Volume 4, Issue 3 (2024)
Articles
Enhancing Electronic Agriculture Data Security with a Blockchain-Based Search Method and E-Signatures
Duaa Hammoud Tahayur and Mishall Al-Zubaidie
CryptoGenSec: A Hybrid Generative AI Algorithm for Dynamic Cryptographic Cyber Defence
Ghada Al-Kateb, Ismael Khaleel, and Mohammad Aljanabi
A Classifier-Driven Deep Learning Clustering Approach to Enhance Data Collection in MANETs
Ali Abdullah Ali, Mohammed Khaleel Hussein, and Mohammed Ahmed Subhi
A New Lightweight Cryptosystem for IoT in Smart City Environments
Firas Hazzaa, Md Mahmudul Hasan, Akram Qashou, Sufian Yousef, and Sufian Yousef
Hybrid Classifier for Detecting Zero-Day Attacks on IoT Networks
Rana M. Zaki and Inam S. Naser
An optimized model for network intrusion detection in the network operating system environment
Abbas A. Abdulhameed, Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan
A Systematic Literature Review on Cyber Attack Detection in Software-Define Networking (SDN)
Dalia Shihab Ahmed, Abbas Abdulazeez Abdulhameed, and Methaq T. Gaata
Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System
Hayder Mazin Makki Alibraheemi, Mazen M. A. Al Ibraheemi, and Zainb Hassan Radhy
Intermediary Decentralized Computing and Private Blockchain Mechanisms for Privacy Preservation in the Internet of Medical Things
Rasha Halim Razzaq, Mishall Al-Zubaidie, and Rajaa Ghali Atiyah
AI-Powered Cyber Threats: A Systematic Review
Mafaz Alanezi and Ruah Mouad Alyas AL-Azzawi
Dental segmentation via enhanced YOLOv8 and image processing techniques
Dhiaa Mohammed Abed, Shuzlina Abdul-Rahman, and Sofianita Mutalib
Development of Robust and Efficient Symmetric Random Keys Model based on the Latin Square Matrix
Nada Hussein M. Ali, Mays M. Hoobi, and Dunia F. Saffo
A Novel Hybrid Fusion Model for Intrusion Detection Systems Using Benchmark Checklist Comparisons
Widad K. Mohammed, Mohammed A. Taha, and Saleh M. Mohammed
Deepfake Detection in Video and Audio Clips: A Comprehensive Survey and Analysis
Wurood A. Jbara, Noor Al-Huda K. Hussein, and Jamila H. Soud
Collaborative Intrusion Detection System to Identify Joint Attacks in Routing Protocol for Low-Power and Lossy Networks Routing Protocol on the Internet of Everything
Omar A. Abdulkareem, Raja Kumar Kontham, and Farhad E. Mahmood
Cybersecurity Defence Mechanism Against DDoS Attack with Explainability
Alaa Mohammed Mahmood and İsa Avcı
Securing Real-Time Data Transfer in Healthcare IoT Environments with Blockchain Technology
Safa Hussein Oleiwi, Saraswathy Shamini Gunasekaran, Karrar Ibrahim AbdulAmeer, Mazin Abed Mohammed, and Mazin Abed Mohammed
From Monochrome to Color: Efficient Techniques for Realistic Video Colorization
Zahoor M. Aydam and Nidhal K. El Abbadi