[1]
A.S. Abdulbaqi, A.A. Abdulhameed and A.J. Obaid, Cardiopathy symptoms diagnosis based on a secure real-time ECG signal transmission, Int. J. Nonlinear Anal. and Appl. 12(2) (2021) 1353–1370.
Google Scholar
[2]
A.S. Abdulbaqi and R.H. Mahdi, Biometrics detection and recognition based-on geometrical features extraction, In 2018 Int. Conf. Adv. Sustainable Engin. Appl. IEEE, (2018) 59–63.
DOI: 10.1109/icasea.2018.8370956
Google Scholar
[3]
A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for medical image encryption, J. Discrete Math. Sci. Crypt. (2021) 1–11.
DOI: 10.1080/09720529.2021.1884378
Google Scholar
[4]
J.M. Beaver, C.T. Symons, R.E. Gillen, A learning system for discriminating variants of malicious network traffic, 8th Annual Cyber Security and Information Intelligence Research Workshop, (2012) p.1–4.
DOI: 10.1145/2459976.2460003
Google Scholar
[5]
D.S.A. Elminaam, H.M.K. Abdual and M.M. Hadhoud, Evaluating the performance of symmetric encryption algorithms, Int. J. Network Secur. 10(3) (2010) 216–222.
Google Scholar
[6]
N. Gura, A. Patel, A. Wander, H. Eberle and S.C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, M. Joye and J.J. Quisquater (eds), Cryptographic Hardware and Embedded Systems - CHES 2004, 3156 (2004) 119–132.
DOI: 10.1007/978-3-540-28632-5_9
Google Scholar
[7]
A. Khalique, K. Singh and S. Sood, A password-authenticated key agreement scheme based on ECC using smart cards, Int. J. Comput. Appl. 2(3) (2010) 26–30.
DOI: 10.5120/647-903
Google Scholar
[8]
G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud Based IoT Smart Healthcare System for Remote Patient Moni- toring, EAI Endorsed Transactions on Pervasive Health and Technology, 2021.
DOI: 10.4108/eai.15-7-2021.170296
Google Scholar
[9]
P. Mell and T. Grance, The NIST Definition of Cloud Computing, Computer Security Division, Inf. Tech. Lab. Nat. Inst. Stand. Tech. 800(145) (2011).
Google Scholar
[10]
J. Owens and J. Matthews, A study of passwords and methods used in brute-force SSH attacks, USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET), 2008.
Google Scholar
[11]
R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Commun. ACM Magazine 21(2) (1978) 120–126.
DOI: 10.1145/359340.359342
Google Scholar
[12]
S.P. Singh and R. Maini, Comparison of data encryption algorithms, Int. J. Comput. Sci. Commun. 2(1) (2011) 125–127.
Google Scholar
[13]
M. Strebe, Network Security Foundations: Technology Fundamentals for IT Success, Wiley, 2004.
Google Scholar