-
1
A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications
Published 2018-05-01“…So, it will be difficult for hackers to perform Man in the Middle (MitM) attacks.…”
Get full text
Article -
2
CATEGORIES OF COMPUTER SYSTEMS ALGORITHMS
Published 2016-11-01Subjects: “…algorithm…”
Get full text
Article -
3
Detection and Analysis of Man-Machine Interactive Software Vulnerabilities Based on Ultrasonic Data Acquisition and Signal Processing Algorithms
Published 2021-01-01“…The simulation experiment results prove that the ultrasonic data acquisition and signal processing algorithms are effective and can support the detection and analysis of man-machine interactive software vulnerabilities.…”
Get full text
Article -
4
-
5
Lightweight Anomaly-Based Detection Using Cuckoo Search Algorithm and Decision Tree to Mitigate Man-in-the-Middle Attacks in DNS
Published 2025-04-01Subjects: “…man-in-the-middle attacks…”
Get full text
Article -
6
Formulation of multicriteria problem of routing and scheduling of manned and unmanned aircraft in a dynamic environment and approach to its solution using genetic algorithms
Published 2018-10-01“…The article deals with the multi-criteria task of routing and scheduling of unmanned and manned aircraft using the method of penalty functions. …”
Get full text
Article -
7
Analysis of TaqMan Array Cards Data by an Assumption-Free Improvement of the maxRatio Algorithm Is More Accurate than the Cycle-Threshold Method.
Published 2016-01-01“…These results suggested that the assumption-free MR algorithm was more reliable than the CT method, with clear advantages for the diagnostic settings.…”
Get full text
Article -
8
Distributed Sparse Manifold-Constrained Optimization Algorithm in Linear Discriminant Analysis
Published 2025-03-01“…Each step of the algorithm has an explicit solution. Simulation experiments have verified the correctness and effectiveness of this method. …”
Get full text
Article -
9
A multilayer deep autoencoder approach for cross layer IoT attack detection using deep learning algorithms
Published 2025-03-01“…This technology effectively safeguards against various cyber threats, including Man-in-the-Middle attacks at the network layer and Distributed Denial of Service (DDoS) attacks at the transport layer of IoT networks. …”
Get full text
Article -
10
-
11
DEFINITION AND ANALYSIS OF MOTION ACTIVITY AFTER-STROKE PATIENT FROM THE VIDEO STREAM
Published 2014-10-01Subjects: “…motion activity of man…”
Get full text
Article -
12
Quantum-annealing-inspired algorithms for multijet clustering
Published 2025-05-01Get full text
Article -
13
-
14
The Opposition “Man – Machine” in the Language Picture of the World of the 21 Century
Published 2022-06-01“…The reflection of the idea of the transformation of humanism in modern speech practice is considered by the example of rethinking the fundamental opposition of the culture “Man – Machine”. In the digital era, the boun dary within this opposition is blurred: “humanization” of programs and algorithms takes place in parallel with the opposite process – “dehumanization” of live persons, and both processes are quite consistently reflected in the language. …”
Get full text
Article -
15
Exact Algorithms for Practical Instances of the Railcar Loading Problem at Marine Container Terminals
Published 2022-01-01Get full text
Article -
16
EGNAS: Efficient Graph Neural Architecture Search Through Evolutionary Algorithm
Published 2024-12-01Get full text
Article -
17
Preventing man-in-the-middle attacks in DNS through certificate less signature
Published 2021-12-01“…Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency and security of authentication.By using symmetric encryption technology, the proposed solution ensured the confidentiality of the message and increase the attack difficulty.The theoretical analysis proved the proposed scheme can resist common man-in-the-middle attacks.Experimental comparison results show the scheme has better performance than similar schemes.…”
Get full text
Article -
18
Research on the eLoran/GNSS Combined Positioning Algorithm and Altitude Optimization
Published 2025-02-01Get full text
Article -
19
-
20
Energy efficient cooperative spectrum sensing algorithm in cognitive wireless sensor networks
Published 2015-03-01Get full text
Article