- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Blockchain Technology Applications and Security
- AI in cancer detection
- Internet of Things and AI
- Network Security and Intrusion Detection
- Radiomics and Machine Learning in Medical Imaging
- Smart Agriculture and AI
- Brain Tumor Detection and Classification
- Cryptographic Implementations and Security
University of Manchester
2023
Manchester School of Architecture
2023
Both the act of keeping information secret and research on how to achieve it are included in broad category cryptography. When people refer “information security,” they referring study use methods that make data transfers harder intercept. we talk about this is what have mind. Using private keys encrypt decode messages a part procedure. Because its vital role modern theory, computer security, engineering, cryptography now considered be branch both mathematics science. mathematical...
The prevalence of distributed denial service (DDoS) flooding assaults is one the most serious risks to cloud computing security. These types have as their primary objective exhaustion system’s available resources, that is, target attack, in order make system question unavailable authorized users. Internet thieves often conduct kind known DDoS, focusing primarily on application and network levels. When computer infrastructure multi-mesh-geo distributed, includes multi-parallel services, a...
The farming field is currently going through an upheaval as a consequence of the Internet Things (IoT), which offering farmers respectable spectrum tackles that include precision and sustainable agriculture for confronting problems within industry. IoT technology used to obtain data on ambient conditions soil moisture, air temperature, atmospheric moisture are advantageous enhancement various microorganisms propagation farm-related problems. Farmers' ambition connect their farms from any...
In the evolving landscape of computing environments, fog has emerged as a pivotal technology for handling increasing demands Internet Things (IoT) applications. Fog computing, with its decentralized approach, brings computational power closer to IoT devices, reducing latency and bandwidth constraints. However, this distributed architecture poses significant cybersecurity challenges, necessitating holistic mathematical model ensure security integrity resources. This review presents...
Cloud computing may be described as a collection of software applications and hardware components that are used in tandem to provide users with variety cloud services response their specific needs. ensures significant position the technological business by allowing access from almost any location globe. computing's biggest concerns data privacy integrity. The cloud's distributed nature makes it challenging build unified communication system. Therefore, is crucial establish security measures...