Search Results - (( developing security risk algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
    Get full text
    Get full text
    Article
  2. 2

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…Steady state security analysis aims at assessing the risk a contingency would entail for an electrical network operating at a certain point. …”
    Get full text
    Get full text
    Student Project
  4. 4
  5. 5

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Improving the security model of software define networks by Ismail Ibrahim Mohamed Almahdy

    Published 2023
    “…These security issues involves around the development to secure the SDN controller of the network, to ensure that any attacks or any unauthorized access are able to apprehend at the earliest stage. …”
    text::Final Year Project
  8. 8

    Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming by Altahir, A.A., Asirvadam, V.S., Sebastian, P., Hamid, N.H.B., Ahmed, E.F.

    Published 2022
    “…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
    Get full text
    Get full text
    Article
  9. 9

    Lightweight encryption technique to enhance medical image security on internet of medical things applications by Hasan, Mohammad Kamrul, Islam, Shayla, Sulaiman, Rossilawati, Khan, Sheroz, Hassan Abdalla Hashim, Aisha, Habib, Shabana, Islam, Mohammad, Alyahya, Saleh, Ahmed, Musse Mohamed, Kamil, Samar, Hassan, Md Arif

    Published 2021
    “…However, the study has found that the existing proposed techniques still face application-specific several security problems. Therefore, this paper presents an efficient, lightweight encryption algorithm to develop a secure image encryption technique for the healthcare industry. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…We aim to improve on passwords with respect to both usability as well as security. It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Risk-ranking matrix for security patching of exploitable vulnerabilities by Hoque M.S., Jamil N., Amin N., Mansor M.

    Published 2024
    “…Furthermore, those risk levels can be redefined and scaled to meet any specific security needs. …”
    Conference Paper
  12. 12

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…Cloud computing has developed as a reliable approach to adopting various services inherent in data management but has its weaknesses in terms of security risks such as unauthorized access, data leakage or any other threats from insiders. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin by Mohd Nordin, Ahmad Nasreen Aqmal

    Published 2024
    “…This endeavor serves as a crucial initial step towards fortifying network security and mitigating the risks associated with network intrusion attacks.…”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Evaluating Power Reliability Dedicated for Sudden Disruptions: Its Application to Determine Capacity on the Basis of Energy Security by Kosai, Shoki, Tan, Chia Kwang, Yamasue, Eiji

    Published 2018
    “…In addition, existing reliability indexes are developed based on past experience, hardly covering the prediction of disruption risks. …”
    Get full text
    Get full text
    Article
  17. 17

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20