Open Access
ARTICLE
Alanoud Al Mazroa1, Fahad Masood2, Bakri Hussain Awaji3, Mohammad Alhefdi4, Abeer Aljohani5, Jawad Ahmad6,*
1 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
2 Department of Computer Science, CECOS University of IT and Emerging Sciences, Peshawar, Pakistan
3 Department of Computer Science, Collage of Computer Science and Information Systems, Najran University, Najran, Saudi Arabia
4 Computer Engineering Department, King Khalid University, Abha, Saudi Arabia
5 Department of Computer Science and Informatics, Applied College, Taibah University, Madinah, Saudi Arabia
6 Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia
* Corresponding Author: Jawad Ahmad. Email:
(This article belongs to the Special Issue: Emerging Technologies in Information Security: Modeling, Algorithms, and Applications)
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2026.080134
Received 03 February 2026; Accepted 21 April 2026; Published online 18 May 2026
View
Download
Like
An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
Passent El-kafrawy, Maie Aboghazalah,...SFC Design and VNF Placement Based on Traffic Volume Scaling and VNF Dependency in 5G Networks
Zhihao Zeng, Zixiang Xia, Xiaoning...Intelligent Traffic Scheduling for Mobile Edge Computing in IoT via Deep Learning
Shaoxuan Yun, Ying Chen