Search Results - (( java implementation path algorithm ) OR ( program attack a algorithm ))
Search alternatives:
- java implementation »
- implementation path »
- path algorithm »
- program attack »
- a algorithm »
- attack a »
-
1
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…BST inserts the nodes in the way that the Dijkstra’s can find the empty parking in fastest way. Dijkstra’s algorithm initials the paths to finding the shortest path while ACO optimizes the paths. …”
Get full text
Get full text
Thesis -
3
Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment
Published 2021“…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…The main component of this prototype is the use of Dijkstra algorithm to compute the shortest path from source of appointment to the 6 points of destinations within UiTM Shah Alam. …”
Get full text
Get full text
Thesis -
5
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
6
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
7
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Furthermore, when a Sybil attack takes place, SVAA can identify 97% of the Sybil attacks. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…There are many research has been done on security of file encryption with AES algorithm. There is no any successful attack yet against AES but because of a higher increasing of cybercrime it could be possible attack on it like brute force attack and algebraic attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. It is recommended that Final Examination Question Papers be enhanced using Encryptor Application by applying AES on a different domain to further strengthen information security.…”
Get full text
Get full text
Thesis -
11
Improving the security model of software define networks
Published 2023“…By exposing the SDN main controller network with various simulated scenario like a virus attack, a program is written to ensure that the implementation of the attack from an attacker could be put to stop. …”
text::Final Year Project -
12
-
13
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. …”
Get full text
Get full text
Conference or Workshop Item -
14
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
15
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
16
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…Software security vulnerabilities have led to many successful attacks on applications, especially web applications, on a daily basis. …”
Get full text
Get full text
Conference or Workshop Item -
17
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Therefore, in this research paper, a new model to respond to the worms attack efficiently is built. …”
Proceedings Paper -
18
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
19
-
20
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…However, the Diffie-Hellman protocol has a weakness in that it can easily be bypassed by a man-in-the-middle attack. …”
Get full text
Get full text
Student Project
