Search Results - (( java implementation amh algorithm ) OR ( program attack using algorithm ))
Search alternatives:
- java implementation »
- implementation amh »
- using algorithm »
- program attack »
- amh algorithm »
-
1
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
4
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
Get full text
Get full text
Thesis -
5
-
6
Improving the security model of software define networks
Published 2023“…By exposing the SDN main controller network with various simulated scenario like a virus attack, a program is written to ensure that the implementation of the attack from an attacker could be put to stop. …”
text::Final Year Project -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis -
8
-
9
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
10
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
11
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
12
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…Digital watermarking has been capturing the interests in programming society several decades ago due to the development of software and programming techniques that cause an increase in illegal use of digital files. …”
Get full text
Get full text
Thesis -
13
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Based on the experiment conducted, it produced an overall accuracy rate of 99.38 % using Sequential Minimal Optimization (SMO) algorithm. …”
Proceedings Paper -
14
-
15
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…This is according to the syntax algorithm. One of the two messages is deliberately rearranging and attacking by malicious. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
Get full text
Get full text
Get full text
Article -
18
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
19
User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Published 2023“…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
text::Thesis -
20
