Search Results - (( developing security risk algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- risk algorithm »
-
1
An optimized attack tree model for security test case planning and generation
Published 2018“…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
Get full text
Get full text
Article -
2
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Steady state security analysis using artificial neural network
Published 2008“…Steady state security analysis aims at assessing the risk a contingency would entail for an electrical network operating at a certain point. …”
Get full text
Get full text
Student Project -
4
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data. …”
Get full text
Get full text
Conference or Workshop Item -
5
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
6
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
7
Improving the security model of software define networks
Published 2023“…These security issues involves around the development to secure the SDN controller of the network, to ensure that any attacks or any unauthorized access are able to apprehend at the earliest stage. …”
text::Final Year Project -
8
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
9
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
11
Risk-ranking matrix for security patching of exploitable vulnerabilities
Published 2024“…Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. …”
Conference Paper -
12
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Cloud computing has developed as a reliable approach to adopting various services inherent in data management but has its weaknesses in terms of security risks such as unauthorized access, data leakage or any other threats from insiders. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…This endeavor serves as a crucial initial step towards fortifying network security and mitigating the risks associated with network intrusion attacks.…”
Get full text
Get full text
Thesis -
14
-
15
-
16
Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security
Published 2018“…In addition, existing reliability indexes are developed based on past experience, hardly covering the prediction of disruption risks. …”
Get full text
Get full text
Article -
17
Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant
Published 2018“…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
Get full text
Get full text
Get full text
Article -
18
Development of security in wireless sensor network using IPv6
Published 2009Get full text
Get full text
Thesis -
19
-
20
Lightweight cryptography techniques for MHealth cybersecurity
Published 2024journal::journal article
