Search Results - (( based data optimization algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- data optimization »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network
Published 2020“…Based on the performance evaluation, GACS outperforms both Genetic Algorithm (GA)-based cluster optimization algorithm and Cuckoo Search (CS)-based multi-hop optimization algorithm.…”
Get full text
Get full text
Article -
10
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…BOCEDS clusters the data stream in a single stage. The algorithm summarizes the data from data stream in micro-clusters. …”
Get full text
Get full text
Thesis -
11
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…In this study, Particle Swarm Optimization (PSO) based clustering algorithm is exploited to optimize the results of other clustering algorithm such as K-means. …”
Get full text
Get full text
Get full text
Thesis -
12
Data-Driven control based on marine predators algorithm for optimal tuning of the wind plant
Published 2022“…Comparative results alongside other existing metaheuristic-based algorithms further confirmed excellence of the proposed method through its superior performance against the slime mould algorithm (SMA), multi-verse optimizer (MVO), sine-cosine algorithm (SCA), grey wolf optimizer (GWO), and safe experimentation dynamics (SED) algorithm.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Data-driven continuous-time Hammerstein modeling with missing data using improved Archimedes optimization algorithm
Published 2024“…This research introduces the improved Archimedes optimization algorithm (IAOA) for data-driven modeling of continuous-time Hammerstein models with missing data. …”
Get full text
Get full text
Get full text
Article -
14
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…GA is a widely used optimization algorithm based on the concept of survival of the fittest. …”
Get full text
Get full text
Thesis -
15
A Conceptual Framework of Bacterial Foraging Optimization Algorithm for Data Classification
Published 2016“…Most previous works on Bacterial Foraging Optimization Algorithm (BFOA) for data classification were integrated BFOA as a feature selection algorithm and parameters optimizer for other classifiers. …”
Get full text
Get full text
Get full text
Proceeding -
16
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…In addition, ISSA was compared with four well-known optimization algorithms such as Genetic Algorithm, Particle Swarm Optimization, Grasshopper Optimization Algorithm, and Ant Lion Optimizer. …”
Get full text
Get full text
Article -
17
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
18
Optimized clustering with modified K-means algorithm
Published 2021“…Empirical evidences based on simulated data sets indicated that the proposed modified k-means algorithm is able to recognise the optimum number of clusters for uncorrelated data sets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
LS-SVM Hyper-parameters Optimization Based on GWO Algorithm for Time Series Forecasting
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…This thesis proposes data-intensive workflow optimization algorithms. …”
Get full text
Get full text
Get full text
Thesis
