Journal articles on the topic 'ML-Enhanced Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 journal articles for your research on the topic 'ML-Enhanced Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Researcher. "AI/ML FOR DATA PRIVACY AND ENCRYPTION IN CLOUD COMPUTING." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 27–43. https://doi.org/10.5281/zenodo.13324415.
Full textMohamed, Tasnem Magdi Hassin, Bander Ali Saleh Al-rimy, and Sultan Ahmed Almalki. "A Ransomware Early Detection Model based on an Enhanced Joint Mutual Information Feature Selection Method." Engineering, Technology & Applied Science Research 14, no. 4 (2024): 15400–15407. http://dx.doi.org/10.48084/etasr.7092.
Full textGuman Singh Chauhan and Rahul Jadon. "AI and ML-Powered CAPTCHA and advanced graphical passwords: Integrating the DROP methodology, AES encryption and neural network-based authentication for enhanced security." World Journal of Advanced Engineering Technology and Sciences 1, no. 1 (2020): 121–32. https://doi.org/10.30574/wjaets.2020.1.1.0027.
Full textGowda, V. Dankan, Shivoham Singh, Pullela SVVSR Kumar, Krishna Kant Dave, Hemant Kothari, and T. Thiruvenkadam. "Optimizing homomorphic encryption for machine learning operations in cloud computing." Journal of Information and Optimization Sciences 46, no. 4-A (2025): 915–25. https://doi.org/10.47974/jios-1817.
Full textGujarathi, Yash, and Yash Potekar. "Machine Learning in Network Traffic Analysis: Classification, Optimization, and Security." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 455–59. https://doi.org/10.22214/ijraset.2025.68216.
Full textKalaiselvi, R. Caroline, and M. Suriakala. "Machine Learning-Based Reconnaissance Bee Colony with Custom AES & AE for Robust IoT Data Security and Transmission." Indian Journal Of Science And Technology 17, no. 46 (2024): 4828–41. https://doi.org/10.17485/ijst/v17i46.3644.
Full textR, Caroline Kalaiselvi, and Suriakala M. "Machine Learning-Based Reconnaissance Bee Colony with Custom AES & AE for Robust IoT Data Security and Transmission." Indian Journal of Science and Technology 17, no. 46 (2024): 4828–41. https://doi.org/10.17485/IJST/v17i46.3644.
Full textAyobami, Miss Adedeji. "Global Cybersecurity Resilience: Advanced Strategies and Emerging Technologies for Protecting Critical Digital Infrastructure." International Journal of Research and Innovation in Social Science VIII, no. VIII (2024): 1547–53. http://dx.doi.org/10.47772/ijriss.2024.8080112.
Full textHamid, Dalia Ebrahim, Hanan M. Amer, Hossam El-Din Salah Moustafa, and Hanaa Salem Marie. "Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1110. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1110-1121.
Full textHamid, Dalia Ebrahim, Hanan M. Amer, Hossam El-Din Salah Moustafa, and Hanaa Salem Marie. "Empowering health data protection: machine learning-enabled diabetes classification in a secure cloud-based IoT framework." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1110–21. https://doi.org/10.11591/ijeecs.v34.i2.pp1110-1121.
Full textBharati, Subrato, and Prajoy Podder. "Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions." Security and Communication Networks 2022 (August 27, 2022): 1–41. http://dx.doi.org/10.1155/2022/8951961.
Full textAliyu Enemosah and Ogbonna George Ifeanyi. "Cloud security frameworks for protecting IoT devices and SCADA systems in automated environments." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 2232–52. https://doi.org/10.30574/wjarr.2024.22.3.1485.
Full textAliyu, Enemosah, and George Ifeanyi Ogbonna. "Cloud security frameworks for protecting IoT devices and SCADA systems in automated environments." World Journal of Advanced Research and Reviews 22, no. 3 (2024): 2232–52. https://doi.org/10.5281/zenodo.14772695.
Full textKamala Kannan Munusamy Ethirajan. "ServiceNow: Boosting Productivity and Innovation in Healthcare, Manufacturing, and Research." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 1 (2025): 982–94. https://doi.org/10.32628/cseit251112101.
Full textUsiabulu, Ehizokhale Jude, Abel Onolunosen Abhadionmhen, and Husseni Iduku. "ML-Powered Privacy Preservation in Biomedical Data Sharing." African Journal of Medicine, Surgery and Public Health Research 2, no. 3 (2025): 389–407. https://doi.org/10.58578/ajmsphr.v2i3.6143.
Full textManne, Tirumala Ashish Kumar. "Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) Techniques." International Journal of Computing and Engineering 3, no. 1 (2022): 45–53. https://doi.org/10.47941/ijce.2764.
