Browsing by Supervisor "48187"
Now showing items 1-11 of 11
-
Analysis and evaluation of quantum key distribution protocols
(2020)Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ... -
Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack
(2018)Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ... -
A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce
(2017-07)Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ... -
A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system
(2018)RESEARCH QUESTIONS: •How Hashgraphy can be applied for real-time tracking of an object? •How Hashgraphy can be used to deliver real-time data from weather to traffic conditions by the tracking system? •How can Hashgraphy ... -
Detecting Sybil attack in mobile wireless sensor networks using observer nodes
(2019)RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows: How many observer nodes would be enough for a ... -
An edge-based steganography algorithm for hiding text into images
(2019)RESEARCH QUESTIONS: • How can I improve existing steganography methods in terms of capacity and transparency? • How can I reduce the complexity of existing steganography methods? • How can I increase the robustness ... -
Encryption, storage technology and security of data at rest
(2015-11)The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ... -
Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance
(2016)RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance ... -
A hybrid intelligent intrusion detection system for advanced persistent threats
(2020)RESEARCH MOTIVATION: The objective of this research is to investigate how to increase the detection rate and increase the tracking rate of APT and TA in their early attack phases within an environment of distributed ... -
A new approach for the prevention of sinkhole attack in mobile wireless sensor networks
(2023)RESEARCH QUESTIONS Main research question is: Is it possible to prevent a sinkhole attack on MWSN using a combination of Blowfish and RSA algorithms? Then it was broken down into the following questions: Q1: What would ... -
Performance analysis of defense mechanisms against UDP flood attacks
(2014)A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ...