Search Results - (( java application customization algorithm ) OR ( construct security selection algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The s-box test will be carried out to verify the security of the new determinant s-boxes constructed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Our system achieved an overall accuracy of 98, outperforming baseline models that used more advanced algorithms such as Random Forest and XGBoost. Our enhanced Gini index feature selection method allowed us to select only 13 out of 45 security features, significantly reducing the data dimensionality and avoiding overfitting issues. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A neural network modal decomposition mechanism in predicting network traffic by Shi Jinmei

    Published 2023
    “…The proposed mechanism starts by using SABC to update the model with a new solution and fine-tune the disturbances in each iteration to deal with the interference in order to find the best values that are also synchronously optimal. The SAVE-AS then constructs an adaptive selection operator. It adaptively selects the number of datasets after VMD optimization decomposition to precisely set the number of hidden layer nodes in an ELM to improve prediction accuracy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Finally, we study the provable security element for both cryptosystems. Emphasis is given to the standard security goal and the strong attack model, namely the indistinguishability and the chosen-ciphertext attack, respectively.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development of new code for optical code division multiple access systems by Hilal Adnan, Fadhil

    Published 2011
    “…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Splitting algorithm is proposed to construct the new code families namely RD code. …”
    Get full text
    Thesis
  17. 17

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…This study is primarily aimed at investigating two issues in genetic algorithm (GA) and one issue in conformational search (CS) problems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The correlation-based feature selection (CFS) method was used to select representative WPD vector subset to eliminate redundancy before combining with other features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…Since it is a costly approach, we propose a detection system using Resource Allocating Network (RAN) with data selection to select essential data. Using this method, the learning time is shorten, and thus, the DDoS backscatter can be detected fast. …”
    Get full text
    Get full text
    Thesis