Search Results - (( security application clustering algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application clustering »
- security application »
- application testing »
- testing algorithm »
- java application »
-
1
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
-
5
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
Published 2007Get full text
Get full text
Conference or Workshop Item -
6
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Owing to the enhanced performance of the proposed solutions, particularly in terms of security, scalability, and complexity, it paves the way for the implementation of decentralized security in IoT applications within the realms of healthcare and agriculture.…”
Get full text
Get full text
Thesis -
7
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. …”
Get full text
Get full text
Article -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
-
10
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
11
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
12
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
13
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
16
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
17
-
18
-
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis
