References
- Abdelfattah, R. I., Mohamed, H., & Nasr, M. E. (2020). Secure image encryption scheme based on DNA and new multi chaotic map. Journal of Physics: Conference Series 1447. 012053 ICaTAS 2019 IOP Publishing
- Abdulraqeb Alselwi. (March 2015). Wireless Security Protocol in DNA Bio-Inspired Network, A thesis submitted in partial fulfillment of the requirements of Liverpool John Moores University for the degree of Master of Philosophy
- Ahmad, Z., Shahid Khan, A., Wai Shiang, C., Abdullah, J., & Ahmad, F. (2021). Network intrusion detection system: A systematic study of machine learning and deep learning approaches. Transactions on Emerging Telecommunications Technologies, 32(1), e4150. https://doi.org/https://doi.org/10.1002/ett.4150
- Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia Economics and Finance, 28, 24–31. ISSN 2212-5671. https://doi.org/https://doi.org/10.1016/S2212-5671(15)01077-1
- Bulusu, S., Kailkhura, B., Li, B., Varshney, P. K., & Song, D. (2020). Anomalous example detection in deep learning: A survey. IEEE Access, 8, 132330–132347. https://doi.org/https://doi.org/10.1109/ACCESS.2020.3010274
- Chen, J., Chen, L., & Zhou, Y. (2020). Cryptanalysis of a DNA-based image encryption scheme. Information Sciences, 520, 130–141. 0020-0255. https://doi.org/https://doi.org/10.1016/j.ins.2020.02.024.
- Cresci, S., Pietro, R. D., Petrocchi, M., Spognardi, A., & Tesconi, M. (2018, July-August 1). Social fingerprinting: detection of spambot groups through DNA-inspired behavioral modeling. IEEE Transactions on Dependable and Secure Computing, 15(4), 561–576. https://doi.org/https://doi.org/10.1109/TDSC.2017.2681672
- Gharib, A., & Ghorbani, A. (2017). DNA-Droid: A real-time android ransomware detection framework. In Z. Yan, R. Molva, W. Mazurczyk, & R. Kantola (Eds.), Network and System Security. NSS 2017. Lecture Notes in Computer Science (Vol. 10394). Springer. https://doi.org/https://doi.org/10.1007/978-3-319-64701-2_14.
- Han, L., Zhang, D., Rana, O., Pan, Y., Jabbar, S., Yousif, M., & Aloqaily, M. (2020). IEEE Access Special Section Editorial: Scalable Deep Learning for Big Data. IEEE Access, 8, 216617–216622. https://doi.org/https://doi.org/10.1109/ACCESS.2020.3041166
- Hossain, S., Alam, R., Biswas, R., & Morimoto, Y. (2016). A DNA cryptographic technique based on dynamic DNA sequence table International Conference on Computer and Information Technology (ICCIT). 51, 270–275. 0169-2607. h ttps://d oi.org/10.1016
- Jenni, K., Khatoon, S., & Aqeel, S. (2013, December). Improve the performance of clustering using combination of multiple clustering algorithms. The International Journal of Data Mining Techniques and Applications, 2(2), 258–265. https://doi.org/https://doi.org/10.20894/IJDMTA.102.002.002.005.
- Kermani, B. G. (2020). METHOD AND APPARATUS FOR DNA-BASED AUTHENTICATION SYSTEM Country: United States Assignee: (LOS ALTOS, CA, US) Number: 20200213304 https://www.freepatentsonline.com/y2020/0213304.html
- Khan, F., Ncube, C., Ramasamy, L. K., Kadry, S., & Nam, Y. (2020). A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access, 8, 119710–119719. https://doi.org/https://doi.org/10.1109/ACCESS.2020.3003785
- Khan, A. S., Ahmad, Z., Abdullah, J., & Ahmad, F. (2021). A spectrogram image-based network anomaly detection system using deep convolutional neural network. IEEE Access, 9, 87079-87093. [9452083]. https://doi.org/https://doi.org/10.1109/ACCESS.2021.3088149
- Mohamed, N., Al-Jaroodi, J., & Jawhar, I. (2020). Cyber-physical systems forensics: Today and tomorrow. Journal of Sensor and Actuator Networks, 9(3), 37. https://doi.org/https://doi.org/10.3390/jsan9030037
- Mor, R., & Kanth, P. (2015). A Review Paper Of DNA Based Cryptographic 1 1 1,2 April, pp. 31–33.
