Computer Science
Browse by
Recent Submissions
-
Towards Secure IoT-Based Payments by Extension of Payment Card Industry Data Security Standard (PCI DSS)
(Hindawi, 2022)IoT emergence has given rise to a new digital experience of payment transactions where physical objects like refrigerators, cars, and wearables will make payments. These physical objects will be storing the cardholder ... -
Multilayer IPSec (ML-IPSec) Design for Transport and Application Layer Satellite Performance Enhancing Proxies
(American Institute of Aeronautics and Astronautics, 2010)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
A new dynamic multilayer IPSec protocol
(Springer, 2012-03)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
(IEEE, 2020-08)Key Management in Delay Tolerant Networks (DTN) still remains an unsolved complex problem. Due to peculiar characteristics of DTN, important challenges that make it difficult to design key management architecture are: 1) ... -
Interworking between Satellite Performance Enhancing Proxies and Multilayer IPSec (ML-IPSec)
(2010)Abstract Satellite networks use intermediate devices (Performance Enhancing Proxies, PEPs) for better performance of the TCP/IP data and web browsing applications. PEPs can be classified into transport (such as TCP) and ... -
A Key Transport Protocol for Advance Metering Infrastructure (AMI) Based on Public Key Cryptography
(IEEE, 2020)Advance metering infrastructure (AMI) is an important element of the Smart Grid as it is expectable to simplify the transport of meter reading and control information from meters to the utility provider. Smart meters are ... -
An Expert System for Calculating Zakat in Islam
(IEEE, 2018-12)Islam makes it mandatory for all rich Muslims to pay 2.5% of their annual savings to the needy people in the form of Zakat. It is straightforward to calculate Zakat if one's savings are in the form of cash only. However, ... -
Redesigning of IPSec for interworking with satellite Performance Enhancing Proxies
(IEEE, 2011)Performance Enhancing Proxies (PEPs) are used in satellite networks for better performance of the TCP/IP applications. Multi-layer IPSec (ML-IPSec) resolves the conflict between end-to-end security in standard IPSec and ... -
Detection and mitigation of Denial of Service (DoS) attacks using performance aware Software Defined Networking (SDN)
(IEEE, 2017)Software Defined Networking (SDN) stands to transmute our modern networks and data centers, opening them up into highly agile frameworks that can be reconfigured depending on the requirement. Denial of Service (DoS) attacks ... -
Security in vehicular ad hoc networks: challenges and countermeasures
(Hindawi, 2021-07)Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport ... -
Wormhole attack detection in routing protocol for low power lossy networks
(IEEE, 2018-03)The next wave for internet is called Internet of things. With billions of things attached to internet through IP forms the complex heterogeneous network. Previously devices weren't connected to internet they don't pose a ... -
Security in vehicular ad hoc networks: challenges and countermeasures
(Hindawi, 2021-07)Recently, vehicular ad hoc networks (VANETs) got much popularity and are now being considered as integral parts of the automobile industry. As a subclass of MANETs, the VANETs are being used in the intelligent transport ... -
Public‐key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks
(The Institution of Engineering and Technology, 2017-01)Public-key infrastructure (PKI) is based on public-key certificates and is the most widely used mechanism for trust and key management. However, standard PKI validation and revocation mechanisms are considered major reasons ... -
An Efficient, Scalable Key Transport Scheme (ESKTS) for Delay/Disruption Tolerant Networks
(Springer, 2014-10)In the past, security protocols including key transport protocols are designed with the assumption that there are two parties communication with each other and an adversary tries to intercept this communication. In ... -
Enabling bidirectional traffic mobility for ITS simulation in smart city environments
(North-Holland, 2019-03)Visualization and simulation of Intelligent Transportation Systems (ITS) for future city models is a key research area to bring better traffic safety and efficiency solutions in smart cities. However, the cost of deploying ... -
Secure identification, traceability and real-time tracking of agricultural food supply during transportation using internet of things
(IEEE, 2021-04)Food supply chain process comprises crops collection, processing of food, shipping & delivery to the whole seller in the market. Harvested foods decompose from the moment they are harvested due to attacks from enzymes, ... -
A survey on blockchain technology: evolution, architecture and security
(IEEE, 2021-04)Blockchain is a revolutionary technology that is making a great impact on modern society due to its transparency, decentralization, and security properties. Blockchain gained considerable attention due to its very first ... -
Security analysis for Delay/Disruption Tolerant satellite and sensor networks
(Wiley Periodicals, 2009-09)In the last few years, Delay/Disruption Tolerant Networking has grown to a healthy research topic because of its suitability for challenged environments characterized by heterogeneity, long delay paths and unpredictable ... -
Smart city big data analytics: An advanced review
(Wiley Periodicals, 2019-10)With the increasing role of ICT in enabling and supporting smart cities, the demand for big data analytics solutions is increasing. Various artificial intelligence, data mining, machine learning and statistical analysis-based ... -
A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks
(MDPI, 2022-01)Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information ... -
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks During Cyber-Attacks
(IEEE, 2022-04)The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality ... -
Generating True Random Numbers Based on Multicore CPU Using Race Conditions and Chaotic Maps
(Springer, 2020)A true random number generator (TRNG) is proposed, harvesting entropy from multicore CPUs to generate non-deterministic outputs. The entropy source is the unpredictable sequence of thread access when parallel threads attempt ... -
Ensemble deep transfer learning model for Arabic (Indian) handwritten digit recognition
(Springer London, 2022-01)Recognising handwritten digits or characters is a challenging task due to noisy data that results from different writing styles. Numerous applications essentially motivate to build an effective recognising model for such ... -
A group theoretic construction of large number of AES-like substitution-boxes
(Springer US, 2022-02)Modern block ciphers have been used to design security schemes to fulfil the security requirements in different areas of applications. The substitution boxes, significant components, used in block ciphers must have strong ... -
Enhancing One-Dimensional Chaotic Map Based on Bitstream Dividing Model
(The ACM Digital Library, 2019-02)The chaotic map has attracted more researchers in chaotic cryptography domain. That is because to large similarity among their characteristics such as unpredictability and sensitivity to an initial condition. Moreover, ... -
NIML: non-intrusive machine learning-based speech quality prediction on VoIP networks
(The Institution of Engineering and Technology, 2019-10)Voice over Internet Protocol (VoIP) networks have recently emerged as a promising telecommunication medium for transmitting voice signal. One of the essential aspects that interests researchers is how to estimate the quality ... -
A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata
(IEEE Access, 2020-07)In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various configurations, we select the forward ... -
A systematic review of emerging feature selection optimization methods for optimal text classification: the present state and prospective opportunities
(Springer London, 2021-07)Specialized data preparation techniques, ranging from data cleaning, outlier detection, missing value imputation, feature selection (FS), amongst others, are procedures required to get the most out of data and, consequently, ... -
The internet of things security: A survey encompassing unexplored areas and new insights
(Elsevier, 2022-01)The cosmic evolution of the Internet of things (IoTs) in par with its realization in all spheres of life undertakings, mandates continuous research pursuits in IoT and its associated components. While the rapid evolution ... -
A Novel Hash Function Based on a Chaotic Sponge and DNA Sequence
(IEEE Access, 2021)Many chaos-based hash functions have convoluted designs that are not based on proper design principles, complicating the verification of security claims. We address this problem by proposing a hash function based on a ... -
A review on the security of the internet of things: challenges and solutions
(Springer US, 2021-09)The Internet of Things (IoT) has emerged as a modern wave of Internet technologies that promises great transformation of life in areas such as smart health, smart cities, smart homes, intelligent transport, amongst others. ... -
Blockchain Consensus: An Overview of Alternative Protocols
(MDPI, 2021)Blockchain networks are based on cryptographic notions that include asymmetric-key encryption, hash functions and consensus protocols. Despite their popularity, mainstream protocols, such as Proof of Work or Proof of Stake ... -
Deterministic chaotic finite-state automata
(Springer Netherlands, 2019-06)Chaotic dynamics have been widely applied in various domains such as cryptography, watermarking and optimization algorithms. Enhancing chaotic complexity of simple one-dimensional (1D) chaotic maps has been a popular topic ... -
Unkeyed hash function based on chaotic sponge construction and fixed-point arithmetic
(Springer Netherlands, 2020)Chaotic maps have various properties that mirror the security requirements of cryptographic algorithms. As such, researchers have utilized them in the design of algorithms such as hash functions. Although there exist a ... -
Enhancing unimodal digital chaotic maps through hybridisation
(Springer Netherlands, 2019-04)Despite sharing many similar properties with cryptography, digitizing chaotic maps for the purpose of developing chaos-based cryptosystems leads to dynamical degradation, causing many security issues. This paper introduces ... -
A novel method for generation of strong substitution-boxes based on coset graphs and symmetric groups
(IEEE, 2020-04)The success of AES encryption standard created challenges for the cryptographers to construct strong substitution-boxes using different underlying approaches. It is because they are solely responsible to decide the robustness ... -
A chaos-based keyed hash function based on fixed point representation
(Springer, 2019-05)Chaotic maps are used in the design of hash functions due to their characteristics that are analogous to cryptographic requirements. However, these maps are commonly implemented using floating point representation which ... -
Implementation and practical problems of chaos-based cryptography revisited
(Elsevier, 2020-02)Chaos-based cryptography, since its inception, has become a widely published subject. Despite the vast amount of contributions in the area, its applications in real-world scenarios are minimal as compared to conventional ... -
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators
(Elsevier, 2020-02)Digital chaotic maps are becoming increasingly popular in the area of cryptography due to commonalities but have drawbacks which adversely effect security strength. Thus, enhancing digital chaotic maps in terms of their ... -
An Image Encryption Scheme based on Hybridizing Digital Chaos and Finite State Machine
(Elsevier, 2019-11)Image encryption protects visual information by transforming images into an incomprehensible form. Chaotic systems are used to design image ciphers due to properties such as ergodicity and initial condition sensitivity. A ... -
A new hybrid digital chaotic system with applications in image encryption
(Elsevier, 2019-07)Image encryption provides confidentiality to images by transforming them into unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to design image ciphers due to its many desirable properties ... -
The Effect of Cholesterol on the Dielectric Structure of Lipid Bilayers
(Springer, 2018)Cholesterol plays an important role in regulating the properties of phospholipid bilayers and many mechanisms have been proposed to explain why cholesterol is so ubiquitous within biological membranes of animals. Here we ... -
Analysis of Communicative Phrase Prosody based on Linguistic Modalities of Constituent Words Kazuma Takada, Hideharu Nakajima, and Yoshinori Sagisaka …
(IEEE, 2019-04)In this paper, phrase prosody is analyzed based on linguistic modalities of constituent words for communicative speech synthesis. Since Japanese final particles and auxiliaries play crucial roles to indicate speaker's ... -
A Mobile Application for Incident Detection and Tracking System
(SEEK, 2012-03)Detecting and tracking an incident is a complex task that requires high communication between involved parties and powerful broadcasting methods. The process of detecting and tracking an incident has been suffering from ... -
Artificial Intelligence & Crime Prediction: A Systematic Literature Review
(SSRN, 2022-02)The security of a community is its topmost priority, and hence the government is taking proper action to reduce the crime rate. Consequently, the application of Artificial Intelligence (AI) in crime prediction is a significant ... -
Revitalizing An Aging Field-Tinggi Production Decline Mitigation
(One Petro, 1999-10)Abnormal production decline causes concerns like high operating cost, premature field abandonment resulting in reserves loss and staff demoralisation, all of which have an adverse effect on an E&P company. Operational ... -
Deploying open source software (OSS) in UAE schools
(Zaid university, 2013-01)© 2013 European and Mediterranean Conference on Information Systems. All rights reserved. Computer science educators aim to discover new technologies and methods to reach the students and improve the educational system in ... -
Quality in Use Analysis to Evaluate User Experience of Open Source Software Compatible with MATLAB
(IGI Global, 2016-07)Mathematical and statistical open source software (OSS) has played a vital and positive role in computing statistics, performing numerical computations, and solving for real and complex scalars. There is an enormous need ... -
Towards Sustainable Development Through Open Source Software in the Arab World
(IGI Global, 2018)A literature survey study was conducted to explore the state-of-the-art of open source software and the opportunities and challenges faced by this segment of the software industry in seven Arab countries: Tunisia, Egypt, ... -
A framework application for improving energy demand forecasting using digital twining
(IET, 2021-07)Energy management became an essential mindset toward sustainability. Analyzing energy demand rates facilitates the adoption of efficient energy management solutions. Moreover, forecasting future energy demand is needed to ...