HIGHLIGHTS
- What: The work steps` process and approach are shown in Figure 2. In conjunction with the work of this model, the authors created a random secret key so that the outputs of the classification model are inputs to the fifth stage, which is the encryption stage utilizing AES encryption, as shown in Algorithm 3. The authors investigate the evaluation of the proposed approach from security and performance aspects and provide comparisons with recent research results ([24], ). Figure 3 shows the results of testing the approach (EASPI), where the authors design an attack-resistant system according to the . . .

If you want to have access to all the content you need to log in!
Thanks :)
If you don't have an account, you can create one here.