Search Results - (( java implementation modified algorithm ) OR ( timing attack using algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- using algorithm »
- timing »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol implemented in real RFID system outperforms other related protocols because of 13.46 % shorter read time and write time consumed. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The attack graph is categorized into three sections: generation, analysis, and use of attack graph. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
Get full text
Get full text
Thesis -
7
Novel approach for IP-PBX denial of service intrusion detection using support vector machine algorithm
Published 2021“…The time taken by the algorithms to classify the attack is very important. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
9
Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm
Published 2005“…However, the rapid growth of computer technology and its resources may make this time shorter than NIST estimated time to break the algorithm. …”
Get full text
Get full text
Thesis -
10
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…NIPT algorithm has better improvement on delay which presents the elimination of attacker. …”
Get full text
Get full text
Thesis -
11
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
12
A RSA-type cryptosystem based on quartic polynomials
Published 2011“…By using this algorithm, the time for computations will be decreased. …”
Get full text
Get full text
Thesis -
13
Message based random variable length key encryption algorithm.
Published 2009“…Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
Get full text
Get full text
Article -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
15
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
Get full text
Get full text
Article -
16
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Using streaming data algorithm for intrusion detection on the vehicular controller area network
Published 2022“…The Controller Area Network (CAN), which is a protocol for the in-vehicle network, is lacking in security features, making the CAN bus vulnerable to a range of cyberattacks such as message injections, replay attacks, and denial of service attacks. This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
Get full text
Get full text
Article