Full textAbdel Hakeem, Shimaa A., Hanan H. Hussein, and HyungWon Kim. "Security Requirements and Challenges of 6G Technologies and Applications." Sensors 22, no. 5 (2022): 1969. http://dx.doi.org/10.3390/s22051969.
Full textAravindsundeep Musunuri, (Dr.) Punit Goel, and A Renuka. "Innovations in Multicore Network Processor Design for Enhanced Performance." Innovative Research Thoughts 9, no. 3 (2023): 177–90. http://dx.doi.org/10.36676/irt.v9.i3.1460.
Full textAmos Nyombi, Wycliff Nagalila, Babrah Happy, Mark Sekinobe, and Jimmy Ampe. "Enhancing cybersecurity protocols in tax accounting practices: Strategies for protecting taxpayer information." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 1788–98. http://dx.doi.org/10.30574/wjarr.2024.23.3.2838.
Full textAktas, Fatma, Ibraheem Shayea, Mustafa Ergen, et al. "Routing Challenges and Enabling Technologies for 6G–Satellite Network Integration: Toward Seamless Global Connectivity." Technologies 13, no. 6 (2025): 245. https://doi.org/10.3390/technologies13060245.
Full textAmos, Nyombi, Nagalila Wycliff, Happy Babrah, Sekinobe Mark, and Ampe Jimmy. "Enhancing cybersecurity protocols in tax accounting practices: Strategies for protecting taxpayer information." World Journal of Advanced Research and Reviews 23, no. 3 (2024): 1788–98. https://doi.org/10.5281/zenodo.14950283.
Full textOmar, Omar, and Muhammad Jawad Ikram. "Advanced Threat Detection in Cyber-Physical Systems using Lemurs Optimization Algorithm with Deep Learning." Journal of Cybersecurity and Information Management 15, no. 02 (2025): 87–99. http://dx.doi.org/10.54216/jcim.150208.
Full textAli, Syed Afraz. "Designing Secure and Robust E-Commerce Plaform for Public Cloud." Asian Bulletin of Big Data Management 3, no. 1 (2023): 164–89. http://dx.doi.org/10.62019/abbdm.v3i1.56.
Full textTemitope Oluwatosin Fatunmbi. "Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems." World Journal of Advanced Engineering Technology and Sciences 12, no. 1 (2024): 495–513. https://doi.org/10.30574/wjaets.2024.12.1.0057.
Full textWang, Jue, Usha Pendurthi, and L. Vijaya Mohan Rao. "Alterations in Sphingomyelin Metabolism Influences Tissue Factor Procoagulant Activity and the Release of TF-Positive Microvesicles." Blood 134, Supplement_1 (2019): 1103. http://dx.doi.org/10.1182/blood-2019-125933.
Full textDeepthi Kamidi. "Leveraging Artificial Intelligence for Enhanced Data Protection: A Comprehensive Review of Cloud Security amid Emerging threats." Journal of Information Systems Engineering and Management 10, no. 43s (2025): 16–26. https://doi.org/10.52783/jisem.v10i43s.8291.
Full textSarker, Md Takbir Hossen, Ishtiaque Ahmed, and Md Atiqur Rahaman. "AI-BASED SMART TEXTILE WEARABLES FOR REMOTE HEALTH SURVEILLANCE AND CRITICAL EMERGENCY ALERTS: A SYSTEMATIC LITERATURE REVIEW." American Journal of Scholarly Research and Innovation 2, no. 02 (2023): 01–29. https://doi.org/10.63125/ceqapd08.
Full textVaishali Raut , Prasanna Palsodkar , Mithun G Aush, Bhalchandra M. Hardas ,. "Machine Learning and Enhanced Encryption for Edge Computing in IoT and Wireless Networks." Journal of Electrical Systems 20, no. 1s (2024): 200–210. http://dx.doi.org/10.52783/jes.765.
Full textJ Merlin Florrence. "Integrating Cryptographic Techniques with Machine Learning Algorithms for Enhanced Data Privacy and Information Security: A Mathematical Framework." Communications on Applied Nonlinear Analysis 31, no. 8s (2024): 397–420. http://dx.doi.org/10.52783/cana.v31.1519.
Full textRao, Ganga Rama Koteswara, Hayder M. A. Ghanimi, V. Ramachandran, Dokhyl Al-Qahtani, Pankaj Dadheech, and Sudhakar Sengan. "Enhanced security in federated learning by integrating homomorphic encryption for privacy-protected, collaborative model training." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2 (2024): 361–70. http://dx.doi.org/10.47974/jdmsc-1891.
