Search Results - (( data processing based algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- processing based »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
Get full text
Get full text
Thesis -
10
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Classification is a process of grouping or placing data into appropriate categories or classes based on specificattributes or features to predict labels or classes of new data based on patternsobserved from previously trained data. …”
Get full text
Get full text
Get full text
Article -
11
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
12
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…Based upon the current offthe- shelf hardware capability, it is impossible to process the amount of data using the conventional approach. …”
Get full text
Get full text
Thesis -
13
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…We found that PSO algorithm reveals better performance than Ward’s algorithm on continuous data format; however for binary data format, Ward’s algorithm outperforms arrogantly.…”
Get full text
Get full text
Get full text
Thesis -
14
Supervised deep learning algorithms for process fault detection and diagnosis under different temporal subsequence length of process data
Published 2025“…Industrial process time series data could be processed with ease by deep learning algorithms, particularly transformer-based models because of their multi-head attention mechanism. …”
Get full text
Get full text
Get full text
Article -
15
Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection
Published 2015“…Subsequently, the integration of embedded correlation-based filtering algorithm has further increased the classification accuracy of training process and testing process by 4.93% and 14.73% respectively. …”
Get full text
Get full text
Get full text
Thesis -
16
Optimized clustering with modified K-means algorithm
Published 2021“…Empirical evidences based on simulated data sets indicated that the proposed modified k-means algorithm is able to recognise the optimum number of clusters for uncorrelated data sets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
19
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…Wavelet decomposition is utilized to extract data information from texture data. In searching process, the data are retrieved based on data distribution. …”
Get full text
Get full text
Thesis -
20
Big Data Prediction Framework for Weather Temperature Based on MapReduce Algorithm
Published 2016“…This project aims to build analytical Big Data prediction framework for weather temperature based on MapReduce algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
