Search Results - (( network security proposed algorithm ) OR ( java simulation optimization algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…In the current digital era, network security is an essential concern, especially in the growing usage of wireless networks. …”
    Get full text
    Get full text
    Book Section
  4. 4

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network by Adnan, Shahid Khan

    Published 2014
    “…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Secured route optimization in mobile IPv6 wireless networks in terms of data integrity by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…The experimental results show that the proposed security scheme increases the security performance of the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…The experimental results show that the proposed security scheme increases the security performance of the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2021
    “…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…The experimental results show that the proposed security scheme increases the security performance of the network. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A secure trust aware ACO-Based WSN routing protocol for IoT by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2022
    “…To secure IoT networks from routing attacks, a secure trust aware ACO-based WSN routing protocol for IoT is proposed here that establishes secure routing with trustworthy nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Secure address resolution protocol proxy in software defined network by Munther, Munther Numan

    Published 2018
    “…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…The adoption of bio-inspired approaches contributes to discovering the optimal path for IoT routing by modeling the cognitive behavior of insect colonies to attain security cost-effectively. For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…Understanding the need to minimize algebraic attacks into the AES, this paper proposes the idea on integrating AES within the Feistel network of DES, hence resulting into the development of the Hybrid AES-DES algorithm. …”
    Conference paper
  18. 18
  19. 19

    Network tool for preventing DDOS attacks on cloud computing by Yo, Kee Seng

    Published 2015
    “…This algorithm is simple and it is based on existing security protocol and is proposed for detecting and preventing security attacks on the network by filtering packets in the network. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…In this research, VoIP security was enhanced via a proposed cryptographic system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis