Search Results - (( deployment security application algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1
  2. 2

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…This novel study gives new directions for SCADA or its protocols security deployment and enhancement. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Secure routing using frequency hopping in wireless sensor network by Raja Mohd. Radzi, Raja Zahilah

    Published 2007
    “…Wireless ad hoc sensor networks (WSN) operate in the absence of a pre-deployed infrastructure, are self-configurable, low cost and can be rapidly deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    MARKCLOUD - Software for data confidentiality and security in cloud computing environments by Olanrewaju, Rashidah Funke, Hakak, Saqib Iqbal, Khalifa, Othman Omran

    Published 2014
    “…Cloud computing is an information technology deployment model that involves entrusting data to information systems managed by external parties on remote servers or 1Cin the cloud. 1D In cloud, resources, in terms of infrastructure, applications and data are deployed via the internet as a distributed service by service provider, which make use of applications without installations. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. Few approaches have focused on removing the vulnerabilities from the source codes before deployment of the applications. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  14. 14

    Development of security in wireless sensor network using IPv6 by Jayapal, Vikneswary

    Published 2009
    “…This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of an intelligent multimodal biometric system for household appliances control by Abiodun musa, Aibinu

    Published 2012
    “…Experimental results of this scheme have demonstrated the possibility deployment in other areas such as mobile devices, computer security, and forensic security amongst others. …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Pedestrian group attributes detection in crowded scenes by Shuaibu, A.N., Malik, A.S., Faye, I., Ali, Y.S.

    Published 2017
    “…Recently the traditional video surveillance systems of crowd scenes have been deployed in various areas of applications; health monitoring, security etc. …”
    Get full text
    Get full text
    Article
  20. 20