Search Results - ((((encryption algorithm) OR (selection algorithm))) OR (genetic algorithm))
Search alternatives:
- selection algorithm »
-
1
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Features selection for ids in encrypted traffic using genetic algorithm
Published 2013“…This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…Secondly, modified RSA technique is proposed for the selection encryption purpose. This selection encryption of the modified RSA technique is an approach to lessen computational resources for greatly sized DNA facts. …”
Get full text
Get full text
Get full text
Article -
4
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025Subjects:conference output::conference proceedings::conference paper -
6
Encryption selection for WLAN IEEE802.11G
Published 2013“…As for the solution, it proposes a mechanism of selecting encryption algorithms, which is able to help users to select the suitable encryption algorithm and encryption protocols for their secured communication in IEEE 802.11g WLAN. …”
Get full text
Get full text
Thesis -
7
Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan
Published 2014Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
8
A block cipher based on genetic algorithm
Published 2016Subjects: “…Genetic algorithms…”
Get full text
Get full text
Get full text
Thesis -
9
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Student Project -
10
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017Subjects: “…Evolutionary programming (Computer science). Genetic algorithms…”
Get full text
Get full text
Thesis -
11
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…There are two components in our work. The symmetric encryption AES with encryption key of an asymmetric algorithm (RSA). …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Article -
13
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map
Published 2023“…A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map by Bahbibi Rahmatullah…”
Get full text
article -
14
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…Furthermore, we present a grayscale image encryption scheme utilizing a permutation-diffusion architecture, as well as a color image encryption scheme based on a genetic algorithm and the 2D-SHCM. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
16
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Book Section -
17
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…All of those encryption algorithms are classified as asymmetric and symmetric algorithms. …”
Get full text
Get full text
Thesis -
18
A New And Fast Rival Genetic Algorithm For Feature Selection
Published 2021“…The genetic algorithm (GA) as a fundamental optimization tool has been widely used in feature selection tasks. …”
Get full text
Get full text
Get full text
Article -
19
Comparison for selection technique in genetic algorithm
Published 2006“…The purpose of this project is to make a comparison for three selection techniques in Genetic Algorithm.The Genetic Algorithm has been implemented in the previous module for Chess Tournament Management System.Base on previous system the selection method only using randomize.By this project module,only three selections method were use for the comparison.They are Roulette Wheel, Steady-State and Rank selection.The result for this comparison has determined the appropriate selection for Genetic Algorithm implementation in Chess Tournament Management System.This will help Chess Tournament Management System to provide a better optimize schedule.…”
Get full text
Get full text
Undergraduates Project Papers -
20
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…In this paper, a methodology for model structure selection based on a genetic algorithm was developed and applied to non-linear discrete-time dynamic systems. …”
Get full text
Get full text
Get full text
Article
