
<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/themes/root/assets/xsl/rss.xsl"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Results for (( code detection algorithm ) OR ( secure encryption algorithm ))*</title>
    <description>Showing 1 - 42 results of 42</description>
    <generator>Laminas_Feed_Writer 2 (https://getlaminas.org)</generator>
    <link>https://asren-aggregator.asren.net/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;lookfor=%28%28+code+detection+algorithm+%29+OR+%28+secure+encryption+algorithm+%29%29%2A&amp;type=AllFields&amp;lng=en</link>
    <opensearch:totalResults>42</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="%28%28%20code%20detection%20algorithm%20%29%20OR%20%28%20secure%20encryption%20algorithm%20%29%29%2A" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" title="Go to First Page" href="https://asren-aggregator.asren.net/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%28%28+code+detection+algorithm+%29+OR+%28+secure+encryption+algorithm+%29%29%2A&amp;type=AllFields&amp;lng=en"/>
    <atom:link rel="last" type="application/rss+xml" title="Go to Last Page" href="https://asren-aggregator.asren.net/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%28%28+code+detection+algorithm+%29+OR+%28+secure+encryption+algorithm+%29%29%2A&amp;type=AllFields&amp;lng=en"/>
    <atom:link rel="self" type="application/rss+xml" href="https://asren-aggregator.asren.net/Search/Results?sort=last_indexed+desc&amp;limit=50&amp;view=rss&amp;lookfor=%28%28+code+detection+algorithm+%29+OR+%28+secure+encryption+algorithm+%29%29%2A&amp;type=AllFields&amp;lng=en"/>
    <item>
      <title>Application of particle swarm optimization algorithm to multiuser detection in CDMA</title>
      <pubDate>Sat, 01 Jan 2005 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_16e4f8a2264202ff5f270982a67a68a8</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_16e4f8a2264202ff5f270982a67a68a8</guid>
      <author>El-Mora, H.H.</author>
      <dc:format>article</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>El-Mora, H.H.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Downlink channel estimation for IMT-DS</title>
      <pubDate>Mon, 01 Jan 2001 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_19bef827b046573fa30ac869c91d5344</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_19bef827b046573fa30ac869c91d5344</guid>
      <author>Faisal, S.</author>
      <dc:format>article</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Faisal, S.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>BIT-SLICE MICROPROCESSOR-BASED COMMUNICATIONS DECODER</title>
      <pubDate>Wed, 01 Jan 2020 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_26fb6550f63f277de8c315590d3a93ca</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_26fb6550f63f277de8c315590d3a93ca</guid>
      <author>SOOMRO, AA</author>
      <dc:format>article</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>SOOMRO, AA</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A Hardware Model of an Expandable RSA Cryptogrsphic System</title>
      <pubDate>Thu, 01 Jan 1998 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_545c20322945f72df7761077f2b56fe5</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_545c20322945f72df7761077f2b56fe5</guid>
      <author>Gutub, Adnan</author>
      <dc:format>masterThesis</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Gutub, Adnan</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A decoding algorithm for I-Q space-time coded systems in fadingenvironments</title>
      <pubDate>Sat, 01 Jan 2000 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_d6951c7fa6606468419cc928077476a5</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_d6951c7fa6606468419cc928077476a5</guid>
      <author>Zummo, S.A.</author>
      <dc:format>article</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Zummo, S.A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A GENERAL REAL-TIME DECODER BASED ON AMD2900 DEVICES</title>
      <pubDate>Wed, 01 Jan 2020 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_e9d59241bf475ab1dc7c399840a952f1</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_e9d59241bf475ab1dc7c399840a952f1</guid>
      <author>SOOMRO, AA</author>
      <dc:format>article</dc:format>
      <dc:date>2020</dc:date>
      <dc:creator>SOOMRO, AA</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hardware Model of an Expandable RSA Cryptographic System</title>
      <pubDate>Thu, 01 Jan 1998 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/KFUPM_edd206325825b17bd0c8866521255d71</link>
      <guid>https://asren-aggregator.asren.net/Record/KFUPM_edd206325825b17bd0c8866521255d71</guid>
      <author>Gutub, Adnan</author>
      <dc:format>masterThesis</dc:format>
      <dc:date>1998</dc:date>
      <dc:creator>Gutub, Adnan</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Attacking ElGamal based cryptographic algorithms using Pollard's rho algorithm</title>
      <pubDate>Sat, 01 Jan 2005 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_087c6c54668d669b9c754f93b4438098</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_087c6c54668d669b9c754f93b4438098</guid>
      <author>El-Kassar, A. N.</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>El-Kassar, A. N.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Scrambled Prime Key Encryption</title>
      <pubDate>Mon, 01 Jan 2018 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_1dd259131a796de60ebef8d671408e3f</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_1dd259131a796de60ebef8d671408e3f</guid>
      <author>Haraty, Ramzi A.</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Haraty, Ramzi A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Improving the Secure Socket Layer Protocol by modifying its Authentication function</title>
      <pubDate>Sun, 01 Jan 2017 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_1f06320530cc2e5a24bb8361a746fa40</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_1f06320530cc2e5a24bb8361a746fa40</guid>
      <author>El-Kassar, A. N.</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2017</dc:date>
      <dc:creator>El-Kassar, A. N.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Axes-Based Encryption Key</title>
      <pubDate>Mon, 01 Jan 2018 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_25f6ddd7d70f7bafc9bbc3a30fdee8bd</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_25f6ddd7d70f7bafc9bbc3a30fdee8bd</guid>
      <author>Haidar, Imane</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Haidar, Imane</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A hybrid cryptosystem based on WEP for 802.11 networks. (c2006)</title>
      <pubDate>Sun, 01 Jan 2006 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_4bac1e6315aef3dc355e1afc5b96a3d2</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_4bac1e6315aef3dc355e1afc5b96a3d2</guid>
      <author>Horr, Walid Majed</author>
      <dc:format>masterThesis</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Horr, Walid Majed</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A Comparative Study of Elgamal Based Cryptographic Algorithms</title>
      <pubDate>Thu, 01 Jan 2004 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_56847fbf7ffc406a4700eb4d34e40594</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_56847fbf7ffc406a4700eb4d34e40594</guid>
      <author>Haraty, Ramzi A.</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Haraty, Ramzi A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hardening the ElGamal cryptosystem in the setting of the second group of units. (c2011)</title>
      <pubDate>Sat, 01 Jan 2011 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_7116f7f159ea7326b37057d83bb80825</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_7116f7f159ea7326b37057d83bb80825</guid>
      <author>Fanous, Suzan Mohamad</author>
      <dc:format>masterThesis</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Fanous, Suzan Mohamad</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Improving the security of SNMP in wireless networks</title>
      <pubDate>Sun, 01 Jan 2017 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_844efba9524669b961e00ace2175b214</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_844efba9524669b961e00ace2175b214</guid>
      <author>Otrok, H.</author>
      <dc:format>conferenceObject</dc:format>
      <dc:date>2017</dc:date>
      <dc:creator>Otrok, H.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hardening the ElGamal Cryptosystem in the Setting of the Second Group of Units</title>
      <pubDate>Wed, 01 Jan 2014 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_f405cc441e8accfdb24a4781bbf0d858</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_f405cc441e8accfdb24a4781bbf0d858</guid>
      <author>ElKassar, AbdulNasser</author>
      <dc:format>article</dc:format>
      <dc:date>2014</dc:date>
      <dc:creator>ElKassar, AbdulNasser</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>UML-based regression testing for OO software</title>
      <pubDate>Fri, 01 Jan 2010 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_f8e4c009922d337cf541e0488d1a9fff</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_f8e4c009922d337cf541e0488d1a9fff</guid>
      <author>Mansour, Nashat</author>
      <dc:format>article</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Mansour, Nashat</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A hybrid cryptosystem based on WEP for 802.11 networks</title>
      <pubDate>Sun, 01 Jan 2006 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_fa1be22ff72c65ca8fa3c1eccc8c9579</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_fa1be22ff72c65ca8fa3c1eccc8c9579</guid>
      <author>Haraty, Ramzi A.</author>
      <dc:format>article</dc:format>
      <dc:date>2006</dc:date>
      <dc:creator>Haraty, Ramzi A.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Security testing and evaluation of cryptography algorithms. (c2003)</title>
      <pubDate>Wed, 01 Jan 2003 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/LAURepo_fd2ce7e79de5f8b30d2d910bfa847d04</link>
      <guid>https://asren-aggregator.asren.net/Record/LAURepo_fd2ce7e79de5f8b30d2d910bfa847d04</guid>
      <author>Otrok, Hady Ahmad</author>
      <dc:format>masterThesis</dc:format>
      <dc:date>2003</dc:date>
      <dc:creator>Otrok, Hady Ahmad</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A novel encryption algorithm using multiple semifield S-boxes based on permutation of symmetric group</title>
      <pubDate>Sun, 01 Jan 2023 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_25fd1cb3f0fe64e57a50919f3acdf630</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_25fd1cb3f0fe64e57a50919f3acdf630</guid>
      <author>Iqtadar Hussain (14147850)</author>
      <dc:date>2023</dc:date>
      <dc:creator>Iqtadar Hussain (14147850)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Identity and Aggregate Signature-Based Authentication Protocol for IoD Deployment Military Drone</title>
      <pubDate>Fri, 01 Jan 2021 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_3238a79679eb637fc5628afdf27b6df7</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_3238a79679eb637fc5628afdf27b6df7</guid>
      <author>Saeed Ullah Jan (9079260)</author>
      <dc:date>2021</dc:date>
      <dc:creator>Saeed Ullah Jan (9079260)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer</title>
      <pubDate>Tue, 01 Jan 2019 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_3bd5014590e517b6e8ff5c47194ea82b</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_3bd5014590e517b6e8ff5c47194ea82b</guid>
      <author>M. Z. Yildiz (16855476)</author>
      <dc:date>2019</dc:date>
      <dc:creator>M. Z. Yildiz (16855476)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_3f011bd49d5622c3428b3b801d594b64</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_3f011bd49d5622c3428b3b801d594b64</guid>
      <author>Temadher Alassiry Al-Maadeed (14147847)</author>
      <dc:date>2022</dc:date>
      <dc:creator>Temadher Alassiry Al-Maadeed (14147847)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>From Collatz Conjecture to chaos and hash function</title>
      <pubDate>Sun, 01 Jan 2023 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_412dbfdba027a06534708d542c6d41ae</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_412dbfdba027a06534708d542c6d41ae</guid>
      <author>Masrat Rasool (17807813)</author>
      <dc:date>2023</dc:date>
      <dc:creator>Masrat Rasool (17807813)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>MSLP: mRNA subcellular localization predictor based on machine learning techniques</title>
      <pubDate>Sun, 01 Jan 2023 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_502e5b08c806cb18bd0ade64fc497764</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_502e5b08c806cb18bd0ade64fc497764</guid>
      <author>Saleh Musleh (15279190)</author>
      <dc:date>2023</dc:date>
      <dc:creator>Saleh Musleh (15279190)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure and Anonymous Communications Over Delay Tolerant Networks</title>
      <pubDate>Wed, 01 Jan 2020 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_55b4849bb89db89db8e333a567069463</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_55b4849bb89db89db8e333a567069463</guid>
      <author>Spiridon Bakiras (16896408)</author>
      <dc:date>2020</dc:date>
      <dc:creator>Spiridon Bakiras (16896408)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm</title>
      <pubDate>Sun, 01 Jan 2023 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_5fa46e32f9f399f011b0588e818c9a11</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_5fa46e32f9f399f011b0588e818c9a11</guid>
      <author>M Baritha Begum (17541483)</author>
      <dc:date>2023</dc:date>
      <dc:creator>M Baritha Begum (17541483)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_66b4eaac4e0984c23aac9ad83e49b251</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_66b4eaac4e0984c23aac9ad83e49b251</guid>
      <author>Shahid Rahman (16904613)</author>
      <dc:date>2022</dc:date>
      <dc:creator>Shahid Rahman (16904613)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Secure Storage of Crypto Wallet Seed Phrase Using ECC and Splitting Technique</title>
      <pubDate>Mon, 01 Jan 2024 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_7a21ada2dad12f9204333c366a99f4f9</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_7a21ada2dad12f9204333c366a99f4f9</guid>
      <author>Syeda Tayyaba Bukhari (21842078)</author>
      <dc:date>2024</dc:date>
      <dc:creator>Syeda Tayyaba Bukhari (21842078)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey</title>
      <pubDate>Mon, 01 Jan 2024 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_94aa55bcf1ff9708cf3d6e191fd53df9</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_94aa55bcf1ff9708cf3d6e191fd53df9</guid>
      <author>Faria Nawshin (21841598)</author>
      <dc:date>2024</dc:date>
      <dc:creator>Faria Nawshin (21841598)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Image Local Features Description Through Polynomial Approximation</title>
      <pubDate>Tue, 01 Jan 2019 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_97ab5b4bbcd227bd89aac6d86b5e97c0</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_97ab5b4bbcd227bd89aac6d86b5e97c0</guid>
