Printer Friendly

Browse Algorithms topic

Safety and security measures subtopic

Articles

1-77 out of 77 article(s)
Title Author Type Date Words
A Lightweight Cryptography Algorithm for Secure Smart Cities and IOT. Abed, Ahmed Mohsin; Boyaci, Ali Report Jul 14, 2020 3746
Abnormal User Detection Based on the Correlation Probabilistic Model. Yang, Xiaohui; Sun, Ying Jun 30, 2020 7007
CNID: Research of Network Intrusion Detection Based on Convolutional Neural Network. Liu, Guojie; Zhang, Jianbiao Jun 30, 2020 6884
Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Sassani, Bahman A.; Alkorbi, Mohammed; Jamil, Noreen; Naeem, M. Asif; Mirza, Farhaan Report Jun 30, 2020 5134
An Encrypted Speech Retrieval Scheme Based on Long Short-Term Memory Neural Network and Deep Hashing. Zhang, Qiu-yu; Li, Yu-zhou; Hu, Ying-jie Jun 1, 2020 9999
Parallel Encryption of Noisy Images Based on Sequence Generator and Chaotic Measurement Matrix. Yu, Jiayin; Xie, Yaqin; Guo, Shiyu; Zhou, Yanqi; Wang, Erfu May 31, 2020 9111
A Distributed Computing Real-Time Safety System of Collaborative Robot. Gradolewski, Dawid; Maslowski, Dawid; Dziak, Damian; Jachimczyk, Bartosz; Mundlamuri, Siva Teja; Pra Apr 1, 2020 7444
A Safety Collision Avoidance Algorithm Based on Comprehensive Characteristics. Zhang, Y.J.; Du, F.; Wang, J.; Ke, L.S.; Wang, M.; Hu, Y.; Yu, M.; Li, G.H.; Zhan, A.Y. Mar 31, 2020 7754
Cyber-Physical Security with RF Fingerprint Classification through Distance Measure Extensions of Generalized Relevance Learning Vector Quantization. Bihl, Trevor J.; Paciencia, Todd J.; Bauer, Kenneth W., Jr.; Temple, Michael A. Mar 31, 2020 8033
Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism. Xiao, Shenyong; Yu, ZhiJun; Deng, YaShuang Mar 31, 2020 5772
Optimizing Airport Land Side Operations: Check-In, Passengers' Migration, and Security Control Processes. Adacher, Ludovica; Flamini, Marta Mar 31, 2020 8488
Secure Lightweight IoT Integrated RFID Mobile Healthcare System. Naresh, Vankamamidi S.; Reddi, Sivaranjani; Murthy, Nistala V.E.S. Mar 31, 2020 6751
A Comparative Study of Four Metaheuristic Algorithms, AMOSA, MOABC, MSPSO, and NSGA-II for Evacuation Planning. Niyomubyeyi, Olive; Sicuaio, Tome Eduardo; Gonzalez, Jose Ignacio Diaz; Pilesjo, Petter; Mansourian, Report Jan 1, 2020 11341
Estimating the Relative Speed of RF Jammers in VANETs. Kosmanos, Dimitrios; Argyriou, Antonios; Maglaras, Leandros Dec 31, 2019 14136
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition. Zhang, ShuaiWei; Yang, XiaoYuan; Chen, Lin; Zhong, Weidong Nov 30, 2019 5117
Detecting Malicious Social Robots with Generative Adversarial Networks. Wu, Bin; Liu, Le; Dai, Zhengge; Wang, Xiujuan; Zheng, Kangfeng Report Nov 1, 2019 10432
Automatic Identification of Honeypot Server Using Machine Learning Techniques. Huang, Cheng; Han, Jiaxuan; Zhang, Xing; Liu, Jiayong Oct 31, 2019 5124
A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification. Nejad, Maryam Safarian; Malakooti, Mohammad V.; Taba, Navid Hashemi Oct 1, 2019 4637
Researchers Hail the Demise of an Online Security Algorithm. Jul 1, 2019 404
A Revocable Attribute-based Cloud Security for Data Access using Encryption and Biometric Identification. Nejad, Maryam Safarian; Malakooti, Mohammad V.; Taba, Navid Hashemi Jul 1, 2019 4617
Boosting the Face Recognition Performance of Ensemble Based LDA for Pose, Non-uniform Illuminations, and Low-Resolution Images. Ul Haq, Mahmood; Shahzad, Aamir; Mahmood, Zahid; Shah, Ayaz Ali; Muhammad, Nazeer; Akram, Tallha Jun 1, 2019 8331
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. Zhou, Yu; Wei, Yongzhuang; Zhang, Fengrong Apr 30, 2019 13349
Security Measure for Image Steganography Based on High Dimensional KL Divergence. Song, Haitao; Tang, Guangming; Sun, Yifeng; Gao, Zhanzhan Apr 30, 2019 7600
A Cooperative Jamming Based Joint Transceiver Design for Secure Communications in MIMO Interference Channels. Huang, Boyang; Kong, Zhengmin; Fang, Yanjun; Jin, Xin Report Apr 1, 2019 6567
