Search Results - (( using attack problems algorithm ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- using attack »
- problems »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
3
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Case studies were conducted to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. Kruskal Wallis test and calculation of the success rate in attacking were used to evaluate the capability of the proposed methods in mitigating shoulder-surfing attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Phishing attack detection using machine learning method
Published 2019“…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
7
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We have also carried out a comparative study on the performance of the adaptive GA used in this problem against the conventional GA. …”
Get full text
Get full text
Article -
8
-
9
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
10
-
11
An efficient attack detection for Intrusion Detection System (IDS) in internet of medical things smart environment with deep learning algorithm
Published 2023“…Additionally, the results of the deep learning algorithms will be evaluated using five confusion matrices, namely, accuracy, precision, recall, F1Score, and false-positive rate). …”
Get full text
Get full text
Article -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
Get full text
Get full text
Thesis -
14
Detecting resource consumption attack over MANET using an artificial immune algorithm
Published 2011“…This paper’s objective is to utilize the biological model used in the dendritic cell algorithm (DCA) to introduce a Dendritic Cell Inspired Intrusion Detection Algorithm (DCIIDA). …”
Get full text
Get full text
Get full text
Article -
15
Improving intrusion detection using genetic algorithm
Published 2013“…To overcome this problem, a genetic algorithm approach is proposed. …”
Get full text
Get full text
Get full text
Article -
16
Review of the machine learning methods in the classification of phishing attack
Published 2019“…Based on the literature, the machine learning method is widely used to prevent phishing attacks. There are several algorithms that can be used in the machine learning method to prevent these attacks. …”
Get full text
Get full text
Get full text
Article -
17
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
18
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
Published 2019“…This paper proposes a solution for detecting black hole attacks on MANET by using harmony search algorithm (DBHSA), which uses harmony search algorithm (HSA) to mitigate the lateness problem caused by cooperative bait detection scheme (CBDS). …”
Get full text
Get full text
Get full text
Book Chapter -
19
Cryptography: A New Approach of Classical Hill Cipher
Published 2013“…Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. …”
Get full text
Get full text
Article -
20
Detecting Remote-To-Local (R2L) attack using Decision Tree algorithm / Ahmad Nasreen Aqmal Mohd Nordin
Published 2024“…The background study emphasizes the increasing significance of network security and the prevalence of various types of network intrusion attacks, particularly Remote to Local (R2L) attacks. …”
Get full text
Get full text
Thesis
