-
1Conference
المؤلفون: A Biryukov, L Cardoso dos Santos, JS Teh, A Udovenko, V Velichkov
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Uncategorised value
Relation: 10779/DRO/DU:24571660.v1; https://figshare.com/articles/conference_contribution/Meet-in-the-Filter_and_Dynamic_Counting_with_Applications_to_Speck/24571660
-
2Academic Journal
المؤلفون: M Alawida, JS Teh, WH Alshoura
مصطلحات موضوعية: Engineering, Communications engineering, Information and computing sciences, Computer vision and multimedia computation, Cybersecurity and privacy, Science & Technology, Technology, Remote Sensing, drone security, drone-based surveillance, DNA, finite state machine, image encryption, key scheduling, unmanned aerial vehicle, UAV, PERMUTATION, 2D, SYSTEM, CHAOS, MAP
Relation: 10779/DRO/DU:24571672.v1; https://figshare.com/articles/journal_contribution/A_New_Image_Encryption_Algorithm_Based_on_DNA_State_Machine_for_UAV_Data_Encryption/24571672
-
3Academic Journal
المؤلفون: DP Oyinloye, JS Teh, N Jamil, J Teh
مصطلحات موضوعية: Engineering, Communications engineering, Information and computing sciences, Distributed computing and systems software, Science & Technology, Technology, Computer Science, Information Systems, Electrical & Electronic, Telecommunications, Consensus protocol, Protocols, Bitcoin, Peer-to-peer computing, Adaptation models, Stochastic processes, Internet of Things, Blockchain, proof of contribution, proof of reputation, Proof of Work (PoW), simulator, BLOCKCHAIN CONSENSUS, 7 Affordable and Clean Energy
-
4Academic Journal
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Machine learning, Science & Technology, Technology, Computer Science, Information Systems, Deep learning, Block cipher, Lightweight cryptography, Differential cryptanalysis, Neural distinguisher, Neural network, NETWORK
-
5Academic Journal
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Science & Technology, Technology, Computer Science, Information Systems, Automatic search, Block cipher, Branch-and-bound, Cryptanalysis, Differential, Differential cryptanalysis, GPU
-
6Academic Journal
المؤلفون: DR Ibrahim, R Abdullah, JS Teh
مصطلحات موضوعية: Information and computing sciences, Computer vision and multimedia computation, Cybersecurity and privacy, Distributed computing and systems software, Cognitive and computational psychology, Uncategorised value
Relation: 10779/DRO/DU:24572020.v1; https://figshare.com/articles/journal_contribution/An_enhanced_color_visual_cryptography_scheme_based_on_the_binary_dragonfly_algorithm/24572020
-
7Academic Journal
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Science & Technology, Technology, Physical Sciences, Computer Science, Information Systems, Mathematics, Applied, SLIM, LCB, Differential cryptanalysis, Lightweight, block cipher, SMT
Relation: 10779/DRO/DU:24571972.v1; https://figshare.com/articles/chapter/Differential_Cryptanalysis_of_Lightweight_Block_Ciphers_SLIM_and_LCB/24571972
-
8Academic Journal
المؤلفون: JS Teh, A Biryukov
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Science & Technology, Technology, Computer Science, Information Systems, Differential cryptanalysis, Rectangle attack, Related-key, WARP, GFN, BOOMERANG, CIPHERS, SEARCH, ATTACK
Relation: 10779/DRO/DU:24571687.v1; https://figshare.com/articles/journal_contribution/Differential_cryptanalysis_of_WARP/24571687
-
9Academic Journal
المؤلفون: C Chimeleze, N Jamil, R Ismail, KY Lam, JS Teh, J Samual, C Akachukwu Okeke
مصطلحات موضوعية: Communications engineering, Information and computing sciences, Cybersecurity and privacy, Distributed computing and systems software, Machine learning, Theory of computation, Other information and computing sciences, Science & Technology, Technology, Computer Science, Information Systems, Telecommunications
-
10Academic Journal
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Science & Technology, Technology, Computer Science, Information Systems, BORON, Cryptanalysis, Differential cryptanalysis, Branch-and-bound, SAT solver, SMT solver, ULTRA-LIGHTWEIGHT