- Mosavi, A., Ardabili, S., & Várkonyi-Kóczy, A. R. (2020). List of deep learning models. In A. Várkonyi-Kóczy (Ed.), Engineering for Sustainable Future. INTER-ACADEMIA 2019. Lecture Notes in Networks and Systems (Vol. 101). Springer. https://doi.org/https://doi.org/10.1007/978-3-030-36841-8_20.
- Muniasamy, A., Tabassam, S., Hussain, M. A., Sultana, H., Muniasamy, V., & Bhatnagar, R. (2019). Deep learning for predictive analytics in healthcare. In: AH, A A, T G, R B, M FT, eds. The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). Cairo, Egypt: Springer International Publishing; 32–42.
- Namasudra, S., Chakraborty, R., Majumder, A., & Moparthi, N. R. (2020). Securing multimedia by using DNA-based encryption in the cloud computing environment. ACM Transaction Multimedia Computer Communication Application, 16(3s), 19. Article 99 (January 2021). https://doi.org/https://doi.org/10.1145/3392665
- Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020). Towards DNA based data security in the cloud computing environment. Computer Communications, 151, 539–547. 0140-3664. https://doi.org/https://doi.org/10.1016/j.comcom.2019.12.041.
- Namasudra, S., Roy, P., Vijayakumar, P., Audithan, S., & Balusamy, B. (2017). Time efficient secure DNA based access control model for cloud computing environment. Future Generation Computer Systems, 73, 90–105. 0167-739X. https://doi.org/https://doi.org/10.1016/j.future.2017.01.017.
- Namasudra, S., Devi, D., Kadry, S., Sundarasekar, R., & Shanthini, A. (2020, February 1). Towards DNA based data security in the cloud computing environment. Computer Communications. 151, 539–547. ELSEVIER. https://doi.org/https://doi.org/10.1116/j.comcom.2019.12.041
- Pan, J., Mao, X., & Li, W. (2016). Taint Inference for Cross-site scripting in context of URL rewriting and HTML sanitization. ETRI Journal, 38(2), 376–386. https://doi.org/https://doi.org/10.4218/etrij.16.0115.0570
- Pan, M., Liu, Y., Cao, J., Li, Y., Li, C., & Chen, C. (2020). Visual recognition based on deep learning for navigation mark classification. IEEE Access, 8, 32767–32775. https://doi.org/https://doi.org/10.1109/ACCESS.2020.2973856
- Rashid, O. F., Othman, Z. A., & Zainudin, S. (2019). Features selection for intrusion detection system based on DNA encoding. In V. Piuri, V. Balas, S. Borah, & S. Syed Ahmad (Eds.), Intelligent and Interactive Computing. Lecture Notes in Networks and Systems (Vol. 67, pp. 323–335). Springer. https://doi.org/https://doi.org/10.1007/978-981-13-6031-2_23.
- Rieback, M. R., Crispo, B., & Tanenbaum, A. S. (2006). Is your cat infected with a computer virus?,” Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06), Pisa, Italy, pp. 10–179, https://doi.org/https://doi.org/10.1109/PERCOM.2006.32.
- Samiullah, M., Aslam, W., Nazir, H., Lali, M. I., Shahzad, B., Mufti, M. R., & Afzal, H. (2020). An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access, 8, 25650–25663. https://doi.org/https://doi.org/10.1109/ACCESS.2020.2970981
- Tabassam, S., Shah, H., Alghamdi, K., & Badshah, A. (2019). Social networks and digital security. 2019 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Swat, Pakistan, pp. 1–7, https://doi.org/https://doi.org/10.1109/ICECCE47252.2019.8940808.
- Tavella, F., Giaretta, A., Conti, M., & Balasubramaniam, S. (2020, September 28). A machine learning-based approach to detect threats in bio-cyber DNA storage systems. arXiv:2009.13380v1 [Cs.cr]. https://arxiv.org/pdf/2009.13380.pdf
- Xin, Y., Kong, L., Liu, Z., Chen, Y., Li, Y., Zhu, H., Gao, M., Hou, H., & Wang, C. (2018). Machine learning and deep learning methods for cybersecurity. IEEE Access, 6, 35365–35381. https://doi.org/https://doi.org/10.1109/ACCESS.2018.2836950
- Zefreh, E. Z. (2020). An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools and Applications, 79(33–34), 24993–25022. https://doi.org/https://doi.org/10.1007/s11042-020-09111-1