Search

Journal Menu

Journal Browser

Results (3)

Search Parameters:

Keyword: Confidentiality
Order results
Results per page
Open AccessArticle
12 Pages, 1,935 KB Download PDF
A Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis

by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 11-22, 2024; DOI: 10.55708/js0307002
Abstract: In today's digital age, individuals extensively engage with virtual environments hosting a plethora of public and private services alongside social platforms. As a consequence, safeguarding these environments from potential cyber threats such as data breaches and system disruptions becomes paramount. Cybersecurity encompasses a suite of technical, organizational, and managerial measures aimed at thwarting unauthorized access… Read More

(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Information Systems – Computer Science (ISC))

Open AccessArticle
6 Pages, 1,924 KB Download PDF
Histogram Based Visible Image Encryption for Real Time Applications

by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More

(This article belongs to the Section Cybernetics – Computer Science (CYC))

Open AccessArticle
20 Pages, 3,659 KB Download PDF
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges

by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More

(This article belongs to the Section Multidisciplinary – Sciences (MLS))

Share Link