The Security DV-Hop Algorithm against Multiple-Wormhole-Node-Link in WSN. Li, Jianpo; Wang, Dong Report Apr 1, 2019 9246
Image Encryption with The Cross Diffusion of Two Chaotic Maps. Jiao, Ge; Peng, Xiaojiang; Duan, Kaiwen Report Feb 1, 2019 5512
AM I AN ALGORITHM OR A PRODUCT? WHEN PRODUCTS LIABILITY SHOULD APPLY TO ALGORITHMIC DECISION-MAKERS. Chagal-Feferkorn, Karni A. Jan 1, 2019 27504
A new algorithm improves flight safety and reduce delays. Dec 14, 2018 440
A new algorithm improves flight safety and reduce delays. Dec 14, 2018 440
Modified Advanced Encryption Standard Algorithm for Reliable Real-Time Communications. Eltatar, Mahmoud A.; Abu-Hudrouss, Ammar M. Sep 1, 2018 3918
Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm. Reyes, Ariel Roy L.; Festijo, Enrique D.; Medina, Ruji P. Report Apr 1, 2018 4568
A Rapid UAV Image Georeference Algorithm Developed for Emergency Response. Wang, Shumin; Ding, Ling; Chen, Zihan; Dou, Aixia Jan 1, 2018 5045
Research on a Conflict Early Warning System Based on the Active Safety Concept. Shen, Bozhao; Zhang, Zhiqing; Liu, Hao; Li, Shiyun; Zhao, Lei Jan 1, 2018 6009
Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem. Liu, Zeyu; Xia, Tiecheng; Wang, Jinbo Jan 1, 2018 6627
Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Huang, Qinlong; He, Yue; Yue, Wei; Yang, Yixian Jan 1, 2018 7208
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Saha, Rahul; Geetha, G.; Kumar, Gulshan; Kim, Tai-hoon Jan 1, 2018 7945
Reversible Data Hiding with Pixel Prediction and Additive Homomorphism for Encrypted Image. Yu, Chunqiang; Zhang, Xianquan; Tang, Zhenjun; Chen, Yan; Huang, Jingyu Jan 1, 2018 8488
Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis. Hu, Hao; Liu, Yuling; Zhang, Hongqi; Zhang, Yuchen Jan 1, 2018 8505
LA-GRU: Building Combined Intrusion Detection Model Based on Imbalanced Learning and Gated Recurrent Unit Neural Network. Yan, Binghao; Han, Guodong Jan 1, 2018 8874
A Tidal Level Prediction Approach Based on BP Neural Network and Cubic B-Spline Curve with Knot Insertion Algorithm. Wang, Wenjuan; Yuan, Hongchun Jan 1, 2018 5751
AN-Aided Transmit Beamforming Design for Secured Cognitive Radio Networks with SWIPT. Ge, Weili; Zhu, Zhengyu; Wang, Zhongyong; Yuan, Zhengdao Jan 1, 2018 7024
Intrusion Detection System Based on Decision Tree over Big Data in Fog Environment. Peng, Kai; Leung, Victor C.M.; Zheng, Lixin; Wang, Shangguang; Huang, Chao; Lin, Tao Jan 1, 2018 6238
A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification. Thammarat, Chalee; Kurutach, Werasak Jan 1, 2018 16508
A Security Situation Prediction Algorithm Based on HMM in Mobile Network. Liang, Wei; Long, Jing; Chen, Zuo; Yan, Xiaolong; Li, Yanbiao; Zhang, Qingyong; Li, Kuan-Ching Jan 1, 2018 7284
An Efficient Security System for Mobile Data Monitoring. Liu, Likun; Zhang, Hongli; Yu, Xiangzhan; Xin, Yi; Shafiq, Muhammad; Ge, Mengmeng Jan 1, 2018 6393
Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier. Lee, Jinlee; Park, Dooho; Lee, Changhoon Report Oct 1, 2017 6176
A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction. Xia, Yunhao; Hong, Hanshu; Lin, Guofeng; Sun, Zhixin Report Sep 1, 2017 7342
The dark secret at the heart of AI: no one really knows how the most advanced algor I thms do what they do. That could be a serious problem as computers become more respons I ble for making important decisions. Knight, Will May 1, 2017 3157
Area efficiency and high speed implementation of cryptography using hash function and RSA algorithm. Jayakumar, S.; Sumathi, A.; Kumar, P. Santhosh; Suganthan, M.; Hanies, S. Syed Apr 30, 2017 2449
DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks. Mohamed, M.A.; Samrah, Ahmed Shaaban; Allah, Mohamed Ismail Fath Report Jan 1, 2017 5502
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform. Koppu, Srinivas; Viswanatham, V. Madhu Report Jan 1, 2017 7899
Health Monitoring System for Nursing Homes with Lightweight Security and Privacy Protection. Jiang, Yu'e; Liu, Jiaxiang Jan 1, 2017 6608
