Search Results - (( develop computer replication algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- replication algorithm »
- computer replication »
- develop computer »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
-
8
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Generalization of Map Details within Computer Assisted Cartography
Published 1992“…subjectivity in generalization, the metamorphasis from manual to digital techniques in cartography has resulted in the development of computer algorithms designed to replicate many tasks previously performed by humans. …”
Get full text
Get full text
Article -
13
An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing
Published 2020“…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Face Detection System / Chan Beh Teng
Published 2004“…The aim of this project is to replicate on a computer what humans beings are able to do so effortlessly - detect the presence of the faces in their field of vision. …”
Get full text
Get full text
Thesis -
15
-
16
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026thesis::doctoral thesis -
17
-
18
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
19
Unlocking insights: A comprehensive dataset analysis on the acceptance of computational thinking skills among undergraduate university students through the lens of extended techno...
Published 2024“…This high explanatory power positions the dataset as a superior resource for replication, benchmarking, and broader applicability in diverse contexts, thereby enhancing the understanding of computational thinking acceptance across different populations and settings. …”
Get full text
Get full text
Get full text
Article -
20
Development of a chemical kinetic model for hydroprocessed renwable jet fuel for turbine engines
Published 2022“…The detailed chemical kinetic models of fuel are developed to investigate the combustion characteristics of the turbine engines in Computational Fluid Dynamics (CFD) simulations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
