Now showing items 1-3 of 3
Computational intelligence algorithms to handle dimensionality reduction for enhancing intrusion detection system
(Inst Information Science, 2020)
In this paper, propose to use computational intelligence models to improve intrusion detection system, the computational intelligence algorithms are used as preprocessing steps for selecting most significant features from ...
Conceal existence of encoded data system (CEEDS)
The awareness of importance of secure sensitive Data, make growing need for the technology to store or transmission data over the network with complete confidentiality. Steganography can be used as a means of transmitting ...
Text steganography in font color of MS excel sheet
(Assoc Computing Machinery, 2018)
One of the ways to maintain the security of data transfer over the network is to encrypt the data before sending it, for the purpose of increasing data privacy and its importance. Steganography, is used to hide encrypted ...