Search Results - ((detection algorithm) OR (((pollination algorithm) OR (encryption algorithm))))

Search alternatives:

Refine Results
  1. 1

    Features selection for IDS in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment by Khalifa, Othman Omran, Ahmed, Muhammed Zaharadeen, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…This paper presents the design, simulation, and performance measurement of Simon encryption algorithm in IoT environment. Simon algorithm is a lightweight encryption algorithm which suitable for resource constraint environment like IoT devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Features selection for ids in encrypted traffic using genetic algorithm by Barati, Mehdi, Abdullah, Azizol, Mahmod, Ramlan, Mustapha, Norwati, Udzir, Nur Izura

    Published 2013
    “…An encrypted malicious traffic is able to evade the detection by IDS. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Location based services of nearest petrol station using asymmetric key algorithm / Muhammad Awwab Mohd Amdan by Mohd Amdan, Muhammad Awwab

    Published 2014
    “…El-gamal encryption system is an asymmetric key encryption algorithm which is based on the Diffie-Hellman key exchange. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Comparative Performance Analysis of Flower Pollination Algorithm and Harmony Search based strategies: A Case Study of Applying Interaction Testing in the Real World by Nasser, Abdul B., Alsewari, Abdulrahman A., Mu’azu, Aminu A., Kamal Z., Zamli

    Published 2016
    “…In this paper, we present a comparison between two strategies, Harmony Search (HS) and Flower Pollination Algorithm (FPA) based strategies. Our experiments have performed on a real-world case study. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This problem will be solved by encrypting the signals, using the proposed fully homomorphic encryption (FHE) technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Tracking of moving athlete from video sequences using fower pollination algorithm by Ong, Pauline, Chong, Tang Keat, Ong, Kok Meng, Low, Ee Soong

    Published 2022
    “…In this study, for the frst time the fower pollination algorithm (FPA) is utilised to track the motion of the moving athlete from the sports video. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  14. 14
  15. 15

    An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin by Amiruddin, Amir Herman

    Published 2014
    “…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. Further investigation clearly showed it was because DPI failed to detect encrypted P2P hosts compared to DPI. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features by Keshkeh, Kinan

    Published 2022
    “…This study also investigates TLSMalDetect detection performance using seven ML classification algorithms and identifies the one with the highest accuracy.…”
    Get full text
    Get full text
    Thesis
  17. 17

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19

    Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza

    Published 2006
    “…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. The algorithm is based on the Clonalg algorithm developed by de Castro and Von Zuben. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A Hybrid Artificial Intelligence Model for Detecting Keratoconus by Alyasseri Z.A.A., Al-Timemy A.H., Abasi A.K., Lavric A., Mohammed H.J., Takahashi H., Milhomens Filho J.A., Campos M., Hazarbassanov R.M., Yousefi S.

    Published 2023
    “…This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. …”
    Article