Search Results - (( wolf optimization mead algorithm ) OR ( rate information security algorithm ))
Search alternatives:
- wolf optimization »
- optimization mead »
- rate information »
- mead algorithm »
-
1
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…These algorithms and methods provide fast and high rate of detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Total average for bit error rate of 30 images is 0.59233. Average above 0.5 prove that the level of security encryption and decryption is very high and secure.…”
Get full text
Get full text
Thesis -
3
-
4
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
5
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The security of sensitive information against ‘prying eyes’ has been of prime concern throughout the centuries. …”
Get full text
Get full text
Thesis -
6
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The present situation demands extremely secured details of patients. Consequently, securing the patient's information from ransomware is the main challenge in the healthcare industry. …”
Get full text
Get full text
Article -
7
An enhanced fingerprint template protection scheme
Published 2022“…The matching/recognition performance evaluation produced higher verification rates and a low false rejection rate. The rates were 99.10 % and 0.90%, respectively. …”
Get full text
Get full text
Thesis -
8
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
9
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
10
Improving intrusion detection using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
Published 2024journal::journal article -
14
Design of information hiding algorithm for multi-link network transmission channel
Published 2019“…The average time spent on hiding information is 2.04 s, indicating that the algorithm has high information hiding rate and storage efficiency.…”
Get full text
Get full text
Get full text
Article -
15
-
16
Secure and Energy-Efficient Data Aggregation Method Based on an Access Control Model
Published 2019“…The secure node authentication algorithm prevents attacks from accessing the network. …”
Get full text
Get full text
Article -
17
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…This shows the proposed encryption algorithm is better, with superior results for correlation results close to zero and Information Entropy (IE) larger than 7.999. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…Hence, a digital watermarking procedure is needed to detect any changes in of the original information in document becomes necessary. A framework of enhanced authentication for PDF textual documents using Zigzag-lsb embedding algorithm is proposed in order to apply a new technique of watermarking scheme which can be used in general size of document, to study the current numbering of watermarking system to secure the authentication of digital documents, and evaluate the watermarking scheme for digital documents in terms of accuracy rate, and analyse the performance. …”
Get full text
Get full text
Thesis
