Full Text Available
Access Full Text at Repository
Search Results - "Computer and Cyber Security"
-
Cloud-native AI Pipelines for Continuous Infrastructure Optimization and Anomaly Detection
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
Online Article RSS Article -
Three-dimensional Decision Task Offloading Model in Mobile Edge Computing
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Interference-aware Deep Quantum Neural Network for NOMA Channel Estimation via Adaptive Energy Valley Optimization
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Advances in Malware Detection using Machine Learning and Deep Learning: A Comprehensive Comparative Analysis
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Securing Fog-assisted IoT: An Adaptable and Efficient Threat Identification Approach
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Assessment of Social Capital from Mobile Сommunication Data: A Cascade Model Based on Random Forest and Logistic Regression
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Reinforcement Learning-Based Self-Healing Routing in Fault-prone Wireless Sensor Networks
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Adaptive Tangent Homomorphic Encryption with Equivariant Quantum Neural Networks for Secure Data Transmission Routing in MANET
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
An Innovative Method for Detecting Fake News Distribution Sources based on Machine Learning Technology and Graph Theory
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
A Lightweight Framework Using Signcryption Based Key Agreement Scheme with Location Privacy for D2D Communications in 5G VANETs
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Addressing Data Privacy Concerns in IoT Architecture with Federated Learning and TinyML
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Blockchain-enhanced Detection of Malicious Nodes in WSNs Using Parallel Triple Graph Attention-based Convolution Network
Published in International Journal of Computer Network and Information Security (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
First Fully Pipelined High Throughput FPGA Implementation and GPU Optimization of Wider Variant of AES
Published in Journal of Cryptographic Engineering (2026)Subjects: “…Computer and Cyber Security…”
Get full text
-
Advancing training stability in unsupervised SEM image segmentation for IC layout extraction
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Implementations of FAST and AEZ on field programmable gate arrays for low level encryption of disks with 4096-byte sectors
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Netlist whisperer: extensive analysis of circuit leakage using LLMs
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Cover chirp jamming: hybrid jamming–deception attack on FMCW radar and its countermeasure
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
New lattice-based partial key exposure attacks on common prime RSA
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Friendly primes for efficient modular arithmetic using the Polynomial Modular Number System
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text
-
Single engine architecture for hardware root of trust
Published in Journal of Cryptographic Engineering (2025)Subjects: “…Computer and Cyber Security…”
Get full text