2021
DOI: 10.1109/access.2020.3046528
|View full text |Cite
|
Sign up to set email alerts
|

Detecting the Security Level of Various Cryptosystems Using Machine Learning Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 25 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…In order to improve the accuracy, the presented work also used support vector data description (SVDD) and data visualization techniques. Another review was presented involving comparative analysis of various machine learning algorithms [47], [48]. Results concluded that random-forest (RF) produced the best result in liver disease diagnosis with the balanced data.…”
Section: Introductionmentioning
confidence: 99%
“…In order to improve the accuracy, the presented work also used support vector data description (SVDD) and data visualization techniques. Another review was presented involving comparative analysis of various machine learning algorithms [47], [48]. Results concluded that random-forest (RF) produced the best result in liver disease diagnosis with the balanced data.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, some approaches encrypt critical compression coefficients [39] and others encrypt the interleaved patient information included in images [40], while others encrypt only the important bits of particular coefficients using a stream cipher [41][42][43][44]. However, such security techniques have several vulnerabilities, such as high computational time and weak security, which may also result in data loss and some false negative diagnoses [45][46][47]. Recently, Bouslimi et al [48] proposed a combined watermarking/encryption system in Cipher-block chaining mode (CBC) to secure the integrity of medical images and create a medical image encryption technique by combining a stream cipher algorithm and two sub-stitutive watermarking approaches [48].…”
Section: Related Workmentioning
confidence: 99%
“…1. An increasing number of intelligent systems are based on IoT, and securing these systems is a significant challenge [6][7][8][9][10]. In the current literature, cyber attack detection strategies for smart systems have been shown to be of great value.…”
Section: Introductionmentioning
confidence: 99%