Search Results - (( java implementation models algorithm ) OR ( using ((task using) OR (attack using)) algorithm ))

Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A fault-intrusion-tolerant system and deadline-aware algorithm for scheduling scientific workflow in the cloud by Farid, Mazen, Latip, Rohaya, Hussin, Masnida, Abdul Hamid, Nor Asilah Wati

    Published 2021
    “…Methodology: To increase workflow reliability, we propose the Fault and Intrusion-tolerant Workflow Scheduling algorithm (FITSW). The proposed workflow system uses task executors consisting of many virtual machines to carry out workflow tasks. …”
    Get full text
    Get full text
    Article
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…The algorithms have been applied on the KDD99 dataset, which is the benchmark dataset used for anomaly-based detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Spam classification based on supervised learning using grasshopper optimization algorithm and artificial neural network by Mumtazimah, Mohamad, Engku Fadzli Hasan, Syed Abdullah, Ghaleb, S.A.A., Ghanem, W.A.H.M.

    Published 2021
    “…Due to these surges in spam attacks, a number of approaches have been proposed to lessen the attacks across the globe significantly. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    KM-NEU: an efficient hybrid approach for intrusion detection system by Lisehroodi, Mazyar Mohammadi, Muda, Zaiton, Yassin, Warusia, Udzir, Nur Izura

    Published 2014
    “…The K-means clustering algorithm is engaged for grouping analogous nodes into k clusters using the similarity measures such as attack and non-attack, whereas the Neural Network Multi-Layer Perceptron classifies the clustered data into detail categories such as R2L, Probing, DoS, U2R and Normal. …”
    Get full text
    Get full text
    Article
  20. 20

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis