Showing 1 - 20 results of 341 for search '(man OR mainy) algorithm', query time: 0.12s Refine Results
  1. 1

    A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications by Aji Purwinarko, Wahyu Hardyanto

    Published 2018-05-01
    “…So, it will be difficult for hackers to perform Man in the Middle (MitM) attacks.…”
    Get full text
    Article
  2. 2

    CATEGORIES OF COMPUTER SYSTEMS ALGORITHMS by A. V. Poltavskiy, E. Y. Rusyaeva

    Published 2016-11-01
    Subjects: “…algorithm…”
    Get full text
    Article
  3. 3

    Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms by Lei Zhao

    Published 2021-01-01
    “…The simulation experiment results prove that the ultrasonic data acquisition and signal processing algorithms are effective and can support the detection and analysis of man-machine interactive software vulnerabilities.…”
    Get full text
    Article
  4. 4
  5. 5
  6. 6

    Formulation of multicriteria problem of routing and scheduling of manned and unmanned aircraft in a dynamic environment and approach to its solution using genetic algorithms by G. N. Lebedev, V. B. Malygin, D. A. Mikhaylin, T. Byo

    Published 2018-10-01
    “…The article deals with the multi-criteria task of routing and scheduling of unmanned and manned aircraft using the method of penalty functions. …”
    Get full text
    Article
  7. 7

    Analysis of TaqMan Array Cards Data by an Assumption-Free Improvement of the maxRatio Algorithm Is More Accurate than the Cycle-Threshold Method. by Luigi Marongiu, Eric Shain, Lydia Drumright, Reidun Lillestøl, Donald Somasunderam, Martin D Curran

    Published 2016-01-01
    “…These results suggested that the assumption-free MR algorithm was more reliable than the CT method, with clear advantages for the diagnostic settings.…”
    Get full text
    Article
  8. 8

    Distributed Sparse Manifold-Constrained Optimization Algorithm in Linear Discriminant Analysis by Yuhao Zhang, Xiaoxiang Chen, Manlong Feng, Jingjing Liu

    Published 2025-03-01
    “…Each step of the algorithm has an explicit solution. Simulation experiments have verified the correctness and effectiveness of this method. …”
    Get full text
    Article
  9. 9

    A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms by K. Saranya, A. Valarmathi

    Published 2025-03-01
    “…This technology effectively safeguards against various cyber threats, including Man-in-the-Middle attacks at the network layer and Distributed Denial of Service (DDoS) attacks at the transport layer of IoT networks. …”
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    The Opposition “Man – Machine” in the Language Picture of the World of the 21 Century by Elena V. Marinova

    Published 2022-06-01
    “…The reflection of the idea of the transformation of humanism in modern speech practice is considered by the example of rethinking the fundamental opposition of the culture “Man – Machine”. In the digital era, the boun dary within this opposition is blurred: “humanization” of programs and algorithms takes place in parallel with the opposite process – “dehumanization” of live persons, and both processes are quite consistently reflected in the language. …”
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Preventing man-in-the-middle attacks in DNS through certificate less signature by Yang HU, Zengjie HAN, Guohua YE, Zhiqiang YAO

    Published 2021-12-01
    “…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
    Get full text
    Article
  18. 18
  19. 19
  20. 20