Asia Othman Aljahdali

ORCID: 0000-0002-9013-9465
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • DNA and Biological Computing
  • Advanced Malware Detection Techniques
  • Digital and Cyber Forensics
  • Advanced Steganography and Watermarking Techniques
  • Cellular Automata and Applications
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Biometric Identification and Security
  • User Authentication and Security Systems
  • Numerical Methods and Algorithms
  • Emotion and Mood Recognition
  • Quantum Information and Cryptography
  • Water Quality and Resources Studies
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Algorithms and Data Compression
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Spam and Phishing Detection
  • Advanced Authentication Protocols Security
  • Digital Media Forensic Detection
  • Network Security and Intrusion Detection

University of Jeddah
2020-2024

King Abdulaziz University
2017

Florida State University
2017

Cloud computing has revolutionized the world, opening up new horizons with bright potential due to its performance, accessibility, low cost, and many other benefits. is on-demand availability of computer system resources, especially data storage (cloud storage) computational power. refers centers accessible numerous customers over Internet. It ability utilize resources at a cost fast speed. security becoming increasingly important as we shift our devices, centers, business processes, assets...

10.1080/01969722.2023.2175117 article EN Cybernetics & Systems 2023-02-15

Abstract Cryptography is a scientific method that used to transmit secret information. In contrast, quantum cryptography depends on physical laws encrypt information; when the computer appeared, classic encryption becomes inefficient. The commonly distribute keys, process called as key distribution (QKD). this paper, we consider efficiency of compared classical methods. Also, discuss security QKD against several attacks and provide analysis based probabilistic models. Additionally, paper...

10.1002/spy2.111 article EN Security and Privacy 2020-05-28

Information security has become increasingly challenging as a result of massive advancements in information and communication technologies. Due to the necessity exchanging private open nature network, there is an increased risk various types attacks. Consequently, data essential component communication. One most effective methods used achieve secrecy steganography. This method hides within cover object without raising suspicion. The level improved when two steganography are combined....

10.7717/peerj-cs.1379 article EN cc-by PeerJ Computer Science 2023-05-16

The rapid growth of electronic assessment in various fields has led to the emergence issues such as user identity fraud and cheating. One potential solution these problems is use a complementary authentication method, behavioral biometric characteristic that unique each individual. promising approach keystroke dynamics, which involves analyzing typing patterns users. In this research, Deep Belief Nets (DBN) model used implement dynamic technique for secure e-assessment. proposed system...

10.48084/etasr.5841 article EN Engineering Technology & Applied Science Research 2023-06-02

Environmental monitoring devices based on IoT collect a large amount of data about the environment and our surroundings. These are collected processed before being uploaded to third-party servers accessed viewed by ordinary or specialized users. However, they may hold sensitive information that should not be exposed unauthorized Therefore, accessing this must strictly controlled limited in order prevent access. This research intends create an access control mechanism distributed ledger...

10.48084/etasr.6193 article EN cc-by Engineering Technology & Applied Science Research 2023-10-13

10.33436/v31i2y202102 article EN cc-by-nc Revista Română de Informatică și Automatică 2021-06-25

Cyber-attacks using malicious uniform resource locator (URL) propagation are very common and serious. Statistics indicate that there is a need to research apply techniques methods for identifying preventing URLs. The main objective of this train machine learning models on selected dataset predict phishing websites based URL-related features. accuracy level each model measured compared. Finally, the best performing will be used develop web application provide internet users with an easy way...

10.1080/19393555.2023.2193350 article EN Information Security Journal A Global Perspective 2023-03-28

DNA steganography is a technique for securely transmitting important data using sequences. It involves encrypting and hiding messages within sequences to prevent unauthorized access decoding of sensitive information. Biometric systems, such as fingerprinting iris scanning, are used individual recognition. Since biometric information cannot be changed if compromised, it essential ensure its security. This research aims develop secure that combines cryptography protect fingerprint images...

10.7717/peerj-cs.1847 article EN cc-by PeerJ Computer Science 2024-03-19

Information security is earning more attention due to the increase in size of data being exchanged over network. One suggested solutions preserve secrecy cryptography information by turning them into codes before transfer. The stenographic technique another way protect information, and it based on hiding from advisory. Cryptography steganography are methods that allow be sent securely. Current studies suggest integration techniques will provide confidentiality compared with application each...

10.1145/3440749.3442639 article EN 2020-11-26

Abstract Generating pseudorandom numbers is a prerequisite for many areas including Monte Carlo simulation and randomized algorithms. The performance of number generators (PRNGs) depends on the quality generated random sequences. They must be quickly have good statistical properties. Several test suites been developed to evaluate single stream such as those from TestU01 library, DIEHARD suite, tests SPRNG package, set designed bit sequences at NIST. This paper presents new generation scheme...

10.1515/mcma-2017-0105 article EN Monte Carlo Methods and Applications 2017-05-20

IoT devices are known to be small, with limited computational and energy capacity. The proliferation of these connected the vulnerabilities resulted from their limitations could lead threats such as leakage sensitive information privacy breach problems. amount data generated transmitted through is substantial, where this can accessed by external entities. Therefore, it necessary have an encryption-based system that guarantees security unauthorized access. In paper, we propose Ciphertext...

10.1145/3440749.3442598 article EN 2020-11-26

10.33436/v31i3y202107 article RO cc-by-nc Revista Română de Informatică și Automatică 2021-09-30

Abstract DNA steganography is a technique that utilizes the sequence as basis for secure transmission of critical data. This consists mainly encrypting and hiding messages within high capacity sequences in order to prevent adversaries from reading decoding secret messages. However, biometric system technological recognition processes information about an individual distinguish them. Biometrics are used many applications, including fingerprinting, iris scanning, face recognition. research...

10.21203/rs.3.rs-2450849/v1 preprint EN cc-by Research Square (Research Square) 2023-01-12

10.5281/zenodo.4249407 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2020-11-06

10.1504/ijesdf.2022.10044312 article EN International Journal of Electronic Security and Digital Forensics 2022-01-01

This study provides an insight into one of digital forensics' needs by analysing big data. Digital forensics is the branches forensic science specialised in recovering data from devices for investigation purposes computer crime or other goals. The shows that main challenges faced investigators are those relating to storage, management, and analysis a large amount various types, including organised semi-organised. Investigators rely on specific tools handle like Hadoop, Spark Apache, SAS....

10.1504/ijesdf.2022.126454 article EN International Journal of Electronic Security and Digital Forensics 2022-01-01
Coming Soon ...