Search Results - (( network security problems algorithm ) OR ( java implication _ algorithm ))

Refine Results
  1. 1
  2. 2

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Immune-genetic algorithm(IGA) with local search for intrusion detection system in computer network / Hamizan Suhaimi, Saiful Izwan Suliman, and Ismail Musirin by Suhaimi, Hamizan, Suliman, Saiful Izwan, Musirin, Ismail

    Published 2021
    “…By formulating a specific algorithm for this problem, the purpose of this study is to examine the performance of improvised Genetic Algorithms for network intrusion problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…Enterprise network security solution optimization is a complex and challenging problem given the large number of components that are involved. …”
    Get full text
    Get full text
    Article
  5. 5

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…Enterprise network security solution optimization is a complex and challenging problem given the large number of components that are involved. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The problem statement relies how the enhancement of storage mechanism for secured parallel network file system will benefit the storage computing environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The problem of developing effective and secure routing protocols has drawn more interest in network research with the popularization of IoT-connected devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network by Adnan, Shahid Khan

    Published 2014
    “…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts by Al-Saedi, Karim Hashim Kraidi

    Published 2013
    “…The Alert Detection Engine (ADE) is a powerful network security system that is used to secure computer networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…The Human Immune System (HIS) is considered as a bank of models, functions, and concepts from where Artificial Immune algorithms are inspired. These algorithms are used to secure both host-based and network-based systems. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Steady state security analysis using artificial neural network by Mohd Nor, Nurul Huda

    Published 2008
    “…Steady state security analysis aims at assessing the risk a contingency would entail for an electrical network operating at a certain point. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16

    Using Particle Swarm Optimization Algorithm in the Distribution System Planning by Shamshiri, Meysam, Gan, Chin Kim, Mariana, Yusoff, Ab Ghani, Mohd Ruddin

    Published 2013
    “…This paper utilizes the Particle Swarm Optimization (PSO) algorithm to solve the distribution planning problem with DG. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime by Rahiman, Amir Rizaan, Williams, Temitope Betty, Zakaria, Muhammad D.

    Published 2022
    “…It benefits from the modified problem-oriented genetic algorithm parameters in securing the sensor node lifetime. …”
    Get full text
    Get full text
    Article
  18. 18

    Using particle swarm optimization algorithm in the distribution system planning by Shamshiri, Meysam, Gan, Chin Kim, Jusoff, Kamaruzaman, Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Yusoff, Mariana

    Published 2013
    “…This paper utilizes the Particle Swarm Optimization (PSO) algorithm to solve the distribution planning problem with DG. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box by Alabaichi, Ashwak Mahmood

    Published 2014
    “…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar by Abdul Satar, Azwan

    Published 2007
    “…The explosive growth of 802.11 networks has coincided with increased presence of security treat to these networks. …”
    Get full text
    Get full text
    Thesis