Search Results - (( network security (problems OR problem) algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- java implication »
- implication tree »
- tree algorithm »
-
1
Controlling algorithm for energy consumption of radio bandwidth to manage coverage area problem
Published 2024Subjects:Conference Paper -
2
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
3
Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin
Published 2021“…By formulating a specific algorithm for this problem, the purpose of this study is to examine the performance of improvised Genetic Algorithms for network intrusion problems. …”
Get full text
Get full text
Get full text
Article -
4
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Enterprise network security solution optimization is a complex and challenging problem given the large number of components that are involved. …”
Get full text
Get full text
Article -
5
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…Enterprise network security solution optimization is a complex and challenging problem given the large number of components that are involved. …”
Get full text
Get full text
Article -
6
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
Get full text
Get full text
Thesis -
7
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
Published 2013“…The Alert Detection Engine (ADE) is a powerful network security system that is used to secure computer networks. …”
Get full text
Get full text
Thesis -
8
Using Particle Swarm Optimization Algorithm in the Distribution System Planning
Published 2013“…This paper utilizes the Particle Swarm Optimization (PSO) algorithm to solve the distribution planning problem with DG. …”
Get full text
Get full text
Get full text
Article -
9
Using particle swarm optimization algorithm in the distribution system planning
Published 2013“…This paper utilizes the Particle Swarm Optimization (PSO) algorithm to solve the distribution planning problem with DG. …”
Get full text
Get full text
Get full text
Article -
10
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The problem statement relies how the enhancement of storage mechanism for secured parallel network file system will benefit the storage computing environment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…Finally, two novel hybrid optimization algorithms namely, FLP-QOJaya algorithm for single objective OPF problems and MFLP-QOMJaya algorithm for MOOPF problems are proposed. …”
Get full text
Get full text
Thesis -
13
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
Get full text
Get full text
Get full text
Article -
14
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
Get full text
Thesis -
16
Solving the optimal reactive power dispatch problem based on moth-flame optimizer for power system operation and planning
Published 2018“…This paper proposes a recent nature inspired algorithm called moth-flame optimizer (MFO) to solve the ORPD problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…Second, to reduce the routing hole problem an Energy efficient Least Edge Computation (ELEC) multi-hop clustering algorithm for WSN is proposed, which achieves nearly double network lifetime by equal energy consumption in various parts of the network as compared to existing routing strategies. …”
Get full text
Get full text
Thesis -
18
Hybrid firefly and particle swarm optimization algorithm for multi-objective optimal power flow with distributed generation
Published 2022“…These factors affect the operation plans, have raised the OPF problems' complexities, and require an unfailing optimization algorithm to solve economic and security concerns in different interconnected power systems. …”
Get full text
Get full text
Thesis -
19
-
20
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis
