Search Results - (( developing security say algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS by Yasir Abdelgadir , Mohamed, Azween, Abdullah

    Published 2010
    “…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…With literally millions of images moving on the Internet each year it is safe to say that hiding data in digital image is of real concern to many in the security field. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
    Get full text
    Get full text
    Thesis
  9. 9