Search Results - (( based application new algorithm ) OR ( its applications security algorithm ))*
Search alternatives:
- based application »
- its applications »
- application new »
- new algorithm »
-
1
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
2
-
3
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
5
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
6
-
7
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
8
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
9
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009Get full text
Get full text
Get full text
Article -
10
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
12
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
13
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
14
Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof
Published 2021“…It can be concluded that Enhanced 3D-AES meets the standard security requirements for block cipher design. It is strongly suggested to implement Enhanced 3D-AES in software applications to secure data transmission.…”
Get full text
Get full text
Thesis -
15
Glass break detection system using deep auto encoders with fuzzy rules induction algorithm
Published 2019“…Main uses of glass windows in commercial and residential buildings are prevalent. While a glass-based material has its advantages, it also poses security risks. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
17
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
18
-
19
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Published 2023“…The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. …”
Get full text
Get full text
Get full text
Article
