Search Results - (( java implementation tree algorithm ) OR ( timing attack using algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics by Al-Araji, Zaid Jasim Mohammed

    Published 2023
    “…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…In order to predict the attackers of online shaming, Ant Colony Optimization Algorithm will be used and it will be compared with J48 algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Attack prediction to enhance attack path discovery using improved attack graph by Al-Araji, Zaid Jasim, Abdullah, Raihana Syahirah, Syed Ahmad, Sharifah Sakinah

    Published 2022
    “…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm by Abdulbari Ali, Sherif

    Published 2005
    “…However, the rapid growth of computer technology and its resources may make this time shorter than NIST estimated time to break the algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…NIPT algorithm has better improvement on delay which presents the elimination of attacker. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A RSA-type cryptosystem based on quartic polynomials by Wong, Tze Jin

    Published 2011
    “…By using this algorithm, the time for computations will be decreased. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
    Get full text
    Get full text
    Article
  13. 13

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…The experimental results showed that the proposed cloaking algorithm out performed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
    Get full text
    Get full text
    Article
  14. 14

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Using streaming data algorithm for intrusion detection on the vehicular controller area network by Sharmin, Shaila, Mansor, Hafizah, Abdul Kadir, Andi Fitriah, Abdul Aziz, Normaziah

    Published 2022
    “…The Controller Area Network (CAN), which is a protocol for the in-vehicle network, is lacking in security features, making the CAN bus vulnerable to a range of cyberattacks such as message injections, replay attacks, and denial of service attacks. This has prompted researchers to develop statistical and machine learning based intrusion detection systems for the CAN bus that use various features such as message timing and frequency to detect attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
    Get full text
    Get full text
    Article
  19. 19

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…The experimental results showed that the proposed cloaking algorithm outperformed existing algorithms such as IClique, OptClique and MMBClique in terms of its cloaking success rate and processing time.…”
    Get full text
    Get full text
    Get full text
    Article