Search Results - (( java implementation phase algorithm ) OR ( attack interaction study algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- attack interaction »
- interaction study »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
3
A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges
Published 2021“…In this paper, we sum- maize the different types of possible attack models with a specific name with a description in NDN, specifically the PIT-oriented routing attack. …”
Get full text
Get full text
Get full text
Article -
4
An Effectual Secured Approach Against Sybil Attacks In Wireless Networks
Published 2024journal::journal article -
5
CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case
Published 2022“…Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment
Published 2025“…By comparing them with the benchmark models in terms of recognition accuracy, precision, computational complexity, storage space, and other metrics, the superiority of our proposed algorithm is proved. Furthermore, we have delineated the path for subsequent study and enhancement.…”
Get full text
Get full text
Thesis -
8
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
Get full text
Get full text
Get full text
Article -
9
Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems
Published 2025“…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
Get full text
Get full text
Get full text
Get full text
Article
