Search Results - (( course estimation path algorithm ) OR ( related information security algorithm ))

Refine Results
  1. 1
  2. 2

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…Malware has emerged as a cyber security threat that continuously changes to target computer systems, smart devices, and extensive networks with the development of information technologies. …”
    Article
  8. 8

    An Intelligent System Approach to the Dynamic Hybrid Robot Control by Md. Yeasin, Md. Mahmud Hasan

    Published 1996
    “…A one-pass smoothing algorithm was used to generate a practical smooth trajectory path in near real time. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Deployment of new dynamic cryptography buffer for SCADA security enhancement by Aamir, Shahzad, Musa, Shahrulniza, M., Irfan, Shah, Asadullah

    Published 2014
    “…The DCB contains several fields/sub-fields which have been used during implementation of cryptography algorithm and other information ( or detail) related with protocol security. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…Deductively, the proposed KD-3D-CA block cipher algorithm is more secure than other block cipher algorithms and can be implemented for data encryption and decryption.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Over all, this research proposes a set of solutions to address privacy and security issues related to Modbus/TCP networks in WDS. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Doctor-patient remote consultation system with secure medical images by Teh, Yee Heng

    Published 2022
    “…This will make us become more vulnerable to cyber-crime and illegal data exploitation. Hence, security of our privacy information had becoming a tricky trouble to deal with. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    WEBCAM MOTION DETECTION USINGVISUAL BASIC by Abdullah, Ilyana

    Published 2005
    “…Combination of several related algorithms helps in developing the skin tones algorithm. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Steganography in webpages using CSS color attributes enhanced by rule-based system by Nehzati, Seyedeh Sheida

    Published 2016
    “…Integrity is ensured against any modification attempts to the stego-web object through the introduction of Secure Hash Algorithm based checksum (SHA1) in the cookies. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming by Zun Liang, Chuan, Tham, Ren Sheng, Tan, Chek Cheng, Abraham Lim, Bing Sern, David Lau, King Luen, Chong, Yeh Sai

    Published 2024
    “…Furthermore, the insights generated from this research have implications for shaping policies and regulations related to food security and agricultural sustainability.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…This thesis intends to provide a reference finding for newcomers in security designs and to promote more activities in these security issues. …”
    Get full text
    Get full text
    Get full text
    Thesis