Anomaly Detection for Aviation Safety Based on an Improved KPCA Algorithm. Zhang, Xiaoyu; Chen, Jiusheng; Gan, Quan Jan 1, 2017 4860
Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map. Zhao, Jian-Feng; Wang, Shu-Ying; Zhang, Li-Tao; Wang, Xiao-Yan Jan 1, 2017 3816
A Bayesian Network Approach to Causation Analysis of Road Accidents Using Netica. Zou, Xin; Yue, Wen Long Report Jan 1, 2017 9824
An Effective Conversation-Based Botnet Detection Method. Chen, Ruidong; Niu, Weina; Zhang, Xiaosong; Zhuo, Zhongliu; Lv, Fengmao Report Jan 1, 2017 5525
An Improved Clustering Method for Detection System of Public Security Events Based on Genetic Algorithm and Semisupervised Learning. Wang, Heng; Zhao, Zhenzhen; Guo, Zhiwei; Wang, Zhenfeng; Xu, Guangyin Report Jan 1, 2017 6686
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings. Zhou, Caixue; Zhao, Zhiqiang; Zhou, Wan; Mei, Yuan Report Jan 1, 2017 15158
Research on the network security based on PrefixSpan algorithm in data mining. Zhang, Hao; Ye, Zhanxiang Aug 1, 2016 4403
Enhancing data integrity assurance through detection of data violation using block based determinant approach on cloud storage. Premkumar, P.; Shanthi, D.; Jeevanandha, M. Jun 30, 2016 3202
Lightweight encryption design for embedded security. Anupama, G.; Iyappan, M.; Karpagam, M. Report Jun 15, 2016 2654
Safety Assessment for Electrical Motor Drive System Based on SOM Neural Network. Meng, Linghui; Wang, Peizhen; Liu, Zhigang; Qiu, Ruichang; Wang, Lei; Xu, Chunmei Report Jan 1, 2016 4099
A Comparison of Local Search Methods for the Multicriteria Police Districting Problem on Graph. Liberatore, F.; Camacho-Collados, M. Jan 1, 2016 8374
Structural Safety Monitoring of High Arch Dam Using Improved ABC-BP Model. Zhu, Yantao; Gu, Chongshi; Zhao, Erfeng; Song, Jintao; Guo, Zhiyun Jan 1, 2016 5503
Conserving operative discretion under disclosed limitations using cloud. Basha, S. Alaudeen; Vijayakumar, V. Report Aug 1, 2015 2224
An anamoly based Intrusion Detection System for mobile ad-hoc networks using genetic algorithm based support vector machine. Mukesh, K.G.; Khanna, H. Priyanka; Velvizhi, R.V. Report Aug 1, 2015 2722
Comparison of serpent, Twofish and Rijndael encryption algorithms in tele-ophthalmology system. Naeemabadi, Mohammadreza; Ordoubadi, Behnam Sadeghi; Dehnavi, Alireza Mehri; Bahaadinbeigy, Kambiz Report Apr 1, 2015 5203
A process-aware security task scheduling algorithm. Zhang, Tao; Ma, Yuanyuan; Zhou, Cheng; Li, Tao Report Oct 1, 2014 4608
Impact of dual placement and routing on WDDL netlist security in FPGA. Amouri, Emna; Mehrez, Habib; Marrakchi, Zied Jan 1, 2014 11323
Algorithm of investment safety ranking assessment: threats analysis. Kharlamova, Ganna Dec 1, 2013 5438
Secure digital certificate design based on the RSA algorithm. Zhong, Yunsheng Report Dec 1, 2013 3443
Road accident prediction model for the roads of national significance of Lithuania/Eismo ivykiu prognozavimo modelis lietuvos valstybines reiksmes automobiliu keliams/Lietuvas nacionalas nozimes autocelu cela satiksmes negadijumu prognozesanas modelis/Leedu riigimaanteede liiklusonnetuste ennustusmudel. Jasiuniene, Vilma; Cygas, Donatas Report Mar 1, 2013 4997
Lack of Encryption Knowledge Feeding Hackers. Oct 21, 2011 482
Botnet propagation via public websited detection algorithm/Botnet plitimo viesuose interneto tinkluose aptikimo algoritmas. Juknius, Jonas; Cenys, Antanas Report Feb 1, 2011 1748
A proposed algorithm using DNA-based cryptography and steganography techniques. tantawi, Mostafa Reda El; Ali, Amr Mohamed Abd El Shafouk Report Oct 1, 2010 6069
Safety in numbers: mathematics offers innovative weapons for fighting terrorism. Sanders, Laura Report Jul 17, 2010 2475
Theoretical research regarding the active safety systems. Beles, Horia; Preda, Ion; Dragomir, George; Blaga, Vasile; Ardelean, Felician Report Jan 1, 2008 1202

Terms of use | Privacy policy | Copyright © 2020 Farlex, Inc. | Feedback | For webmasters