Search Results - (( developing effective security algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A block cipher based on genetic algorithm
Published 2016“…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed such as NIST Statistical Test, avalanche effect, cryptanalysis and efficiency to justify that it is a secure block cipher algorithm. …”
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
10
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
11
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…As it is challenging to implement security in resource-constrained IoT networks, the presented model adopted bioinspired approaches, offering an improved version of ACO towards secure data transmission cost-effectively while taking into consideration residual energy and the trust score of the sensor to be optimized. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. …”
Get full text
Get full text
Get full text
Article -
15
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
17
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The development and implementation of the proposed technique was involved the process of modifying the standard GA so that it is good and specific enough to tackle this network intrusion problem effectively. …”
Get full text
Get full text
Thesis -
18
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The project successfully achieves its predetermined objectives, culminating in the development of an effective Remote to Local (R2L) Intrusion Detection System utilizing the Decision Tree algorithm. …”
Get full text
Get full text
Thesis -
19
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Real-world applications and possibilities for further development, such as federated learning and XAI, are also described in order to give recommendations for the effective application of AI-based cloud security. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings
