https://plomscience.com/journals/index.php/PLOMSAI/issue/feed PLOMS AI 2025-05-16T06:31:49-07:00 PLOMS AI [email protected] Open Journal Systems <p><strong>PLOMS AI </strong>is a comprehensive journal aiming to proceed science-society interactions . The open access strategy offers increased vulnerability of the research and help in dissemination of research results, as well. We believe that all accurate scientific results have to be published and disseminated by being freely accessible to all.<br /><br /><strong>PLOMS AI</strong> accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.<br /><br /><strong>Types of articles:</strong><br /><strong>Original research</strong> that contributes to the base of scientific knowledge <br /><strong>Systematic reviews </strong>whose methods ensure the comprehensive and unbiased sampling of existing literature.<br /><strong>Qualitative research</strong> that adheres to appropriate study design and reporting guidelines.<br /><strong>Other submissions</strong> that describes methods, software, databases, or other tools that if they follow the appropriate reporting guidelines. accepts research in areas related to Artificial Intelligence, Computational Intelligence, and bio inspired related areas. The submitted manuscripts are evaluated on the basis of high ethical standards, accurate methodology, scientific and perceived novelty.</p> https://plomscience.com/journals/index.php/PLOMSAI/article/view/24 A Survey on Privacy Preserving Data Mining Techniques 2025-05-09T14:37:50-07:00 Aziza Aldfaii [email protected] Rabie Ramadan [email protected] <p>Privacy-preserving data mining (PPDM) has become a significant area of<br>interest for researchers, facilitating the sharing and analysis of sensitive information while<br>ensuring privacy protection. This paper investigates methods for maintaining data confidentiality<br>while retaining the critical attributes necessary for analysis. The authors assess<br>the efficacy of various PPDM techniques against criteria such as performance, data usability,<br>and levels of uncertainty. The key findings and limitations of each approach are<br>thoroughly reviewed and summarized. Various PPDM techniques present distinct advantages<br>alongside certain limitations: Anonymization guarantees the anonymity of data<br>owners but is vulnerable to linking attacks. Perturbation protects attributes independently<br>but does not allow for the reconstruction of original values from the altered data.<br>Randomization provides robust privacy protection but diminishes data utility due to the<br>introduction of noise. Cryptographic methods offer strong security and utility but tend to<br>be less efficient than other strategies. No single technique outperforms all criteria; rather,<br>each is more effective under particular circumstances. This paper delivers a comparative<br>analysis of PPDM techniques, emphasizing their strengths and weaknesses, and offers<br>insights into their applicability across different scenarios.</p> 2025-05-01T00:00:00-07:00 Copyright (c) 2025 PLOMS AI https://plomscience.com/journals/index.php/PLOMSAI/article/view/25 Survey on Web Application Security Testing Methods 2025-05-16T06:31:49-07:00 Amman Alamri [email protected] Hamad Albahri [email protected] Rabie Ramadan [email protected] <p>This research study delivers comprehensive coverage of tools, techniques,<br />and processes for ensuring security within web applications. The analysis encompasses<br />both automated and manual approaches, including code reviews, penetration testing, and tools addressing common vulnerabilities listed in the OWASP Top 10. As web applications have become critical infrastructure for modern organizations managing sensitive data and performing significant transactions, the need for robust security testing has grown exponentially. The research presents case studies and results of testing performed in real environments to illustrate the strengths and weaknesses of various security testing methodologies. The findings demonstrate that while automated tools provide efficiency and scalability, manual testing remains essential for detecting complex logical vulnerabilities and context-sensitive security issues. Additionally, the paper emphasizes the importance of integrating multiple testing approaches into a unified web application security strategy to address the evolving threat landscape effectively.</p> 2025-05-01T00:00:00-07:00 Copyright (c) 2025 PLOMS AI