Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Mohammad Basheri"'
Autor:
Muhammad Awais, Muhammad Javed Iqbal, Iftikhar Ahmad, Madini O. Alassafi, Rayed Alghamdi, Mohammad Basheri, Muhammad Waqas
Publikováno v:
IEEE Access, Vol 7, Pp 121236-121244 (2019)
Real-time security requirements continue to increase due to the occurrence of various suspicious activities in open and closed environments. Day-to-day security threats may seriously affect everyone lives. Many techniques have been introduced in this
Externí odkaz:
https://doaj.org/article/c3f568a09e5749de8d32d70cd0fcf8bd
Publikováno v:
IEEE Access, Vol 7, Pp 39794-39805 (2019)
Pseudorandom number generators (PRNGs) are important in cryptography and have been used in several security applications, such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PRNGs is a critica
Externí odkaz:
https://doaj.org/article/8b27b48a4e0c481f8fe3b1db420286b7
Publikováno v:
IEEE Access, Vol 6, Pp 33789-33795 (2018)
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an
Externí odkaz:
https://doaj.org/article/d1a60b7c4dbf41c08cb03db89a66d5a4
Publikováno v:
Journal of Medical Imaging and Health Informatics. 10:2459-2465
The size of data gathered from various ongoing biological and clinically studies is increasing at an exponential rate. The bio-inspired data mainly comprises of genes of DNA, protein and variety of proteomics and genetic diseases. Additionally, DNA m
Publikováno v:
IEEE Access, Vol 7, Pp 39794-39805 (2019)
Pseudorandom number generators (PRNGs) are important in cryptography and have been used in several security applications, such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PRNGs is a critica
Publikováno v:
IEEE Access, Vol 6, Pp 33789-33795 (2018)
Articles
Articles
Intrusion detection is a fundamental part of security tools, such as adaptive security appliances, intrusion detection systems, intrusion prevention systems, and firewalls. Various intrusion detection techniques are used, but their performance is an