MJCS 2022
DOI: 10.58496/mjcs/2022/003
|View full text |Cite
|
Sign up to set email alerts
|

Ubiquitous Trust Management and Power Optimization for UAV Assisted Mobile Communication

Abstract: The human being sought to find a human variety of techniques to assure data access with complete confidentiality. The transition from the use of. regular text and audio data to digital media has improved data access and transport. It has become relatively simple to intercept data sent across networks or get access to a variety of machines. Steganography is the study of concealing the existence of communication by embedding hidden data in multimedia payloads such as text, image, audio, and video. This project i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The field of cybersecurity contributes to designing a digital environment free of loopholes and not allowing unauthorized persons to enter this environment. These mechanisms can only be achieved with artificial intelligence techniques that play an influential role in changing and controlling cyber-attacks [20][21][22][23][24][25]. Therefore, the existence of artificial intelligence and effective cybersecurity measures lead to the establishment of a proper digital environment [26][27][28][29][30][31].…”
Section: Cybersecurity Practicesmentioning
confidence: 99%
“…The field of cybersecurity contributes to designing a digital environment free of loopholes and not allowing unauthorized persons to enter this environment. These mechanisms can only be achieved with artificial intelligence techniques that play an influential role in changing and controlling cyber-attacks [20][21][22][23][24][25]. Therefore, the existence of artificial intelligence and effective cybersecurity measures lead to the establishment of a proper digital environment [26][27][28][29][30][31].…”
Section: Cybersecurity Practicesmentioning
confidence: 99%
“…In addition, it concentrates on providing real-time responses to prevent attacks and threats and providing a flawless electronic structure to organize communications between devices and software without any issues. Companies or institutions must provide a cyber deterrent against malicious actions by unauthorized persons or a group of malicious software (viruses) [12][13][14][15]. In fact, it is a strategy developed by companies and institutions to defend their systems and electronic environments through the use of artificial intelligence techniques that have the ability to train on the practices of malicious programs or the paths taken by hackers [16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%