Search Results - (( java implementation phase algorithm ) OR ( attack interaction study algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A survey of interest flooding attack in named-data networking: Taxonomy, performance and future research challenges by Ren-Ting Lee, Yu-Beng Leau, Yong Jin Park, Mohammed Anbar

    Published 2021
    “…In this paper, we sum- maize the different types of possible attack models with a specific name with a description in NDN, specifically the PIT-oriented routing attack. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    CNN-LSTM: hybrid deep neural network for network intrusion detection system; a case by Halbouni, Asmaa Hani, Gunawan, Teddy Surya, Habaebi, Mohamed Hadi, Halbouni, Murad, Kartiwi, Mira, Ahmad, Robiah

    Published 2022
    “…Network security becomes indispensable to our daily interactions and networks. As attackers continue to develop new types of attacks and the size of networks continues to grow, the need for an effective intrusion detection system has become critical. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced recognition methods for text and slider CAPTCHA vulnerability assessment by Xing, Wan

    Published 2025
    “…By comparing them with the benchmark models in terms of recognition accuracy, precision, computational complexity, storage space, and other metrics, the superiority of our proposed algorithm is proved. Furthermore, we have delineated the path for subsequent study and enhancement.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Nurul Syafiqah, Zaidi, Al Fahim, Mubarak Ali, Ahmad Firdaus, Zainal Abidin, Ibrahim, Adamu Abubakar, Aldharhani, Ghassan Saleh, Mohd Faizal, Ab Razak

    Published 2025
    “…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Enhancing user authentication through the implementation of the ForestPA algorithm for smart healthcare systems by Zaidi, Nurul Syafiqah, Mubarak Ali, Al-Fahim, Ahmad, Firdaus, Abubakar, Adamu, AlDharhani, Ghassan Saleh, Ab Razak, Mohd Faizal

    Published 2025
    “…This study involves five participants with devices and performs various finger-based interactions (raising, lowering, moving the finger, applying pressure, adjusting orientation, and utilizing multiple hikes) while completing reading and image comparison tasks across multiple sessions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article