Machine Learning Approaches to Mitigate Insider Threats in Electronic Health Records Systems
By Abdullah Alessa, Yaseen Alduwayl, M M Hafizur Rahman
Geometry-Aware Multi-view Malware Detection Using Gromov–Wasserstein Fusion
By VijayKalmani, VedantJadhav, AmerAlqutaish, GhadaAlradwan
Mitigating Information Leakage Risks in Secure Multiparty Computation through Function Hiding
By UditMamodiya, VandanaAhuja, IndraKishor, AmerAlqutaish, RamiShehab, MansourObeidat
A Systematic Literature Review of Blockchain-Enabled Zero Trust Architectures for Secure Non-Terrestrial Networks in 6G Cloud–Edge Environments
By Abdullah Albuali , Huda Aldawghan, Ashwag Alotaibi
