Search Results - (( java implementation phase algorithm ) OR ( knowledge integration security algorithm ))

Refine Results
  1. 1

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…Second, there are many researches still trying to find an algorithm that has the highest level of security. Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
    Get full text
    Get full text
    Book
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Once an insecure condition occurs, new actions must be considered to restore the system to secure operation. The objective of this work is to introduce new algorithms that can enhance power system security inclusive of the remedial action (generation re-dispatch/load shedding) for any scale of power system operation as well as improving the existing ANN to solve the problem faced by power system security assessment. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction by Jinmei Shi, Yu-Beng Leau, Kun Li, Huandong Chen

    Published 2021
    “…However, most of the existing evolutionary algorithms have some adjustable parameters which depend on subjective experience or prior knowledge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…Implemented using Django and SQLite, the system reduced manual efforts and specialized knowledge needed for tool selection, allowing pentesters to focus on complex security tasks. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An embedding traid-bit method to improve the performance of Arabic text steganography by Thabit, Reema Ahmed Abdalla

    Published 2016
    “…The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim by Razali, Azli Amirul Ehsan, Halim, Faiqah Hafidzah

    Published 2022
    “…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
    Get full text
    Get full text
    Get full text
    Book Section