Search Results - (( timing attack problems algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
    Get full text
    Get full text
    Article
  2. 2

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
    Get full text
    Get full text
    Article
  3. 3

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have incorporated a fuzzy logic controller (FLC) to fine tune the optimization algorithm in run time. The FLC takes into consideration both the exploration and exploitation aspect of the GA. …”
    Get full text
    Get full text
    Article
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8
  9. 9
  10. 10

    Challenges in multi-layer data security for video steganography by Samar Kamil, Masri Ayob, Siti Norul Huda Sheikh Abdullah, Zulkifli Ahmad

    Published 2018
    “…On the other side, the hybridization of the algorithms, increase memory complexity and increase computation time for data embedding. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancement of lightweight block cipher algorithms by Taha Alshaikhli, Imad Fakhri, Al-Dabbagh, Sufyan Salim Mahmood, Zaba, Muhammad Reza

    Published 2017
    “…This research dealt with three problems; First, it is difficult to optimized three factors at same time. …”
    Get full text
    Get full text
    Book
  12. 12

    Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems by Mohammad Khamees Khaleel, Alsajri

    Published 2022
    “…Hence, the detection of network attacks on computer systems has remain a relevant field of research for some time. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System by Ahmad, A, Zainuddin, WS, Kama, MN, Idris, NB, Saudi, MM

    Published 2024
    “…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
    Proceedings Paper
  17. 17

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts by Al-Saedi, Karim Hashim Kraidi

    Published 2013
    “…This work aims to provide a full understanding of the network attacks as well as ease the process for the analysts and save their time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cloud co-residency denial of service threat detection inspired by artificial immune system by Ahmad, Azuan, Zainudin, Wan Shafiuddin, Kama, Mohd Nazri, Idris, Norbik Bashah, Mohd Saudi, Madihah

    Published 2018
    “…A review of the literature shows that there is still a lack of works on cloud IDS that focused on implementing real-time hybrid detections using Dendritic Cell algorithm (DCA) as a practical approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper