi.org/10.1109/IEMTRONICS52119.2021.9422623
2. Al-Haija QA, Ishtaiwia A (2021) Machine learning based model to identify firewall decisions to improve cyber-defense. Int J Adv Sci Eng Inf Technol 11(4):1688–1695
3. Ahmad A, AbuHour Y, Younisse R, Alslman Y, Alnagi E, Abu Al-Haija Q (2022) MID-crypt: a cryptographic algorithm for advanced medical images protection. J Sens Actuator Netw 11:24. https://doi.org/10.3390/jsan11020024
4. Stallings W (2005) Cryptography and network security (4th ed)
5. Shetty A, Shravya K, Krithika K (2014) A review on asymmetric cryptography—RSA and ElGamal algorithm. Int J Innovative Res Comput Commun Eng 2(5)