Search Results - (( based applications security algorithm ) OR ( _ application means algorithm ))*
Search alternatives:
- based applications »
- application means »
- means algorithm »
-
1
-
2
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper -
3
-
4
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…DES algorithm uses public-key system means the algorithm for encrypting and decrypting a message is public know. …”
Get full text
Get full text
Thesis -
5
-
6
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
7
Development of DNA-based dynamic key-dependent block cipher
Published 2015Get full text
Get full text
Thesis -
8
-
9
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
10
-
11
A hybrid intrusion detection system based on different machine learning algorithms
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…Unmanned Aerial Vehicles (UAVs) have a lot of potential for developing new applications in a variety of fields, such as traffic monitoring, security, and military applications. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…This thesis proposed a digital text based watermarking algorithm combined with Pseudo-Random Number Generator(PRNG) for cryptography application. …”
Get full text
Get full text
Get full text
Thesis
