Advanced Cybersecurity Framework for LEO Aerospace: Integrating Quantum Cryptography, Artificial Intelligence Anomaly Detection, and Blockchain Technology
DOI:
https://doi.org/10.18196/jrc.v6i2.25918Keywords:
Quantum Encryption, Artificial Intelligence Anomaly Detection, Blockchain, Aerospace Security, Low Earth Orbit (LEO)Abstract
This study aims to enhance the security of high-speed Low Earth Orbit (LEO) communication systems by developing an integrated, multi-layered security framework that addresses the limitations of current aerospace cybersecurity measures. The primary challenge lies in ensuring real-time data confidentiality, integrity, and authenticity in the face of sophisticated quantum and spoofing threats. To overcome these issues, the research contribution is the design and evaluation of a unified framework that combines quantum-resistant encryption using a FACT system with a Quantis USB quantum random number generator, an LSTM encoder-decoder model for real-time anomaly detection in ADS-B messages, and a blockchain-based mechanism for immutable data logging. The methodology involves benchmarking quantum-enhanced AES against traditional encryption schemes, training the LSTM network to detect subtle anomalies in flight data, and assessing blockchain scalability under high transaction loads. Results indicate significant improvements in encryption speed and detection accuracy—demonstrating up to a 30% increase in anomaly detection performance—while also revealing challenges such as increased computational overhead and scalability limitations in blockchain implementation. The framework shows promise for practical applications in satellite communications and air traffic management, though further research is needed to optimize resource consumption and enhance system resilience under extreme operational conditions.
References
D. Li, J. Li, X. Zhou, J. Hu, X. Wang, and J. Duan, “FACT: An Air-Ground Communication Framework for Seeding Quality Control of Aircraft,” Computer Systems Science and Engineering, vol. 41, no. 2, pp. 539–555, 2022, doi: 10.32604/csse.2022.019551.
X. L. Pang, L. F. Qiao, K. Sun, Y. Liu, A. L. Yang, and X. M. Jin, “Experimental quantum-enhanced cryptographic remote control,” Scientific Reports, vol. 9, no. 1, p. 5809, 2019.
E. Habler and A. Shabtai, “Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages,” Computers & Security, vol. 78, pp. 155–173, Sep. 2018, doi: 10.1016/j.cose.2018.07.004.
M. Leonardi, L. Di Gregorio, and D. Di Fausto, “Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern,” Aerospace, vol. 4, no. 4, p. 51, Oct. 2017, doi: 10.3390/aerospace4040051.
Q. Yan et al., “Real-Time Air-to-Ground Data Communication Technology of Aeroengine Health Management System with Adaptive Rate in the Whole Airspace,” Mathematical Problems in Engineering, vol. 2021, pp. 1–13, Jul. 2021, doi: 10.1155/2021/9912574.
F. Orts, R. Paulavičius, and E. Filatovas, “Improving the implementation of quantum blockchain based on hypergraphs,” Quantum Information Processing, vol. 22, no. 9, Sep. 2023, doi: 10.1007/s11128-023-04096-w.
X. Ying, J. Mazer, G. Bernieri, M. Conti, L. Bushnell, and R. Poovendran, "Detecting ADS-B Spoofing Attacks Using Deep Neural Networks," 2019 IEEE Conference on Communications and Network Security (CNS), pp. 187-195, 2019, doi: 10.1109/CNS.2019.8802732.
M. Bakyt, L. La Spada, N. Zeeshan, K. Moldamurat, and S. Atanov, “Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs,” Applied Sciences, vol. 15, no. 5, p. 2429, Feb. 2025, doi: 10.3390/app15052429.
M. B. Jamshidi et al., “Artificial Intelligence and COVID-19: Deep Learning Approaches for Diagnosis and Treatment,” IEEE Access, vol. 8, pp. 109581–109595, 2020, doi: 10.1109/ACCESS.2020.3001973.
A. N. Carey and J. Zhan, “A Cancelable Multi-Modal Biometric Based Encryption Scheme for Medical Images,” 2021 IEEE International Conference on Big Data (Big Data), pp. 3711–3720, Dec. 2020, doi: 10.1109/bigdata50022.2020.9377901.
A. Perez-Resa, M. Garcia-Bosque, C. Sanchez-Azqueta, and S. Celma, “A New Method for Format Preserving Encryption in High-Data Rate Communications,” IEEE Access, vol. 8, pp. 21003–21016, 2020, doi: 10.1109/access.2020.2968816.
A. Borkowski, “Using Artificial Intelligence for COVID-19 Chest X-ray Diagnosis,” Federal Practitioner, vol. 37, no. 9, Sep. 2020, doi: 10.12788/fp.0045.
M. B. Jamshidi et al., “Deep Learning Techniques and COVID-19 Drug Discovery: Fundamentals, State-of-the-Art and Future Directions,” Studies in Systems, Decision and Control, pp. 9–31, 2021, doi: 10.1007/978-3-030-67716-9_2.
S. Tahir et al., “A Novel Approach to Reduce Breaches of Aircraft Communication Data,” Electronics, vol. 12, no. 1, p. 172, Dec. 2022, doi: 10.3390/electronics12010172.
N. Ali Khan, N. Z. Jhanjhi, S. Nawaz Brohi, A. Ali Almazroi, and A. Ali Almazroi, “A Secure Communication Protocol for Unmanned Aerial Vehicles,” Computers, Materials & Continua, vol. 70, no. 1, pp. 601–618, 2022, doi: 10.32604/cmc.2022.019419.
A. Allouch, O. Cheikhrouhou, A. Koubâa, M. Khalgui, and T. Abbes, “MAVSec: Securing the MAVLink Protocol for Ardupilot/PX4 Unmanned Aerial Systems,” 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019, doi: 10.1109/IWCMC.2019.8766667.
G. Nam, J. Go, C. Kwon, and S. Jeong, “A Study on the Analysis and Improvement of STANAG 4586 / MAVLink Protocol for Interoperability Improvement of UAS,” Journal of the Korea Institute of Military Science and Technology, vol. 23, no. 6, pp. 618–638, Dec. 2020, doi: 10.9766/kimst.2020.23.6.618.
P. Liu, X. Wang, X. Zhao, and S. Unar, “Target-based image encryption via infinite interval chaotic system with Ill-conditioned parameter and 3DBDM,” Expert Systems with Applications, vol. 232, pp. 120811–120811, Jun. 2023, doi: 10.1016/j.eswa.2023.120811.
L. AlSuwaidan and N. Almegren, “Validating the Adoption of Heterogeneous Internet of Things with Blockchain,” Future Internet, vol. 12, no. 6, p. 107, Jun. 2020, doi: 10.3390/fi12060107.
M. Bakyt, K. Moldamurat, D. Satybaldina, and N. Yurkov, “Modeling Information Security Threats for the Terrestrial Segment of Space Communications,” DTESI, 2022.
L. Shao, Y. Zhao, and Y. Liu, “Organic Synaptic Transistors: The Evolutionary Path from Memory Cells to the Application of Artificial Neural Networks,” Advanced Functional Materials, vol. 31, no. 28, pp. 2101951–2101951, Apr. 2021, doi: 10.1002/adfm.202101951.
K. Moldamurat, A. Tulembayeva, A. Ryspaev, N. Belgibekov, L. Peryakina, and M. Bakyt, “Computer program in sign language for controlling mobile objects and communicating with people,” International Journal of Public Health Science (IJPHS), vol. 14, no. 1, p. 502, Mar. 2025, doi: 10.11591/ijphs.v14i1.24544.
K. Moldamurat et al., “Improved unmanned aerial vehicle control for efficient obstacle detection and data protection,” IAES International Journal of Artificial Intelligence, vol. 13, no. 3, pp. 3576–3576, Jul. 2024, doi: 10.11591/ijai.v13.i3.pp3576-3587.
K. Moldamurat, Y. Seitkulov, S. Atanov, M. Bakyt, and B. Yergaliyeva, “Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study,” International Journal of Electrical and Computer Engineering, vol. 14, no. 1, pp. 479–479, Feb. 2024, doi: 10.11591/ijece.v14i1.pp479-487.
