Search Results - (( network security proposed algorithm ) OR ( java simulation optimization algorithm ))
Search alternatives:
- proposed algorithm »
- security proposed »
- java simulation »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
2
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This issue highlights the need to tackle the network intrusion problem efficiently. This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
3
Rogue access point detection and tracking system using trilateration algorithm
Published 2023“…In the current digital era, network security is an essential concern, especially in the growing usage of wireless networks. …”
Get full text
Get full text
Book Section -
4
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
Get full text
Get full text
Get full text
Thesis -
5
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
6
Secure and Efficient Distributed Relay-Based Rekeying Algorithm for Group Communication in Mobile Multihop Relay Network
Published 2014“…In mobile multihop relay (MMR) networks, Relay multicast rekeying algorithm (RMRA) is meant to ensure secure multicast communication and selective updating of keys in MMR networks. …”
Get full text
Get full text
Get full text
Article -
7
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…The experimental results show that the proposed security scheme increases the security performance of the network. …”
Get full text
Get full text
Conference or Workshop Item -
8
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008“…The experimental results show that the proposed security scheme increases the security performance of the network. …”
Get full text
Get full text
Conference or Workshop Item -
9
Secure ACO-Based Wireless Sensor Network Routing Algorithm for IoT
Published 2021“…In this paper, a secure bio-inspired WSN (Wireless Sensor Network) routing protocol based on ant colony optimization (ACO) algorithm for IoT has been proposed and analyzed to find secure and optimal path that is energy-efficient as well as aiming at providing trust in IoT environment. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…The experimental results show that the proposed security scheme increases the security performance of the network. …”
Get full text
Get full text
Get full text
Article -
11
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…To secure IoT networks from routing attacks, a secure trust aware ACO-based WSN routing protocol for IoT is proposed here that establishes secure routing with trustworthy nodes. …”
Get full text
Get full text
Get full text
Article -
12
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
Get full text
Get full text
Student Project -
13
Secure address resolution protocol proxy in software defined network
Published 2018“…Therefore, the proposed approach contains collecting information algorithm, ARP storm attack detection algorithm, and ARP spoofing attack detection algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
15
A new hybrid online and offline multi-factor cross-domain authentication method for IoT applications in the automotive industry
Published 2021“…The proposed scheme uses the AES-ECC algorithm to provide secure communication and efficient key management. …”
Get full text
Get full text
Article -
16
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…The adoption of bio-inspired approaches contributes to discovering the optimal path for IoT routing by modeling the cognitive behavior of insect colonies to attain security cost-effectively. For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…Understanding the need to minimize algebraic attacks into the AES, this paper proposes the idea on integrating AES within the Feistel network of DES, hence resulting into the development of the Hybrid AES-DES algorithm. …”
Conference paper -
18
HTS : a hierarchical method for load balancing in autonomous networks.
Published 2008Get full text
Get full text
Article -
19
Network tool for preventing DDOS attacks on cloud computing
Published 2015“…This algorithm is simple and it is based on existing security protocol and is proposed for detecting and preventing security attacks on the network by filtering packets in the network. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
20
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…In this research, VoIP security was enhanced via a proposed cryptographic system. …”
Get full text
Get full text
Get full text
Get full text
Thesis
