Search Results - (( developing information security algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1
  2. 2

    Designing New Block Cipher Based On Genetic Algorithm Approach by Nur Hafiza Binti Zakaria, Ramlan Mahmod, Nur Izura Udzir, Zuriati Ahmad Zukarnain, Suriyani Ariffin

    Published 2024
    “…Therefore, this new proposed block cipher can be used by countries, organizations, stakeholders or interested parties as one of the secure algorithm to increase the protection of the information and also will contribute as an alternative to other cryptographic algorithms in computer security research.…”
    Article
  3. 3
  4. 4

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…Other than that, the evolvement of technology will also contribute towards the development of new block ciphers. To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…With the high demand from the corporate and enterprise, more and more security appliances were developed and deployed, such as IDS (Intrusion Detection Systems), IPS (Intrusion Prevention Systems), Firewall, and SIEM (Security Information and Event Management). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…As a result, information technology has advanced more, particularly in the areas of security and data secrecy. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Recently the importance of mobile security coincides with the development of mobile computing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…This application uses two levels of securities that make the information more secure and bring difficult to unauthorized party get the information. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
    Get full text
    Get full text
    Get full text
    Thesis