Relation: 10779/DRO/DU:24571930.v1; https://figshare.com/articles/journal_contribution/New_differential_cryptanalysis_results_for_the_lightweight_block_cipher_BORON/24571930
-
11Academic Journal
المؤلفون: WH Alshoura, Z Zainol, JS Teh, M Alawida
مصطلحات موضوعية: Engineering, Uncategorised value
Relation: 10779/DRO/DU:24571903.v1; https://figshare.com/articles/journal_contribution/An_FPP-resistant_SVD-based_image_watermarking_scheme_based_on_chaotic_control/24571903
-
12Academic Journal
المؤلفون: M Alawida, JS Teh, A Mehmood, A Shoufan, WH Alshoura
مصطلحات موضوعية: Information and computing sciences, Cybersecurity and privacy, Distributed computing and systems software, Science & Technology, Technology, Computer Science, Information Systems, Chaotic map, Encryption, Block cipher, Image encryption, Cybersecurity, SYSTEM
-
13Conference
مصطلحات موضوعية: Information and computing sciences, Computer vision and multimedia computation, Uncategorised value
-
14Conference
مصطلحات موضوعية: Uncategorised value
Relation: 10779/DRO/DU:24572089.v1; https://figshare.com/articles/conference_contribution/A_machine_learning_approach_to_predicting_block_cipher_security/24572089
-
15Academic Journal
المؤلفون: WH Alshoura, Z Zainol, JS Teh, M Alawida, A Alabdulatif
مصطلحات موضوعية: Engineering, Information and computing sciences, Cybersecurity and privacy, Science & Technology, Technology, Computer Science, Information Systems, Electrical & Electronic, Telecommunications, Watermarking, Transforms, Frequency-domain analysis, Robustness, Digital images, Encryption, Distributed databases, Embedding, extraction, frequency domain, image watermarking, singular-value decomposition (SVD), DISCRETE WAVELET TRANSFORM, SINGULAR-VALUE DECOMPOSITION, OF-THE-ART, DIGITAL IMAGE, MEDICAL IMAGES, DIFFERENTIAL EVOLUTION, DWT-SVD, ROBUST WATERMARKING, COLOR IMAGES
Relation: 10779/DRO/DU:24572314.v1; https://figshare.com/articles/journal_contribution/Hybrid_SVD-Based_Image_Watermarking_Schemes_A_Review/24572314
-
16Academic Journal
المؤلفون: DR Ibrahim, JS Teh, R Abdullah
مصطلحات موضوعية: Information and computing sciences, Computer vision and multimedia computation, Uncategorised value
Relation: 10779/DRO/DU:24572311.v1; https://figshare.com/articles/chapter/Improved_Facial_Recognition_Algorithms_Based_on_Dragonfly_and_Grasshopper_Optimization/24572311
-
17Academic Journal
مصطلحات موضوعية: Engineering, Information and computing sciences, Cybersecurity and privacy, Machine learning, Science & Technology, Technology, Computer Science, Information Systems, Electrical & Electronic, Telecommunications, Ciphers, Cryptography, Security, Deep learning, Machine learning algorithms, Neural networks, Training, Active S-boxes, block cipher, cryptanalysis, differential cryptanalysis, lightweight cryptography, TWINE
-
18Academic Journal
المؤلفون: DR Ibrahim, JS Teh, R Abdullah
مصطلحات موضوعية: Information and computing sciences, Computer vision and multimedia computation, Cybersecurity and privacy, Data management and data science, Theory of computation, Science & Technology, Technology, Computer Science, Information Systems, Authentication, biometrics, facial recognition, multifactor authentication, visual Cryptography
-
19Academic Journal
مصطلحات موضوعية: Engineering, Information and computing sciences, Cybersecurity and privacy, Machine learning, Science & Technology, Technology, Computer Science, Information Systems, Electrical & Electronic, Telecommunications, Ciphers, Encryption, Training, Deep learning, Security, Data models, Task analysis, Active S-boxes, block cipher, cryptanalysis, differential cryptanalysis, lightweight cryptography, neural networks, TWINE
-
20Academic Journal
المؤلفون: R Awadallah, A Samsudin, JS Teh, M Almazrooie
مصطلحات موضوعية: Engineering, Information and computing sciences, Cybersecurity and privacy, Distributed computing and systems software, Science & Technology, Technology, Computer Science, Information Systems, Electrical & Electronic, Telecommunications, Cloud computing, Cryptography, Security, Encryption, Blockchain, Distributed databases, Data integrity, homomorphic encryption, ISSUES