Search Results - (( developing modeling secured algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
    Get full text
    Get full text
    Student Project
  2. 2

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  8. 8

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
    Get full text
    Get full text
    Thesis
  10. 10

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…Although, many researches have been dedicated to security testing with attack tree models, test case redundancy using this threat modeling technique has been a major issue faced leading to poor test coverage and expensive security testing exercises. …”
    Get full text
    Get full text
    Article
  11. 11

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…The solution to this bottleneck is proposing a novel model for realizing a secure eHealth system. In this study, a secure cloud-based electronic health system model (SCBEH) is proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…The key results encompass dataset preprocessing, Decision Tree classification model training, user interface development, and the evaluation of the Decision Tree model's performance. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    A smart food security monitoring and predicting algorithm for rice productivity in Southeast Asia by Chuan, Zun Liang, Tham, Ren Sheng, Abraham Lim, Bing Sern, David Lau, King Luen

    Published 2025
    “…Specifically, the methodology integrates Simple Linear Regression–Multivariable Linear Regression (SLR-MLR) into a unified predictive algorithm. By incorporating all four dimensions of food security: availability, accessibility, stability, and utilization, the proposed algorithms outperform conventional Artificial Intelligence (AI) predictive algorithms, offering superior accuracy and actionable insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen by Dai , Zhen

    Published 2019
    “…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
    Get full text
    Get full text
    Get full text
    Thesis