Search Results - (( developing security threat algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- threat algorithm »
- java implication »
- security threat »
-
1
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
2
Network intrusion detection and alert system
Published 2024“…This project aims to develop an intelligent and comprehensive network intrusion detection and alert system (NIDAS) to enhance network security and provide real-time threat mitigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
4
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
5
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…Uniqueness of iris is proven can increase the security and efficiency of recognition system. The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
6
iBUST: An intelligent behavioural trust model for securing industrial cyber-physical systems
Published 2024“…Therefore, this paper proposes an ARL-based intelligent Behavioural Trust Model (iBUST) for securing the CPPS. For this intelligent TMM, a variant of Frequency Pattern Growth (FP-Growth), called enhanced FP-Growth (EFP-Growth) algorithm is developed by altering the internal data structures for faster execution and by developing a modified exponential decay function (MEDF) to automatically calculate minimum supports for adapting trust evolution characteristics. …”
Get full text
Get full text
Get full text
Article -
7
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The rise in the frequency of attacks against the AES has ot been matched by the level of development in the capabilities of the algorithm to withstand these challenges and make the AES secure and immune to all risks. …”
Get full text
Get full text
Thesis -
8
Improving the security model of software define networks
Published 2023“…These security issues involves around the development to secure the SDN controller of the network, to ensure that any attacks or any unauthorized access are able to apprehend at the earliest stage. …”
text::Final Year Project -
9
-
10
Lattice-based cryptography: the dots that provide information security
Published 2023“…Alternatively, most of the current cryptographic schemes are developed based on hard mathematical problems believed to be as unaffected by Shor’s quantum algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
11
Conceptual deployment models to secure cloud computing / Hajar Ziglari
Published 2012“…Objectives contain identifying data security attributes and threats for cloud, discovering some strategies to recover the cloud computing service delivery to business performance and customers and developing a new model to cover some security issues. …”
Get full text
Get full text
Thesis -
12
A Study On AI-Driven Solutions for Cloud Security Platform
Published 2024“…Cloud computing has developed as a reliable approach to adopting various services inherent in data management but has its weaknesses in terms of security risks such as unauthorized access, data leakage or any other threats from insiders. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
Article -
14
Lightweight Cryptography Techniques for MHealth Cybersecurity
Published 2024“…Furthermore, awareness of security threats and their cryptographic solutions in terms of future health industry are discussed. …”
Proceedings Paper -
15
Lightweight encryption technique to enhance medical image security on internet of medical things applications
Published 2021“…Researchers have identified such security threats and have proposed several image encryption techniques to mitigate the security problem. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
Automated Malicious File Investigation
Published 2020“…Moreover, the main objectives of this project is to identify the awareness level of cyber security threats among UTP community and to develop a tool for combating cyber security threats by using a reliable application where it will send a result after checking the file or URL upload to ensure the authenticity of the file. …”
Get full text
Get full text
Final Year Project -
17
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The "Remote to Local (R2L) Intrusion Detection System Using Decision Tree" project aims to address the escalating threat of network intrusions by developing an effective intrusion detection system. …”
Get full text
Get full text
Thesis -
18
A platform to develop a secure instant messaging using jabber protocol
Published 2010Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
