Securing Arabic contents algorithm for smart detecting of illegal tampering attacks

被引:0
|
作者
Al Duhayyim, Mesfer [1 ]
Alohali, Manal Abdullah [2 ]
Al-Wesabil, Fahd N. [3 ,4 ]
Hilal, Anwer Mustafa [5 ]
Medani, Mohammad [3 ]
Hamza, Manar Ahmed [5 ]
机构
[1] Department of Natural and Applied Sciences, College of Community - Aflaj, Prince Sattam bin Abdulaziz University, Saudi Arabia
[2] Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Saudi Arabia
[3] Department of Computer Science, King Khalid University, Muhayel Aseer, Saudi Arabia
[4] Faculty of Computer and IT, Sana'a University, Sana'a, Yemen
[5] Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia
来源
Computers, Materials and Continua | 2022年 / 70卷 / 02期
关键词
Compendex;
D O I
暂无
中图分类号
学科分类号
摘要
Hidden Markov models
引用
收藏
页码:2879 / 2894
相关论文
共 50 条
  • [1] Securing Arabic Contents Algorithm for Smart Detecting of Illegal Tampering Attacks
    Al Duhayyim, Mesfer
    Alohali, Manal Abdullah
    Al-Wesabi, Fahd N.
    Hilal, Anwer Mustafa
    Medani, Mohammad
    Hamza, Manar Ahmed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 2879 - 2894
  • [2] An Optimal Text Watermarking Method for Sensitive Detecting of Illegal Tampering Attacks
    Hilal, Anwer Mustafa
    Al-Wesabi, Fahd N.
    Alamgeer, Mohammed
    Hamza, Manar Ahmed
    Mahzari, Mohammad
    Almekhlafi, Murad A.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (03): : 5583 - 5600
  • [3] Smart-Fragile Authentication Scheme for Robust Detecting of Tampering Attacks on English Text
    Alamgeer, Mohammad
    Al-Wesabi, Fahd N.
    Iskandar, Huda G.
    Khan, Imran
    Nemri, Nadhem
    Medani, Mohammad
    Al-Hagery, Mohammed Abdullah
    Al-Sharafi, Ali Mohammed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (02): : 2497 - 2513
  • [4] Securing Smart Grids: Deep Reinforcement Learning Approach for Detecting Cyber-Attacks
    El-Toukhy, Ahmed T.
    Elgarhy, Islam
    Badr, Mahmoud M.
    Mahmoud, Mohamed
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    Amsaad, Fathi
    [J]. 2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [5] Tampering Detection Approach of Arabic-Text Based on Contents Interrelationship
    Al-Wesabi, Fahd N.
    Abdelmaboud, Abdelzahir
    Zain, Adnan A.
    Almazah, Mohammed M.
    Zahary, Ammar
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 27 (02): : 483 - 498
  • [6] SECURITY SYSTEM FOR DETECTING TAMPERING AND THERMAL SIDE CHANNEL ATTACKS
    Vasile, Daniel Ciprian
    Svasta, Paul
    [J]. UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN SERIES C-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE, 2020, 82 (04): : 161 - 172
  • [7] Security system for detecting tampering and thermal side channel attacks
    Vasile, Daniel Ciprian
    Svasta, Paul
    [J]. UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Science, 2020, 82 (04): : 161 - 172
  • [8] Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks
    Salim, Mikail Mohammed
    Singh, Sushil Kumar
    Park, Jong Hyuk
    [J]. APPLIED SOFT COMPUTING, 2021, 113
  • [9] Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping
    Aman, Muhammad Naveed
    Javed, Kashif
    Sikdar, Biplab
    Chua, Kee Chaing
    [J]. 2016 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2016,
  • [10] A Novel Fragile Watermark Algorithm for Detecting Speech Tampering
    Zhao, Xiaoting
    Lu, Wenhuan
    Wei, Jianguo
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 589 - 592