Search Results - (( java implementation phase algorithm ) OR ( program attacks _ algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
3
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
Get full text
Get full text
Get full text
Article -
4
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
5
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…The OMNET++ simulation program is used to justify the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
6
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES is a data encryption technique that exist in the world with as currently the most secured algorithms. AES is the next generation encryption algorithm replacing the older version which is DES and Triple DES. …”
Get full text
Get full text
Thesis -
7
-
8
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
Published 2019“…There are many research has been done on security of file encryption with AES algorithm. There is no any successful attack yet against AES but because of a higher increasing of cybercrime it could be possible attack on it like brute force attack and algebraic attack. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. These attacks, including cross-site scripting, have caused damages for both web site owners and users. …”
Get full text
Get full text
Conference or Workshop Item -
10
Improving the security model of software define networks
Published 2023“…By exposing the SDN main controller network with various simulated scenario like a virus attack, a program is written to ensure that the implementation of the attack from an attacker could be put to stop. …”
text::Final Year Project -
11
-
12
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…These attacks, including cross-site scripting, have caused damages for both web site owners and users. …”
Get full text
Get full text
Conference or Workshop Item -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
14
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. …”
Proceedings Paper -
15
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
16
Designing a New Model for Worm Response Using Security Metrics
Published 2024“…Therefore, in this research paper, a new model to respond to the worms attack efficiently is built. This worm response model is called as eZSiber, inspired by apoptosis or also known as cell-programmed death. …”
Proceedings Paper -
17
-
18
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…It will include the coding of python programming coding and calculation of proposed method. …”
Get full text
Get full text
Student Project -
19
An efficient method for audio watermarking using SWT and mean value quantization
Published 2016“…The results obtained show high robustness towards signal processing and manipulating attacks specially the de-synchronization attacks such as jittering, cropping, and zero inserting attacks. …”
Get full text
Get full text
Thesis -
20
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article
