咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 1 篇 cipher text
  • 1 篇 optimization
  • 1 篇 symmetric
  • 1 篇 non-dominated so...
  • 1 篇 malware
  • 1 篇 encoding
  • 1 篇 convolutional ne...
  • 1 篇 cryptography
  • 1 篇 data security
  • 1 篇 hyper-parameter
  • 1 篇 file encryption
  • 1 篇 message attack
  • 1 篇 hill matrix
  • 1 篇 decoding
  • 1 篇 replay attack
  • 1 篇 encryption
  • 1 篇 64-bit encryptio...
  • 1 篇 cryptology
  • 1 篇 matrix cipher

机构

  • 3 篇 department of na...
  • 3 篇 department of in...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of co...
  • 1 篇 department of el...
  • 1 篇 department of in...
  • 1 篇 department of co...
  • 1 篇 department of in...
  • 1 篇 faculty of compu...
  • 1 篇 school of electr...

作者

  • 3 篇 saman riaz
  • 3 篇 badr almutairi
  • 3 篇 sultan almotairi
  • 3 篇 ali arshad
  • 3 篇 ashit kumar dutt...
  • 2 篇 muhammad nadeem
  • 2 篇 syeda wajiha zah...
  • 2 篇 zaid alzaid
  • 1 篇 afia zafar
  • 1 篇 rana alabdan
  • 1 篇 abdulrahman alru...
  • 1 篇 muhammad abu bak...
  • 1 篇 muhammad aamir
  • 1 篇 nazri mohd nawi

语言

  • 3 篇 英文
检索条件"作者=Badr Almutairi"
3 条 记 录,以下是1-10 订阅
排序:
An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 589-616页
作者: Syeda Wajiha Zahra Muhammad Nadeem Ali Arshad Saman Riaz Muhammad Abu Bakr Ashit Kumar Dutta Zaid Alzaid badr almutairi Sultan Almotairi Department of Computer Science Alhamd Islamic UniversityIslamabad44000Pakistan Department of Computer Science and Technology University of Science and Technology BeijingBeijing100083China Department of Computer Science National University of TechnologyIslamabad44000Pakistan Department of Electrical Engineering National University of TechnologyIslamabad44000Pakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic University of MadinahMedinah42351Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3065-3089页
作者: Ali Arshad Muhammad Nadeem Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan badr almutairi Sultan Almotairi Department of Computer Science National University of TechnologyIslamabadPakistan Department of Computing Abasyn UniversityIslamabadPakistan Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Saudi Arabia Department of Computer Science Faculty of Computer and Information SystemsIslamic university of MadinahMedinah42351Saudi Arabia Department of Information Systems Faculty of Computer and Information Sciences CollegeMajmaah University11952Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah 11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an *** cryptography is th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Optimization Approach for Convolutional Neural Network Using Non-Dominated Sorted Genetic Algorithm-Ⅱ
收藏 引用
Computers, Materials & Continua 2023年 第3期74卷 5641-5661页
作者: Afia Zafar Muhammad Aamir Nazri Mohd Nawi Ali Arshad Saman Riaz Abdulrahman Alruban Ashit Kumar Dutta badr almutairi Sultan Almotairi Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaMalaysia School of Electronics Computing and MathematicsUniversity of DerbyUK Department of Computer Science National University of TechnologyIslamabadPakistan Department of Information Technology College of Computer and Information SciencesMajmaah UniversityAl Majmaah11952Saudi Arabia Department of Computer Science and Information Systems College of Applied SciencesAlMaarefa UniversityRiyadh13713Kingdom of Saudi Arabia Department of Information Technology College of Computer Sciences and Information Technology CollegeMajmaah UniversityAl-Majmaah11952Saudi Arabia Department of Natural and Applied Sciences Faculty of Community CollegeMajmaah UniversityMajmaah11952Saudi Arabia Department of Information Systems Faculty of Computer and Information SciencesIslamic University of MadinahMadinah42351Saudi Arabia
In computer vision,convolutional neural networks have a wide range of *** representmost of today’s data,so it’s important to know how to handle these large amounts of data *** neural networks have been shown to solv... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论