Open Access
ARTICLE
Samer R. Sabbah1, Mohammad Rasmi Al-Mousa1, Ala’a Al-Shaikh2, Ahmad Al Smadi3,*, Suhaila Abuowaida4, Amina Salhi5,*, Arij Alfaidi6
1 Department of Cyber Security, College of Information Technology, Zarqa University, Zarqa, Jordan
2 Cybersecurity Department, Faculty of Science and Information Technology, Al-Zaytoonah University, Amman, Jordan
3 Department of Computer Science, Faculty of Science and Information Technology, Al-Zaytoonah University, Amman, Jordan
4 Department of Data Science and Artificial Intelligence, Faculty of Prince Al-Hussein Bin Abdallah II for IT, Al al-Bayt University, Mafraq, Jordan
5 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
6 Department of Computer Sciences, University College of Duba, University of Tabuk, Tabuk, Saudi Arabia
* Corresponding Author: Ahmad Al Smadi. Email: ; Amina Salhi. Email:
(This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.079241
Received 17 January 2026; Accepted 03 March 2026; Published online 01 April 2026
View
Download
Like
Sailfish Optimizer with EfficientNet Model for Apple Leaf Disease Detection
Mazen Mushabab Alqahtani, Ashit...Deep Learning-Based Program-Wide Binary Code Similarity for Smart Contracts
Yuan Zhuang, Baobao Wang, Jianguo...Crops Leaf Diseases Recognition: A Framework of Optimum Deep Learning Features
Shafaq Abbas, Muhammad Attique...Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...Hybrid Mobile Cloud Computing Architecture with Load Balancing for Healthcare Systems
Ahyoung Lee, Jui Mhatre, Rupak...