Search Results - (( security classification new algorithm ) OR ( java application using algorithm ))
Search alternatives:
- security classification »
- classification new »
- java application »
- using algorithm »
- new algorithm »
-
1
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
2
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
3
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
5
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
6
Android Mobile Malware Classification Based on System Call and Permission Using Tokenization
Published 2024thesis::master thesis -
7
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…Using the software system, design theories, AIS features, new nonlinear classification algorithm, and self-healing system show how the use of presented systems can ensure safety for critical services networks and heal the damage caused by intrusion. …”
Get full text
Get full text
Thesis -
8
An efficient intrusion detection model based on hybridization of artificial bee colony and dragonfly algorithms for training multilayer perceptrons
Published 2020“…This study proposes a new binary classification model for intrusion detection, based on hybridization of Artificial Bee Colony algorithm (ABC) and Dragonfly algorithm (DA) for training an artificial neural network (ANN) in order to increase the classification accuracy rate for malicious and non-malicious traffic in networks. …”
Get full text
Get full text
Get full text
Article -
9
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
10
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Iris is one of the biometric that widely used in the field of security due to its uniqueness. There are a lot of feature extraction methods and classification methods for iris classification. …”
Get full text
Get full text
Monograph -
13
Android Mobile Malware Surveillance Exploitation Via Call Logs: Proof of Concept
Published 2024“…Based on the experiment conducted, a new system call classification to exploit call logs for mobile attacks has been developed using Covering Algorithm. …”
Proceedings Paper -
14
Named entity recognition using a new fuzzy support vector machine.
Published 2008Get full text
Get full text
Article -
15
-
16
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
17
Android Mobile Malware Surveillance Exploitation via Call Logs: Proof of Concept
Published 2024Conference Paper -
18
An enhanced classification framework for intrusions detection system using intelligent exoplanet atmospheric retrieval algorithm
Published 2022“…The results show that the proposed intelligent exoplanet atmospheric retrieval (INARA) algorithm has improved accuracy and is able to detect new attack types efficiently.…”
Get full text
Get full text
Get full text
Article -
19
Implementation of lightweight cryptographic primitives
Published 2023“…Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. …”
Article -
20
Implementation of lightweight cryptographic primitives
Published 2023“…Lightweight cryptography is not a new branch in cryptography. It is a subject specifically addressing the implementation of security mechanism in pervasive computing that are characterized by smart but resource constrained devices. …”
Article
