Search Results - (( deployment security application algorithm ) OR ( java data function algorithm ))
Search alternatives:
- application algorithm »
- security application »
- function algorithm »
- data function »
- deployment »
- java »
-
1
-
2
Deployment of new dynamic cryptography buffer for SCADA security enhancement
Published 2014“…This novel study gives new directions for SCADA or its protocols security deployment and enhancement. …”
Get full text
Get full text
Get full text
Article -
3
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis -
4
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Secure routing using frequency hopping in wireless sensor network
Published 2007“…Wireless ad hoc sensor networks (WSN) operate in the absence of a pre-deployed infrastructure, are self-configurable, low cost and can be rapidly deployed. …”
Get full text
Get full text
Thesis -
7
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. …”
Get full text
Get full text
Get full text
Article -
11
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
Published 2014“…Cloud computing is an information technology deployment model that involves entrusting data to information systems managed by external parties on remote servers or 1Cin the cloud. 1D In cloud, resources, in terms of infrastructure, applications and data are deployed via the internet as a distributed service by service provider, which make use of applications without installations. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. Few approaches have focused on removing the vulnerabilities from the source codes before deployment of the applications. …”
Get full text
Get full text
Thesis -
13
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
14
Development of security in wireless sensor network using IPv6
Published 2009“…This leads to a very demanding environment in providing security. The research proposed XOR encryption algorithm that possesses built-in and enhanced security measure. …”
Get full text
Get full text
Thesis -
15
-
16
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Development of an intelligent multimodal biometric system for household appliances control
Published 2012“…Experimental results of this scheme have demonstrated the possibility deployment in other areas such as mobile devices, computer security, and forensic security amongst others. …”
Get full text
Get full text
Get full text
Monograph -
18
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. …”
Get full text
Get full text
Conference or Workshop Item -
19
Pedestrian group attributes detection in crowded scenes
Published 2017“…Recently the traditional video surveillance systems of crowd scenes have been deployed in various areas of applications; health monitoring, security etc. …”
Get full text
Get full text
Article -
20
