Results (3)
Search Parameters:
Keyword: ConfidentialityA Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis
by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 11-22, 2024; DOI: 10.55708/js0307002
Abstract: In today's digital age, individuals extensively engage with virtual environments hosting a plethora of public and private services alongside social platforms. As a consequence, safeguarding these environments from potential cyber threats such as data breaches and system disruptions becomes paramount. Cybersecurity encompasses a suite of technical, organizational, and managerial measures aimed at thwarting unauthorized access… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Information Systems – Computer Science (ISC))
Histogram Based Visible Image Encryption for Real Time Applications
by Kiran, Sunil Kumar D S, Bharath K N, Harshitha Rohith, Sharath Kumar A J and Ganesh Kumar M T
Journal of Engineering Research and Sciences, Volume 1, Issue 7, Page # 1-6, 2022; DOI: 10.55708/js0107001
Abstract: Like most patient information, medical imaging data is subject to strict data protection and confidentiality requirements. This raises the issue of sending the data which contains a medical image on an open network as per the above issue, also there might be a leakage of information. Encrypting an Image and hiding the information in it… Read More
(This article belongs to the Section Cybernetics – Computer Science (CYC))
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges
by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More
(This article belongs to the Section Multidisciplinary – Sciences (MLS))