Skip to main content

Showing 1–2 of 2 results for author: Gody, A M

Searching in archive cs. Search in all archives.
.
  1. Enhanced Security of Symmetric Encryption Using Combination of Steganography with Visual Cryptography

    Authors: Sherief H. Murad, Amr M. Gody, Tamer M. Barakat

    Abstract: Data security is required when communications over untrusted networks takes place. Security tools such as cryptography and steganography are applied to achieve such objectives, but both have limitations and susceptible to attacks if they were used individually. To overcome these limitations, we proposed a powerful and secured system based on the integration of cryptography and steganography. The s… ▽ More

    Submitted 28 February, 2019; originally announced February 2019.

    Comments: 6 pages, 10 figures, 1 table

    Journal ref: International Journal of Engineering Trends and Technology (IJETT)2018

  2. Relevant Feature Selection Model Using Data Mining for Intrusion Detection System

    Authors: Ayman I. Madbouly, Amr M. Gody, Tamer M. Barakat

    Abstract: Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion detection system (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect anomalies. However with the huge amount of network traffic, collected data contai… ▽ More

    Submitted 30 March, 2014; originally announced March 2014.

    Comments: 12 Pages, 3 figures, 5 tables, Published with "International Journal of Engineering Trends and Technology (IJETT)". arXiv admin note: text overlap with arXiv:1208.5997 by other authors without attribution

    Journal ref: International Journal of Engineering Trends and Technology (IJETT), V9(10),501-512 March 2014