[HTML][HTML] A blockchain security module for brain-computer interface (BCI) with multimedia life cycle framework (MLCF)
A brain-computer interface (BCI) affords real-time communication, significantly improving the
quality of lifecycle, brain-to-internet (B2I) connectivity, and communication between the brain …
quality of lifecycle, brain-to-internet (B2I) connectivity, and communication between the brain …
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
QoS-ledger: Smart contracts and metaheuristic for secure quality-of-service and cost-efficient scheduling of medical-data processing
Quality-of-service (QoS) is the term used to evaluate the overall performance of a service. In
healthcare applications, efficient computation of QoS is one of the mandatory requirements …
healthcare applications, efficient computation of QoS is one of the mandatory requirements …
Educational blockchain: A secure degree attestation and verification traceability architecture for higher education commission
Degree attestation verification and traceability are complex one-to-one processes between
the Higher Education Commission (HEC) and universities. The procedure shifted to the …
the Higher Education Commission (HEC) and universities. The procedure shifted to the …
[HTML][HTML] A Confidentiality-based data Classification-as-a-Service (C2aaS) for cloud security
Rapid development and massive use of Information Technology (IT) have since produced a
massive amount of electronic data. In tandem, the demand for data outsourcing and the …
massive amount of electronic data. In tandem, the demand for data outsourcing and the …
Vehicle to everything (V2X) and edge computing: A secure lifecycle for UAV-assisted vehicle network and offloading with blockchain
Due to globalization and advances in network technology, the Internet of Vehicles (IoV) with
edge computing has gained increasingly more attention over the last few years. The …
edge computing has gained increasingly more attention over the last few years. The …
EPS-Ledger: Blockchain hyperledger sawtooth-enabled distributed power systems chain of operation and control node privacy and security
A distributed power system operation and control node privacy and security are attractive
research questions that deliver electrical energy systems to the participating stakeholders …
research questions that deliver electrical energy systems to the participating stakeholders …
Blockchain-aware distributed dynamic monitoring: a smart contract for fog-based drone management in land surface changes
In this paper, we propose a secure blockchain-aware framework for distributed data
management and monitoring. Indeed, images-based data are captured through drones and …
management and monitoring. Indeed, images-based data are captured through drones and …
Developing a blockchain-based digitally secured model for the educational sector in Saudi Arabia toward digital transformation
S Alangari, SM Alshahrani, NA Khan… - PeerJ Computer …, 2022 - peerj.com
New universities and educational organizations are increasing in Saudi Arabia with the
increase in the need for high-quality education. This increased the need for a fast …
increase in the need for high-quality education. This increased the need for a fast …
A novel robust convolutional neural network for uniform resource locator classification from the view of cyber security
AT Kabakus - Concurrency and Computation: Practice and …, 2023 - Wiley Online Library
Uniform resource locator (URL)‐based cyber‐attacks form a major part of security threats in
cyberspace. Even though the experience and awareness of the end‐users help them protect …
cyberspace. Even though the experience and awareness of the end‐users help them protect …