Open Access
ARTICLE
Bassam Al-Shargabi1,*, Mohammed Abbas Fadhil Al-Husainy2, Abdelrahman Abuarqoub1, Omar Albahbouh Aldabbas3
1 Cardiff School of Technologies, Cardiff Metropolitan University, Cardiff, CF23 6XD, UK
2 Networks and Cybersecurity Department, Amman Al Ahliyya University, Amman, 19328, Jordan
3 Faculty of Engineering, Al-Balqa Applied University, Al-Salt, 19117, Jordan
* Corresponding Author: Bassam Al-Shargabi. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.074550
Received 13 October 2025; Accepted 17 December 2025; Published online 29 December 2025
View
Download
Like
Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis
Borja Bordel, Ramón Alcarria,...Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Identity-Based Edge Computing Anonymous Authentication Protocol
Naixin Kang, Zhenhu Ning, Shiqiang...Partially Deep-Learning Encryption Technique
Hamdy M. MousaA Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption
Yongsheng Hu, Liyong Nan