[HTML][HTML] Applications of Machine Learning in Cyber Security: A Review

IJ Vourganas, AL Michala - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
In recent years, Machine Learning (ML) and Artificial Intelligence (AI) have been gaining
ground in Cyber Security (CS) research in an attempt to counter increasingly sophisticated …

A Review of Genome to Chaos: Exploring DNA Dynamics in Security

S Aashiq Banu, LK Rao, PS Priya… - Multimedia Tools and …, 2024 - Springer
One of the largest and fastest-growing industries globally is e-healthcare. Digital medical
imaging constantly evolves, advancing from standard computed tomography to powerful …

Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level

MNE Farandi, A Marjuni, N Rijati… - The Imaging Science …, 2024 - Taylor & Francis
This research proposes a new image encryption method to improve the security of image
encryption by integrating a multi-chaotic system and mixed pixel-bit level encryption. In the …

[HTML][HTML] Design of a PID Controller for Microbial Fuel Cells Using Improved Particle Swarm Optimization

C Wang, B Zhu, F Ma, J Sun - Electronics, 2024 - mdpi.com
The microbial fuel cell (MFC) is a renewable energy technology that utilizes the oxidative
decomposition processes of anaerobic microorganisms to convert the chemical energy in …

Secure transmission cryptographic approach for remote-sensing image based on discrete memristor-coupled Rulkov neuron map and TIMG

J Cui, Y Cao, H Jahanshahi, J Mou, B Sun - Multimedia Tools and …, 2024 - Springer
Remote-sensing imagery plays an important role in areas such as geographic information
systems (GIS), environmental monitoring and resource management. In order to enhance …

[引用][C] Enhanced Image Security Through 4D Hyperchaotic System and Hybrid Key Techniques

MNE Farandi, S Winarno… - … Jurnal Sistem Informasi, 2024 - sistemasi.ftik.unisi.ac.id
This study develops a digital image encryption method using a 4D hyperchaotic system
combined with a hybrid key to maximize data security. By generating a random and uniform …