Search Results - (( java implementation based algorithm ) OR ( security classification based algorithm ))
Search alternatives:
- security classification »
- implementation based »
- classification based »
- java implementation »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Symmetric Key Size for Different Level of Information Classification
Published 2006“…Therefore confidential information is normally protected by using cryptographic algorithms. In these algorithms, key is an important element since it is one of the parameters that determine the level of security that the algorithms can provide. …”
Get full text
Get full text
Conference or Workshop Item -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…This framework is divided into three phases which are classification model of phishing detection, detection algorithm of phishing tweet detection and security alert mechanism of phishing tweet detection. …”
Get full text
Get full text
Thesis -
5
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
6
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
7
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
8
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
9
An analysis of intrusion detection classification using supervised machine learning algorithms on NSL-KDD dataset / Sarthak Rastogi ... [et al.]
Published 2022“…Conventional IDS are less accurate in detecting anomalies because of the decision taking based on rules. The IDS with machine learning method improves the detection accuracy of the security attacks. …”
Get full text
Get full text
Get full text
Article -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
File integrity monitor scheduling based on file security level classification
Published 2011“…Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
14
K-NN classifier for data confidentiality in cloud computing
Published 2014“…What data need security and what data do not need security. In this paper, we propose a data classification approach based on data confidentiality. …”
Get full text
Get full text
Conference or Workshop Item -
15
Data classification based on confidentiality in virtual cloud environment
Published 2014“…The aim of this study is to provide suitable security to data based on the security needs of data. …”
Get full text
Get full text
Article -
16
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
17
Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria
Published 2010“…Extensive testing and training of the proposed ANN based apprnach indicates its viability for power system steady state stability classification assessment.…”
Get full text
Get full text
Article -
18
Metaheuristic based ids using multi-objective wrapper feature selection and neural network classification
Published 2021“…This article proposes a cyber-intrusion detecting system classification with MLP trained by a hybrid metaheuristic algorithm and feature selection based on multi-objective wrapper method. …”
Get full text
Get full text
Conference or Workshop Item -
19
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article
