Published: 2024-09-02

AI-Powered Cyber Threats: A Systematic Review

Mafaz Alanezi, Ruah Mouad Alyas AL-Azzawi

166-188

Design and Practical Implementation of a Stream Cipher Algorithm Based on a Lorenz System

Hayder Mazin Makki Alibraheemi , Mazen M. A. Al Ibraheemi , Zainb Hassan Radhy

136-151

An optimized model for network intrusion detection in the network operating system environment

Abbas A. Abdulhameed , Sundos A. Hameed Alazawi, Ghassan Muslim Hassan

75-85

A New Lightweight Cryptosystem for IoT in Smart City Environments

Firas Hazzaa, Md Mahmudul Hasan, Akram Qashou, Sufian Yousef

46-58

Dental segmentation via enhanced YOLOv8 and image processing techniques

Dhiaa Mohammed Abed , Shuzlina Abdul-Rahman , Sofianita Mutalib

189-202