      <author>Fawad - (17018015)</author>
      <dc:date>2019</dc:date>
      <dc:creator>Fawad - (17018015)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Developing an online hate classifier for multiple social media platforms</title>
      <pubDate>Wed, 01 Jan 2020 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_9ba2b85d9d7c5f916ef917bef2c79020</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_9ba2b85d9d7c5f916ef917bef2c79020</guid>
      <author>Joni Salminen (7434770)</author>
      <dc:date>2020</dc:date>
      <dc:creator>Joni Salminen (7434770)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Left Ventricular Wall Motion Estimation by Active Polynomials for Acute Myocardial Infarction Detection</title>
      <pubDate>Wed, 01 Jan 2020 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_a7d928fd957fc930134ecc77b2edba8b</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_a7d928fd957fc930134ecc77b2edba8b</guid>
      <author>Serkan Kiranyaz (3762058)</author>
      <dc:date>2020</dc:date>
      <dc:creator>Serkan Kiranyaz (3762058)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks</title>
      <pubDate>Sun, 01 Jan 2023 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_b0de15c58997b4308c1fc73d08be25a7</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_b0de15c58997b4308c1fc73d08be25a7</guid>
      <author>Khalid Saeed (8045627)</author>
      <dc:date>2023</dc:date>
      <dc:creator>Khalid Saeed (8045627)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Privacy Preserving Cancellable Template Generation for Crypto-Biometric Authentication System</title>
      <pubDate>Wed, 01 Jan 2025 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_c54743382b455f3b45a8aa6eade46e45</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_c54743382b455f3b45a8aa6eade46e45</guid>
      <author>Mohd Imran (12249782)</author>
      <dc:date>2025</dc:date>
      <dc:creator>Mohd Imran (12249782)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>New Dimensions for Physical Layer Secret Key Generation: Excursion Lengths-Based Key Generation</title>
      <pubDate>Mon, 01 Jan 2024 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_d3266068776099f99b494199e67c7d12</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_d3266068776099f99b494199e67c7d12</guid>
      <author>Muhammad Adil (4899082)</author>
      <dc:date>2024</dc:date>
      <dc:creator>Muhammad Adil (4899082)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_dd8e0600fc4fdf93ce1de645e50c7c51</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_dd8e0600fc4fdf93ce1de645e50c7c51</guid>
      <author>Zakaria Tolba (16904718)</author>
      <dc:date>2022</dc:date>
      <dc:creator>Zakaria Tolba (16904718)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review</title>
      <pubDate>Mon, 01 Jan 2024 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/Manara2_e75ccb2b52e194fd091e99e4da085e91</link>
      <guid>https://asren-aggregator.asren.net/Record/Manara2_e75ccb2b52e194fd091e99e4da085e91</guid>
      <author>Yazeed Yasin Ghadi (16667109)</author>
      <dc:date>2024</dc:date>
      <dc:creator>Yazeed Yasin Ghadi (16667109)</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>CNN and HEVC Video Coding Features for Static Video Summarization</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/aus_9faa2598904e365052d8e9e86171ab54</link>
      <guid>https://asren-aggregator.asren.net/Record/aus_9faa2598904e365052d8e9e86171ab54</guid>
      <author>Issa, Obada</author>
      <dc:format>article</dc:format>
      <dc:date>2022</dc:date>
      <dc:creator>Issa, Obada</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Automatic Video Summarization Using HEVC and CNN Features</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/aus_a05dec13887a15e9dd83508e4c5058a5</link>
      <guid>https://asren-aggregator.asren.net/Record/aus_a05dec13887a15e9dd83508e4c5058a5</guid>
      <author>Issa, Obada</author>
      <dc:format>doctoralThesis</dc:format>
      <dc:date>2022</dc:date>
      <dc:creator>Issa, Obada</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures</title>
      <pubDate>Fri, 01 Jan 2021 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/budr_94fdc801058e7187445252e23ba4dec9</link>
      <guid>https://asren-aggregator.asren.net/Record/budr_94fdc801058e7187445252e23ba4dec9</guid>
      <author>JUMA, MAZEN GHAZI</author>
      <dc:date>2021</dc:date>
      <dc:creator>JUMA, MAZEN GHAZI</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Analysis of Using Machine Learning to Enhance the Efficiency of Facilities Management in the UAE</title>
      <pubDate>Sat, 01 Jan 2022 10:29:33 -0500</pubDate>
      <link>https://asren-aggregator.asren.net/Record/budr_e50db5599c76c148dfaef3c7b64c3497</link>
      <guid>https://asren-aggregator.asren.net/Record/budr_e50db5599c76c148dfaef3c7b64c3497</guid>
      <author>ULLAH, SAAD</author>
      <dc:date>2022</dc:date>
      <dc:creator>ULLAH, SAAD</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
