2024
DOI: 10.4018/979-8-3693-4159-9.ch005
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Machine Learning Approaches on Security Analysis of Cryptographic Algorithms

Suresh Anand M.,
Anitha K.,
Devipriya A.
et al.

Abstract: The distributed denial of service (DDoS) assault was a kind of intrusion in the cloud computing environment that severely affects the end user by injecting illegitimate packets. To obtain performance, a hybrid improved wolf optimizer with asymmetric key Goldwasser cryptography (IWO-AKGC) algorithm was proposed based on combining the exploitation ability of security and exploration capability of machine learning. In addition to the selection of parameters, a proposed hybrid IWO-AKGC technique is used for weight… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 20 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?