Search Results - (( developing modeling secured algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing modeling »
- secured algorithm »
- implication based »
- java implication »
-
1
Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin
Published 2022“…The objective of this project is to develop the Windows malware detection model using supervised machine learning in Decision Tree, K-NN and Naïve Bayes, to evaluate the performance of malware detection in term of testing and training of the features selection and to compare the accuracy detection model in all three machine learning algorithms. …”
Get full text
Get full text
Student Project -
2
A security payment model for financial payment using mykad
Published 2011“…Moreover, the development of ARSA makes this model more secure and safer for the customers.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
-
5
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
6
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
9
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Ekatarina Yadova to see the effectiveness of the models. The next step will be about development and corresponding interfaces and design patterns for applications to fit the deployment models and working on security protocols and algorithms in the proposed models to have security support in the cryptography part.…”
Get full text
Get full text
Thesis -
10
An optimized attack tree model for security test case planning and generation
Published 2018“…Although, many researches have been dedicated to security testing with attack tree models, test case redundancy using this threat modeling technique has been a major issue faced leading to poor test coverage and expensive security testing exercises. …”
Get full text
Get full text
Article -
11
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Secure lightweight client for cloud-based E-Health Model
Published 2023“…The solution to this bottleneck is proposing a novel model for realizing a secure eHealth system. In this study, a secure cloud-based electronic health system model (SCBEH) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
13
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
Get full text
Get full text
Thesis -
14
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
15
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The key results encompass dataset preprocessing, Decision Tree classification model training, user interface development, and the evaluation of the Decision Tree model's performance. …”
Get full text
Get full text
Thesis -
17
-
18
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
19
A smart food security monitoring and predicting algorithm for rice productivity in Southeast Asia
Published 2025“…Specifically, the methodology integrates Simple Linear Regression–Multivariable Linear Regression (SLR-MLR) into a unified predictive algorithm. By incorporating all four dimensions of food security: availability, accessibility, stability, and utilization, the proposed algorithms outperform conventional Artificial Intelligence (AI) predictive algorithms, offering superior accuracy and actionable insights. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
Get full text
Get full text
Get full text
Thesis
