Search Results - "Khashan, Osama A"
-
1
Hybrid Lightweight Proxy Re-Encryption Scheme for Secure Fog-to-Things Environment
Published in IEEE access (2020)“…Fog computing is a promising paradigm that can mitigate the heavy burden on cloud-central processing of the vast amount of IoT data. Although fog computing has…”
Get full text
Journal Article -
2
Fuzzy Clustering Algorithm Based on Improved Global Best-Guided Artificial Bee Colony with New Search Probability Model for Image Segmentation
Published in Sensors (Basel, Switzerland) (18-11-2022)“…Clustering using fuzzy C-means (FCM) is a soft segmentation method that has been extensively investigated and successfully implemented in image segmentation…”
Get full text
Journal Article -
3
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Published in IEEE access (2024)“…In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE)…”
Get full text
Journal Article -
4
A hybrid dependency-based approach for Urdu sentiment analysis
Published in Scientific reports (12-12-2023)“…In the digital age, social media has emerged as a significant platform, generating a vast amount of raw data daily. This data reflects the opinions of…”
Get full text
Journal Article -
5
Digital image watermarking using discrete cosine transformation based linear modulation
Published in Journal of cloud computing : advances, systems and applications (01-12-2023)“…The proportion of multimedia traffic in data networks has grown substantially as a result of advancements in IT. As a result, it's become necessary to address…”
Get full text
Journal Article -
6
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors
Published in Cryptography (01-03-2023)“…Securing multimedia data on disk drives is a major concern because of their rapidly increasing volumes over time, as well as the prevalence of security and…”
Get full text
Journal Article -
7
The determinants of reliable smart grid from experts’ perspective
Published in Energy Informatics (01-12-2023)“…A smart grid integrates communication networks with the conventional electrical grid. Due to their potential, smart grids are anticipated to achieve widespread…”
Get full text
Journal Article -
8
Feature Selection Using Hybrid Metaheuristic Algorithm for Email Spam Detection
Published in Cybernetics and information technologies : CIT (01-06-2024)“…In the present study, Krill Herd (KH) is proposed as a Feature Selection tool to detect spam email problems. This works by assessing the accuracy and…”
Get full text
Journal Article -
9
Enhanced Prairie Dog Optimization with Differential Evolution for solving engineering design problems and network intrusion detection system
Published in Heliyon (15-09-2024)“…This paper introduces a novel hybrid optimization algorithm, PDO-DE, which integrates the Prairie Dog Optimization (PDO) algorithm with the Differential…”
Get full text
Journal Article -
10
Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning
Published in IEEE open journal of the Communications Society (2024)“…Wireless multimedia sensor networks (WMSNs) have gained considerable attention across various applications due to their capabilities for real-time multimedia…”
Get full text
Journal Article -
11
Performance study of selective encryption in comparison to full encryption for still visual images
Published in Frontiers of information technology & electronic engineering (01-06-2014)“…Securing digital images is becoming an important concern in today’s information security due to the extensive use of secure images that are either transmitted…”
Get full text
Journal Article -
12
Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks
Published in Engineering science and technology, an international journal (01-05-2024)“…Wireless camera networks (WCNs) have seen widespread deployment in recent years, leading to an upsurge in monitoring and surveillance systems aimed at…”
Get full text
Journal Article -
13
Edge-based lightweight selective encryption scheme for digital medical images
Published in Multimedia tools and applications (01-09-2020)“…Securing digital medical images is increasingly becoming a major concern due to the rapid growth of the amount of medical images transferred over a network and…”
Get full text
Journal Article -
14
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Published in Frontiers of information technology & electronic engineering (2015)“…Real-time encryption and decryption of digital images stored on end-user devices is a challenging task due to the inherent features of the images. Traditional…”
Get full text
Journal Article -
15
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
Published in Journal of King Saud University. Computer and information sciences (01-02-2023)“…With the rapid increase in the number of Internet of Things (IoT) devices in recent years, massive amounts of sensitive IoT data are being generated and…”
Get full text
Journal Article -
16
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Published in Systems science & control engineering (31-12-2024)“…Internet of Things (IoT) technology has evolved significantly, transitioning from personal devices to powering smart cities and global deployments across…”
Get full text
Journal Article -
17
Improved security of medical images using DWT–SVD watermarking mechanisms based on firefly Photinus search algorithm
Published in SN applied sciences (03-07-2024)“…Security is the primary concern in the transmission of medical images, as it involves sensitive patient information. This study introduces an optimized…”
Get full text
Journal Article -
18
Improved flat mobile core network architecture for 5G mobile communication systems
Published in International journal of data and network science (Print) (01-01-2023)“…The current mobile network core is built based on a centralized architecture, including the S-GW and P-GW entities to serve as mobility anchors. Nevertheless,…”
Get full text
Journal Article -
19
Blockchain-machine learning fusion for enhanced malicious node detection in wireless sensor networks
Published in Knowledge-based systems (25-11-2024)“…In wireless sensor networks (WSNs), the presence of malicious nodes (MNs) poses significant challenges to data integrity, network stability, and system…”
Get full text
Journal Article -
20
Dual-stage machine learning approach for advanced malicious node detection in WSNs
Published in Ad hoc networks (01-01-2025)“…Within wireless sensor networks (WSNs), a multitude of vulnerabilities can arise, particularly those originating from malicious nodes (MNs), which lead to…”
Get full text
Journal Article