Open Access
ARTICLE
Sohail Khan1,*, Toqeer Ali Syed2, Mohammad Nauman1, Salman Jan3, It Ee Lee4, Qamar Wali4
1 Department of Computer Science, Effat College of Engineering, Effat University, Jeddah, Saudi Arabia
2 Faculty of Computer and Information System, Islamic University of Madinah, Madinah, Saudi Arabia
3 Faculty of Computer Studies, Arab Open University, A’Ali, Bahrain
4 Faculty of Artificial Intelligence and Engineering, Multimedia University, Cyberjaya, Malaysia
* Corresponding Author: Sohail Khan. Email: sohkhan@effatuniversity.edu.sa
(This article belongs to the Special Issue: Artificial Intelligence Methods and Techniques to Cybersecurity)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.075265
Received 28 October 2025; Accepted 31 March 2026; Published online 17 April 2026
View
Download
Like
Security Strategy of Digital Medical Contents Based on Blockchain in Generative AI Model
Hoon Ko, Marek R. OgielaProactive Disentangled Modeling of Trigger–Object Pairings for Backdoor Defense
Kyle Stein, Andrew A. Mahyari,...Optimizing Network Intrusion Detection Performance with GNN-Based Feature Selection
Hoon Ko, Marek R. Ogiela, Libor...