M. Bakyt, L. L. Spada, K. Moldamurat, Z. Kadirbek, and F. Yermekov, "Review of Data Security Methods using Low-Earth Orbiters for High-Speed Encryption," 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), pp. 1366-1375, 2024, doi: 10.1109/ICUIS64676.2024.10867245.
M. Bakyt, K. Moldamurat, N. Belgibekov, A. Zhumabayeva, and A. Tilenbayev, “Development and Analysis of the Effectiveness of High-Speed Asymmetric Encryption Methods for Protecting Data from Low-Orbiting Aircraft,” Lecture Notes in Networks and Systems, pp. 189–199, 2025, doi: 10.1007/978-981-97-9327-3_16.
M. Bakyt, K. Moldamurat, A. Konyrkhanova, A. K. Maidanov, and D. Satybaldina, “Integration of Cryptography and Navigation Systems in Unmanned Military Mobile Robots: A Review of Current Trends and Perspectives,” DTESI (workshops, short papers), 2023.
S. Seo et al., “D3GF: A Study on Optimal Defense Performance Evaluation of Drone-Type Moving Target Defense Through Game Theory,” IEEE Access, vol. 11, pp. 59575–59598, Jan. 2023, doi: 10.1109/access.2023.3278744.
M. A. Elsayed, M. Wrana, Z. Mansour, K. Lounis, S. H. H. Ding, and M. Zulkernine, “AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp. 23459–23473, Dec. 2022, doi: 10.1109/tits.2022.3214095.
E. B. Priyanka, S. Thangavel, K. Martin Sagayam, and A. A. Elngar, “Wireless network upgraded with artificial intelligence on the data aggregation towards the smart internet applications,” International Journal of Systems Assurance Engineering and Management, vol. 13, no. 3, pp. 1254–1267, Oct. 2021, doi: 10.1007/s13198-021-01425-z.
A. Vernotte, A. Cretin, B. Legeard, and F. Peureux, “A domain-specific language to design false data injection tests for air traffic control systems,” International Journal on Software Tools for Technology Transfer, vol. 24, no. 2, pp. 127–158, Feb. 2021, doi: 10.1007/s10009-021-00604-4.
H. Yang, Q. Zhou, D. Liu, H. Li, and X. Shen, “AEALV: Accurate and Efficient Aircraft Location Verification for ADS-B,” IEEE Transactions on Cognitive Communications and Networking, vol. 7, no. 4, pp. 1399–1411, Apr. 2021, doi: 10.1109/tccn.2021.3072853.
R. L. Kumar, Q.-V. Pham, F. Khan, Md. J. Piran, and K. Dev, “Blockchain for securing aerial communications: Potentials, solutions, and research directions,” Physical Communication, vol. 47, p. 101390, Aug. 2021, doi: 10.1016/j.phycom.2021.101390.
G. Liu, R. Zhang, Y. Yang, C. Wang, and L. Liu, “GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data,” Distributed and Parallel Databases, vol. 39, no. 1, pp. 231–257, Jun. 2020, doi: 10.1007/s10619-020-07302-1.
C. Zhu, “An Adaptive Cartesian Method for Prediction of the Unsteady Process of Aircraft Ice Accretion,” Communications in Computational Physics, vol. 30, no. 2, pp. 515–535, Jun. 2021, doi: 10.4208/cicp.oa-2018-0228.
M. Usman, R. Amin, H. Aldabbas, and B. Alouffi, “Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography,” Electronics, vol. 11, no. 7, p. 1026, Mar. 2022, doi: 10.3390/electronics11071026.
O. Kodheli et al., “Satellite Communications in the New Space Era: A Survey and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 70–109, 2021, doi: 10.1109/comst.2020.3028247.
S. Khanam, I. B. Ahmedy, M. Y. Idna Idris, M. H. Jaward, and A. Q. Bin Md Sabri, “A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things,” IEEE Access, vol. 8, pp. 219709–219743, 2020, doi: 10.1109/access.2020.3037359.
R. Alabdan, “Phishing Attacks Survey: Types, Vectors, and Technical Approaches,” Future Internet, vol. 12, no. 10, p. 168, Sep. 2020, doi: 10.3390/fi12100168.