Full textChaganti, Krishna, and Pavan Paidy. "Strengthening Cryptographic Systems with AI-Enhanced Analytical Techniques." International Journal of Applied Mathematical Research 14, no. 1 (2025): 13–24. https://doi.org/10.14419/fh79gr07.
Full textSelvan, Thirumalai, S. Siva Shankar, S. Sri Nandhini Kowsalya, et al. "Modernizing cloud computing systems with integrating machine learning for multi-objective optimization in terms of planning and security." MATEC Web of Conferences 392 (2024): 01155. http://dx.doi.org/10.1051/matecconf/202439201155.
Full textAnulekshmi, S. "Enhanced WSN security based on Trust-Based Secure Intelligent Opportunistic Routing Protocol in agriculture data transmission sector." RESEARCH REVIEW International Journal of Multidisciplinary 9, no. 12 (2024): 228–44. https://doi.org/10.31305/rrijm.2024.v09.n12.028.
Full textCh., Sowjanya, and D. V. Nagarjana Devi Dr. "Designing an Enhanced Elliptic Curve Cryptography Model for IoT Security in Smart Cities: Integrating Machine Learning for Cyber Attack Detection." May 2, 2025. https://doi.org/10.5281/zenodo.15372412.
Full textS, Thumilvannan, and Balamanigandan R. "DI CVD TRI Layer CX Classifier for Secure IoT Enabled Risk Prediction Model." Journal of Machine and Computing, July 5, 2025, 1571–80. https://doi.org/10.53759/7669/jmc202505124.
Full text"The Impact of Machine Learning Algorithms and Big Data on Privacy in Data Collection and Analysis." Canadian Journal of Business and Information Studies, October 11, 2024, 93–103. http://dx.doi.org/10.34104/ajeit.024.0930103.
Full textISRAT JAHAN, SHOHONI MAHABUB, and MD RUSSEL HOSSAIN. "Optimizing Data analysis and security of Electronic Health Records (EHR): Role in Revolutionization of Machine Learning for Usability interface." Nanotechnology Perceptions, November 5, 2024, 4010–22. https://doi.org/10.62441/nano-ntp.vi.3713.
Full textKang, Seongkweon, Doojin Hong, Biswajit Das, et al. "Ferroelectric Stochasticity in 2D CuInP2S6 and Its Application for True Random Number Generator." Advanced Materials, July 16, 2024. http://dx.doi.org/10.1002/adma.202406850.
Full textPonniah, Krishna Kumar, and Bharathi Retnaswamy. "A novel deep learning based intrusion detection system for the IoT-Cloud platform with blockchain and data encryption mechanisms." Journal of Intelligent & Fuzzy Systems, October 10, 2023, 1–18. http://dx.doi.org/10.3233/jifs-221873.
Full textPatel, Vishva, Hitasvi Shukla, and Aashka Raval. "Enhancing Botnet Detection With Machine Learning And Explainable AI: A Step Towards Trustworthy AI Security." International Journal For Multidisciplinary Research 7, no. 2 (2025). https://doi.org/10.36948/ijfmr.2025.v07i02.39353.
Full textBOPPANA, VENKAT RAVITEJA. "Future Trends in Cloud-based CRM Solutions for Healthcare." EPH-International Journal of Business & Management Science 9, no. 2 (2023). http://dx.doi.org/10.53555/eijbms.v9i2.177.
Full textBellamkonda, Srikanth. "Enhancing Network Security in Healthcare Institutions: Addressing Connectivity and Data Protection Challenges." International Journal of Innovative Research in Computer and Communication Engineering 07, no. 02 (2019). https://doi.org/10.15680/ijircce.2019.0702165.
Full textKabade, Satish, and Akshay Sharma. "Securing Pension Systems with AI-Driven Risk Analytics and Cloud-Native Machine Learning Architectures." April 15, 2024. https://doi.org/10.5281/zenodo.15596984.
Full textJia, Jingna, Dongyang Wang, Xuwen Gao, Yuqi Xu, Xiaoxuan Ren, and Guizheng Zou. "Alkaline-Earth-Metal-Ion Blending Enhanced Mechanoluminescence of Lanthanide Ion in MZnOS Host for Stress Sensing and Anticounterfeiting." Journal of Materials Chemistry C, 2023. http://dx.doi.org/10.1039/d2tc05541d.
Full textT, Thilagam, and Aruna R. "LM-GA: A Novel IDS with AES and Machine Learning Architecture for Enhanced Cloud Storage Security." Journal of Machine and Computing, April 5, 2023, 69–79. http://dx.doi.org/10.53759/7669/jmc202303008.
Full text