Analysis of GOST 28147-89 security: methods and algorithms.
Ludmila K. BabenkoPublished in: SIN (2013)
Keyphrases
- significant improvement
- benchmark datasets
- preprocessing
- computational cost
- methods outperform
- complexity analysis
- learning algorithm
- hybrid method
- optimization methods
- problems in computer vision
- computationally intensive
- methods can be applied
- methods require
- computationally expensive
- heuristic methods
- machine learning methods
- synthetic and real data sets
- high computational complexity
- statistical analysis
- computationally demanding
- data structure
- synthetic and real datasets
- computer vision algorithms
- data mining
- computationally complex
- image processing algorithms
- mathematical models
- evaluation metrics
- search methods
- information security
- theoretical analysis
- intrusion detection
- empirical studies
- worst case
- data analysis
- computational complexity
- information systems