D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, and H. V. Poor, “Federated Learning for Internet of Things: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1–1, 2021, doi: 10.1109/comst.2021.3075439.
M. Z. Chowdhury, Md. Shahjalal, S. Ahmed, and Y. M. Jang, “6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions,” IEEE Open Journal of the Communications Society, vol. 1, no. 1, pp. 1–1, 2020, doi: 10.1109/ojcoms.2020.3010270.
Z. Li et al., “Reliable Digital Forensics in the Air,” Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 6, no. 2, pp. 1–25, Jul. 2022, doi: 10.1145/3534598.
D. An, D. Hao, R. Zhao, S. Zhang, J. Lu, and Y. Zhang, “Visually semantic-preserving and people-oriented color image encryption based on cross-plane thumbnail preservation,” Expert Systems with Applications, vol. 233, p. 120931, Dec. 2023, doi: 10.1016/j.eswa.2023.120931.
N. P. Pujari, N. R. Pawar, N. V. Wable, N. G. Ramole, and N. N. Joshi, “Certificateless Public Integrity Checking of Group Shared Data in Cloud Storage,” International Journal of Advanced Research in Science Communication and Technology, pp. 550–556, Nov. 2024, doi: 10.48175/ijarsct-22482.
G. Ye, C. Pan, Y. Dong, Y. Shi, and X. Huang, “Image encryption and hiding algorithm based on compressive sensing and random numbers insertion,” Signal Processing, vol. 172, pp. 107563–107563, Jul. 2020, doi: 10.1016/j.sigpro.2020.107563.
S. Pirandola et al., “Advances in Quantum Cryptography,” Advances in Optics and Photonics, Feb. 2020, doi: 10.1364/aop.361502.
F. Ernst and D. McCarthy, “Workshop Review: Recent workshop explored seismic processing advances for reservoir characterization,” The Leading Edge, vol. 40, no. 11, pp. 839–841, Nov. 2021, doi: 10.1190/tle40110839.1.
W. Wang et al., “Energy-Constrained UAV-Assisted Secure Communications With Position Optimization and Cooperative Jamming,” IEEE Transactions on Communications, vol. 68, no. 7, pp. 4476–4489, Jul. 2020, doi: 10.1109/tcomm.2020.2989462.
Y. Wang et al., “A survey on metaverse: Fundamentals, security, and privacy,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 1–1, 2022, doi: 10.1109/comst.2022.3202047.
M. Tanveer, A. H. Zahid, M. Ahmad, A. Baz, and H. Alhakami, “LAKE-IoD: Lightweight Authenticated Key Exchange Protocol for the Internet of Drone Environment,” IEEE Access, vol. 8, pp. 155645–155659, 2020, doi: 10.1109/access.2020.3019367.
A. I. Hentati and L. C. Fourati, “Comprehensive survey of UAVs communication networks,” Computer Standards & Interfaces, vol. 72, p. 103451, Oct. 2020, doi: 10.1016/j.csi.2020.103451.
S. Li, B. Duo, M. D. Renzo, M. Tao, and X. Yuan, “Robust Secure UAV Communications With the Aid of Reconfigurable Intelligent Surfaces,” IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. 6402–6417, Oct. 2021, doi: 10.1109/twc.2021.3073746.
B. Bera, D. Chattaraj, and A. K. Das, “Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment,” Computer Communications, vol. 153, pp. 229–249, Mar. 2020, doi: 10.1016/j.comcom.2020.02.011.
S. S. Panda, D. Jena, B. K. Mohanta, S. Ramasubbareddy, M. Daneshmand, and A. H. Gandomi, “Authentication and Key Management in Distributed IoT Using Blockchain Technology,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12947–12954, Aug. 2021, doi: 10.1109/jiot.2021.3063806.
W. Y. B. Lim et al., “Federated Learning in Mobile Edge Networks: a Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1–1, 2020, doi: 10.1109/comst.2020.2986024.
Y.-M. Xie et al., “Overcoming the rate–distance limit of device-independent quantum key distribution,” Optics Letters, vol. 46, no. 7, p. 1632, Mar. 2021, doi: 10.1364/ol.417851.
