1. Consistent Round Hash optimized SRP-6a-based end-to-end mutual authentication for secure data transfer in industry 4.0”;Sharma,2022
2. The cyber security via determinism”, paradigm for a quantum safe zero trust deterministic internet of things (IoT);Szymanski;IEEE Access,2022
3. The implementation of deep reinforcement learning in e-learning and distance learning: remote practical work;Abdelali El Gourari;Hindawi,2021
4. Lightweight deep learning model to secure authentication in mobile cloud computing;Abdelhakim Zeroual,2022
5. Transfer learning: a friendly introduction;Asmaul Hosna;J Big Data,2022