Search Results - (( java implementation phase algorithm ) OR ( knowledge integration security algorithm ))
Search alternatives:
- knowledge integration »
- implementation phase »
- integration security »
- java implementation »
- phase algorithm »
-
1
Enhancement of lightweight block cipher algorithms
Published 2017“…Second, there are many researches still trying to find an algorithm that has the highest level of security. Third, there is lack knowledge on key dependent S-box within lightweight algorithms. …”
Get full text
Get full text
Book -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
3
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
4
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
Get full text
Get full text
Thesis -
5
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
6
-
7
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Once an insecure condition occurs, new actions must be considered to restore the system to secure operation. The objective of this work is to introduce new algorithms that can enhance power system security inclusive of the remedial action (generation re-dispatch/load shedding) for any scale of power system operation as well as improving the existing ANN to solve the problem faced by power system security assessment. …”
Get full text
Get full text
Thesis -
8
-
9
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
10
-
11
-
12
Security alert framework using dynamic tweet-based features for phishing detection on twitter
Published 2019“…Subsequently, the security alert mechanism is formulated by integrating with the detection algorithm to alert Twitter users. …”
Get full text
Get full text
Thesis -
13
Hybrid Classification Algorithm For Denial Of Service Attack Detection Using Rough Set Theory And Artificial Immune
Published 2024thesis::master thesis -
14
Optimal variational mode decomposition and integrated extreme learning machine for network traffic prediction
Published 2021“…However, most of the existing evolutionary algorithms have some adjustable parameters which depend on subjective experience or prior knowledge. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
-
16
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
17
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…Implemented using Django and SQLite, the system reduced manual efforts and specialized knowledge needed for tool selection, allowing pentesters to focus on complex security tasks. …”
Get full text
Get full text
Get full text
Article -
18
An embedding traid-bit method to improve the performance of Arabic text steganography
Published 2016“…The enormous development in the utilization of the Internet has driven by continuous improvements in the region of security. The enhanced security techniques are applied to save the intellectual property. …”
Get full text
Get full text
Get full text
Thesis -
19
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section -
20
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The main strength of the HIDUP system is that it can successfully integrate Image Steganography with two distinct cryptography algorithms. …”
Get full text
Get full text
Get full text
Book Section