G. Mani and R. Volety, “A comparative analysis of LSTM and ARIMA for enhanced real-time air pollutant levels forecasting using sensor fusion with ground station data,” Cogent Engineering, vol. 8, no. 1, p. 1936886, Jan. 2021, doi: 10.1080/23311916.2021.1936886.
X. Li and S. Zhang, “Network Intrusion Detection Methods Based on Deep Learning,” Recent Patents on Engineering, vol. 14, Apr. 2020, doi: 10.2174/1872212114999200403092708.
D. A. Moses et al., “Neuroprosthesis for Decoding Speech in a Paralyzed Person with Anarthria,” New England Journal of Medicine, vol. 385, no. 3, pp. 217–227, Jul. 2021, doi: 10.1056/nejmoa2027540.
K. Schulte, “‘Real-time’ air quality channels: A technology review of emerging environmental alert systems,” Big Data & Society, vol. 9, no. 1, p. 205395172211013, Jan. 2022, doi: 10.1177/20539517221101346.
N. Mäurer, T. Guggemos, T. Ewert, T. Gräupl, C. Schmitt, and S. Grundner-Culemann, “Security in digital aeronautical communications a comprehensive gap analysis,” International Journal of Critical Infrastructure Protection, vol. 38, p. 100549, 2022.
V. Pecunia, L. G. Occhipinti, A. Chakraborty, Y. Pan, and Y. Peng, “Lead-free halide perovskite photovoltaics: Challenges, open questions, and opportunities,” APL Materials, vol. 8, no. 10, p. 100901, Oct. 2020, doi: 10.1063/5.0022271.
G. Lykou, D. Moustakas, and D. Gritzalis, “Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies,” Sensors, vol. 20, no. 12, p. 3537, Jun. 2020, doi: 10.3390/s20123537.
H. Eissfeldt, “Sustainable Urban Air Mobility Supported with Participatory Noise Sensing,” Sustainability, vol. 12, no. 8, p. 3320, Apr. 2020, doi: 10.3390/su12083320.
G. Lykou, D. Moustakas, and D. Gritzalis, “Defending Airports from UAS: A Survey on Cyber-Attacks and Counter-Drone Sensing Technologies,” Sensors, vol. 20, no. 12, p. 3537, Jun. 2020, doi: https://doi.org/10.3390/s20123537.
H. Kayan, M. Nunes, O. Rana, P. Burnap, and C. Perera, “Cybersecurity of Industrial Cyber-Physical Systems: A Review,” ACM Computing Surveys, vol. 54, no. 11, Jan. 2022, doi: 10.1145/3510410.
O. Kodheli et al., “Satellite Communications in the New Space Era: A Survey and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 1, pp. 70–109, 2021, doi: 10.1109/comst.2020.3028247.
S. Park, H. T. Kim, S. Lee, H. Joo, and H. Kim, “Survey on Anti-Drone Systems: Components, Designs, and Challenges,” IEEE Access, vol. 9, pp. 42635–42659, 2021, doi: 10.1109/access.2021.3065926.
Y. Liu et al., “Zero-Bias Deep Learning for Accurate Identification of Internet-of-Things (IoT) Devices,” IEEE Internet of Things Journal, vol. 8, no. 4, pp. 2627–2634, Feb. 2021, doi: 10.1109/jiot.2020.3018677.
V. Chamola, V. Hassija, V. Gupta, and M. Guizani, “A Comprehensive Review of the COVID-19 Pandemic and the Role of IoT, Drones, AI, Blockchain and 5G in Managing its Impact,” IEEE Access, vol. 8, pp. 1–1, 2020, doi: 10.1109/access.2020.2992341.
J. J. Camarero, “Within- versus between-species size effects on drought-induced dieback and mortality,” Tree Physiology, Dec. 2020, doi: 10.1093/treephys/tpaa167.
B. K. Mohanta, D. Jena, U. Satapathy, and S. Patnaik, “Survey on IoT Security: Challenges and Solution using Machine Learning, Artificial Intelligence and Blockchain Technology,” Internet of Things, vol. 11, p. 100227, May 2020, doi: 10.1016/j.iot.2020.100227.
