Search Results - (( java implementation bat algorithm ) OR ( program information security algorithm ))
Search alternatives:
- java implementation »
- program information »
- implementation bat »
- bat algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project -
3
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
4
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
Get full text
Get full text
Thesis -
5
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…The two most famous techniques for data security are steganography and cryptography. Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
6
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The significance is to protect personal information and provide future robust security on mobile messaging application. …”
Get full text
Get full text
Student Project -
7
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…The importance of cloud computing comes out with the security of data accessibility, reliability and reliability of information. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
10
Improving the security model of software define networks
Published 2023“…An by securing the connection between the main controller and northbound administration with the use of certain algorithm hashing protocol, it would further increase the security of the command line in the whole network. …”
text::Final Year Project -
11
-
12
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
13
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The aggregatable signcryption that enables special signcryption ciphertexts intended for the same destination be assembled in a compressed single ciphertext while maintaining the same security standards in the system. The procedure is then obfuscated aimed at making information more difficult to be understood by human being for the purpose of security and privacy of the program/information while commonly maintaining its computational functions. …”
Get full text
Get full text
Thesis -
14
-
15
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…In this thesis, a Peer Security Framework (PSF) has been developed using reputation-based mechanism to address these problems. …”
Get full text
Get full text
Thesis -
16
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…In summary, the results obtained in this study offer accurate and high-speed information for the dynamic security state, which makes DSA classifier able to provide vital information for protection and control applications to keep the power system in a secure and reliable state.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Encryption Technology on Windows Workstation
Published 2004“…In addition, the objective is to tighten the security of Windows platform by implementing a new way of encrypting users' information to prevent access by unauthorized users. …”
Get full text
Get full text
Final Year Project -
18
WEBCAM MOTION DETECTION USINGVISUAL BASIC
Published 2005“…This system is able to be upgraded to be amonitoring system for security purposes. The project adds the number of motion detection collection programs that available in the market. …”
Get full text
Get full text
Final Year Project -
19
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
20
