Skip Ribbon Commands
Skip to main content

ICS

:

News: ICS/COE Seminars - 02 Mar 2016

Title

ICS/COE Seminars - 02 Mar 2016

Body

ICS/COE Seminars
 

You are cordially invited to attend the following seminar on
Wed. 2 March 2016, 2:30 pm,
Room 22-119
 
 
King Fahd University of Petroleum and Minerals
College of Computer Science and Engineering
ICS/COE Seminar Announcement
 

Speaker 1: Muhammad Jalal Khan
 
Title: Automated test data generation for branch coverage using genetic algorithm
 
Abstract: Metaheuristic search techniques such as genetic algorithm help in reducing the cost for software testing. Genetic algorithm can only be utilized properly if the parameters are not improper. With this realization, in this paper, we introduce a new approach for presenting statistically different results based on different genetic algorithm parameter settings i.e. different crossover probabilities and different mutation probabilities. These settings are 10 in number and to remove the improperness of genetic algorithm parameters, we run GA for 100 times for each of these settings. Results of these settings are statistically evaluated and determined the difference between them. Mean of the generations reached optimal solution are averaged and statistical analysis are performed over it. Average of convergences of each setting is taken and statistical analysis are performed over it. Both results are compared and statistical difference is shown.
 
Biography: Muhammad Jalal Khan is a master student in Information and Computer Science department, KFUPM. He is interested in metaheuristic algorithms such as genetic algorithm and aiming to utilize algorithms in the field of software engineering. Currently, he is working on NSGA-III (non-dominated sorting genetic algorithm).
 
 
Speaker 2: Ahmad Amro
 
Title: A Group of Cryptanalysis Attacks on Hash based Encryption Algorithms
 
Abstract: Confidentiality is a very important goal in information security. It can be ensured using different techniques, one of which is cryptography in general, encryption to be specific. When a new encryption algorithm is proposed it must be analyzed to prove its security. For that purpose, cryptanalysis is performed. Using a group of cryptanalysis techniques the security of any cryptographic system can be tested. We will discuss here a set of cryptanalysis techniques that was used to expose some security issues in a group of encryption algorithms that implements cryptographic hash functions.
 
Biography: Ahmad Amro is a KFUPM master student, studying security and information assurance. Interested in cryptography, cryptanalysis and network traffic analysis.
 
 
 
Thank you.
Dr. Alaaeldin Amin(COE)
Dr. Kanaan Faisal (ICS)
 
 

Expires

5/31/2016

DisplayItem

01

Attachments

Created at 3/2/2016 8:30 AM by Webmaster of CCSE website CCSE
Last modified at 3/2/2016 8:32 AM by Webmaster of CCSE website CCSE