H.-S. Ye, N.-R. Zhou, and L.-H. Gong, “Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion,” Signal Processing, vol. 175, p. 107652, Oct. 2020, doi: 10.1016/j.sigpro.2020.107652.
S. F. Wamba and M. M. Queiroz, “Blockchain in the operations and supply chain management: Benefits, challenges and future research opportunities,” International Journal of Information Management, vol. 52, no. 2, p. 102064, Jan. 2020, doi: 10.1016/j.ijinfomgt.2019.102064.
S. Shukla, S. Thakur, S. Hussain, J. G. Breslin, and S. M. Jameel, “Identification and Authentication in Healthcare Internet-of-Things Using Integrated Fog Computing Based Blockchain Model,” Internet of Things, vol. 15, p. 100422, Sep. 2021, doi: 10.1016/j.iot.2021.100422.
R. M. Daniel and A. Thomas, “A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks,” Journal of Integrated Design and Process Science, vol. 25, no. 1, pp. 55–77, Apr. 2022, doi: 10.3233/jid-200014.
Z. Wang et al., “Ultralong-lived room temperature phosphorescence from N and P codoped self-protective carbonized polymer dots for confidential information encryption and decryption,” Journal of Materials Chemistry C, vol. 9, no. 14, pp. 4847–4853, 2021, doi: 10.1039/d0tc05845a.
J. Mostafaee, S. Mobayen, B. Vaseghi, M. Vahedi, and A. Fekih, “Complex dynamical behaviors of a novel exponential hyper–chaotic system and its application in fast synchronization and color image encryption,” Science Progress, vol. 104, no. 1, Jan. 2021, doi: 10.1177/00368504211003388.
X. Wang and N.-N. Guan, “2D sine-logistic-tent-coupling map for image encryption,” Journal of Ambient Intelligence and Humanized Computing, vol. 14, no. 10, pp. 13399-13419, Mar. 2022, doi: 10.1007/s12652-022-03794-0.
A. Kolanowska et al., “Carbon Quantum Dots from Amino Acids Revisited: Survey of Renewable Precursors toward High Quantum-Yield Blue and Green Fluorescence,” ACS Omega, vol. 7, no. 45, pp. 41165–41176, Nov. 2022, doi: 10.1021/acsomega.2c04751.
L. Zhang, Y. Zou, M. H. Yousuf, W. Wang, Z. Jin, Y. Su, and S. Kim, “BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment,” KSII Transactions on Internet and Information Systems, vol. 16, no. 5, May 2022, doi: 10.3837/tiis.2022.05.012.
Z. Xu et al., “Aggregation‐Induced Emission Nanoprobes Working in the NIR‐II Region: From Material Design to Fluorescence Imaging and Phototherapy,” Advanced Optical Materials, vol. 9, no. 20, Jul. 2021, doi: 10.1002/adom.202100859.
Y. Jiang et al., “Frequency‐Upconverted Stimulated Emission by Up to Six‐Photon Excitation from Highly Extended Spiro‐Fused Ladder‐Type Oligo(p‐phenylene)s,” Angewandte Chemie International Edition, vol. 60, no. 18, pp. 10007–10015, Jan. 2021, doi: 10.1002/anie.202100542.
M. V. Derkach and O. E. Myshko, “Using AES-256-CBC encryption algorithm to store autonomous assistant authentication data,” Scientific news of Dahl university, 2023, doi: 10.33216/2222-3428-2023-24-1.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Makhabbat Bakyt, Luigi La Spada, Nida Zeeshan, Khuralay Moldamurat, Sabyrzhan Atanov, Assem Konyrkhanova, Nikolay Yurkov, Absalyam Kuanysh, Yertis Marat, Alzhan Tilenbayev

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
This journal is based on the work at https://journal.umy.ac.id/index.php/jrc under license from Creative Commons Attribution-ShareAlike 4.0 International License. You are free to:
- Share – copy and redistribute the material in any medium or format.
- Adapt – remix, transform, and build upon the material for any purpose, even comercially.
The licensor cannot revoke these freedoms as long as you follow the license terms, which include the following:
- Attribution. You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions. You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
• Creative Commons Attribution-ShareAlike (CC BY-SA)
JRC is licensed under an International License