Search Results - (( using attack (problems OR problem) algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. Kruskal Wallis test and calculation of the success rate in attacking were used to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
    Get full text
    Get full text
    Article
  4. 4

    Attack path selection optimization with adaptive genetic algorithms by Abd Rahman, A.S., Zakaria, M.N., Masrom, S.

    Published 2016
    “…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
    Get full text
    Get full text
    Article
  5. 5

    Security analyses of false positive problem for the SVD-based hybrid digital image watermarking techniques in the wavelet transform domain by Makbol, Nasrin M., Bee, Ee Khoo, Rassem, Taha H.

    Published 2018
    “…To understand how the attacks can threaten the rightful ownership and how to avoid these attacks, the three potential attacks of false positive problem has been demonstrated using recent proposed watermarking schemes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…To overcome this problem, a genetic algorithm approach is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method by Fahad, Ahmed Mohammed, Ahmed, Abdulghani Ali, Alghushami, Abdullah H., Alani, Sammer

    Published 2019
    “…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm by Abdulkareem, Fatimah Saleem, Mohd Sani, Nor Fazlida

    Published 2023
    “…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
    Get full text
    Get full text
    Article
  14. 14

    Cryptography: A New Approach of Classical Hill Cipher by Abdul Rahman, Mohd Nordin, Yusof, Mohd Kamir, Abidin @ Bharun, Ahmad Faisal Amri, Mohamad Usop, Nor Surayati

    Published 2013
    “…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
    Get full text
    Get full text
    Article
  15. 15

    Detecting resource consumption attack over MANET using an artificial immune algorithm by Abdelhaq, Maha, Hassan, Rosilah, Ismail, Mahamod, Israf Ali, Daud Ahmad

    Published 2011
    “…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Review of the machine learning methods in the classification of phishing attack by Jupin, John Arthur, Sutikno, Tole, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Deris, Stiawan

    Published 2019
    “…Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts by Al-Saedi, Karim Hashim Kraidi

    Published 2013
    “…It combines the following algorithms: the first algorithm is New Alert Reduction (NAR) algorithm to remove the redundancy from the alert’s file and reduce the false positives.…”
    Get full text
    Get full text
    Thesis
  18. 18

    A genetic-algorithm-based approach for audio steganography by Zamani, Mazdak, Abdul Manaf, Azizah, Ahmad, Rabiah, Zeki, Akram M., Abdullah, Shahidan

    Published 2009
    “…Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The adding or replacing a portion of the image is regarded as malicious attacks and rejected by this algorithm. Using two different watermarks lead to a good classification of incidental and malicious modifications and locating the tampered areas. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article