Search Results - (( developing security say algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- say algorithm »
- security say »
-
1
-
2
Second Level Password Generator
Published 2010“…The two algorithms chosen to develop this system are Advanced Encryption Standard (AES) and Data Encryption Standard (DES). …”
Get full text
Get full text
Conference or Workshop Item -
3
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
Published 2010“…The system has been analyzed, algorithms that simulate the main immune mechanisms have been mapped out, and a security framework that incorporates different immune mechanisms has been developed. …”
Get full text
Get full text
Thesis -
4
-
5
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
6
Data Hiding Techniques In Digital Images
Published 2003“…With literally millions of images moving on the Internet each year it is safe to say that hiding data in digital image is of real concern to many in the security field. …”
Get full text
Get full text
Thesis -
7
-
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Therefore, we take this initiative to make enhancement in cyber security application to avoid the Internet users from being trapped and deceived by the trick of cyber criminals by developing detec�tion system of malicious spam email and Distributed Denial of Services (DDoS) 377$ 3(53867$.$$1781.8781$0,1$+ iii backscatter. …”
Get full text
Get full text
Thesis -
9
