Search Results - (( developing insecurity research algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- insecurity research »
- research algorithm »
- implication based »
- java implication »
-
1
-
2
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
3
Cryptanalysis and design of chaos based image encryption schemes
Published 2025“…However, many existing image encryption schemes have been shown to be insecure against cryptanalysis. Cryptanalysis is essential for uncovering potential vulnerabilities, as it evaluates the security of encryption schemes, identifies weaknesses, and guides the development of more secure frameworks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
-
5
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…The analysis utilized a novel modified stacked Multiple Linear Regression- -Support Vector Regression (MLR- -SVR) algorithm, and a novel modified stacked MLR- -Support Vector Regression (MLR- -SVR) algorithm, demonstrating high predictive capability, especially in a limited dataset environment, which the algorithms’ superiority ranked utilizing modified Taguchi-based VIseKriterijumska Optimizacija I Kompromisno Resenje (Taguchi-based VIKOR) multi-criteria decision-making algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
7
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
8
Modeling and Optimization of Water�Food�Energy Nexus for Malaysia�s Agricultural Sector
Published 2022“…The waterâ��foodâ��energy (WFE) nexus is a strategic system that integrates different separated sectors by using their interconnectedness to reduce trade-offs and allow sustainable development by preventing future resource insecurity. …”
Get full text
Get full text
Article -
9
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…To the best of our knowledge, CBC is a new field of research in two areas, such as cryptography (computer and data security) and chaos (nonlinear dynamic system). …”
Get full text
Get full text
Get full text
Thesis -
10
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
11
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
12
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
13
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
14
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
15
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
16
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2022“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
17
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
18
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article -
19
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. …”
Get full text
Get full text
Get full text
Article
