Search Results - (( construct security validation algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- validation algorithm »
- security validation »
- java application »
- construct »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
4
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
5
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
6
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The s-box test will be carried out to verify the security of the new determinant s-boxes constructed. …”
Get full text
Get full text
Thesis -
7
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
8
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
Get full text
Get full text
Get full text
Thesis -
9
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
10
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…Furthermore, anyone who provides the correct username and password of a valid user will be able to log in to the secure network. …”
Get full text
Get full text
Get full text
Article -
11
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
13
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
Get full text
Get full text
Get full text
Proceeding -
14
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
15
A framework for classification software security using common vulnerabilities and exposures
Published 2018“…This inclusive of the investigation of vulnerability classification objectives,processes,classifiers and focus domains among prominent framework.Final step is to construct the framework by establishing the formal presentation of the vulnerability classification algo-rithm.The validation process was conducted empirically using statistical method to assess the accuracy and consistency by using the precision and recall rate of the algorithm on five data sets each with 500 samples.The findings show a significant result with precision's error rate or p value is between 0.01 and 0.02 with error rate for recall's error rate is between 0.02 and 0.04.Another validation was conducted to verify the correctness of the classification by using expert opinions,and the results showed that the ambiguity of several cases were subdue. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The proposed schemes have been validated using informal and formal security verification to compare the achieved security features against various attacks. …”
Get full text
Get full text
Thesis -
17
MalDroid: Secure DL-enabled intelligent malware detection framework
Published 2021“…Moreover, the performance of the proposed algorithm has been verified both with the constructed hybrid DL-driven algorithms and current benchmarks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Secure IIoT-enabled industry 4.0
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
Get full text
Get full text
Thesis -
20
Machine Learning based Predictive Modelling of Cybersecurity Threats Utilising Behavioural Data
Published 2023“…Five supervised machine learning methods are being tested which are: Regression Logistics, K-Nearest Neighbour (KNN), Decision Tree (DT), Support Vector Machine (SVM), and Naïve Bayesian Classifier with the aid of a tool, RapidMiner. The algorithms are used to construct, test, and validate three categories of cybercrime threat (Malware, Social Engineering, and Password Attack) predictive models. …”
Get full text
Get full text
Get full text
Get full text
Article
