Search Results - (( develop finding evolution algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- evolution algorithm »
- finding evolution »
- develop finding »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Two-stage feature selection using ranking self-adaptive differential evolution algorithm for recognition of acceleration activity
Published 2018“…Consequently, this paper proposes a ranking self-adaptive differential evolution (rsaDE) feature selection algorithm. The proposed algorithm is capable of selecting the optimal feature subsets while improving the recognition of acceleration activity using a minimum number of features. …”
Get full text
Get full text
Get full text
Article -
10
Investigation and validation of an eleven level symmetric modular multilevel inverter using grey wolf optimization and differential evolution control algorithm for solar PV applica...
Published 2021“…Purpose: This paper aims to examine the design and control of a symmetric multilevel inverter (MLI) using grey wolf optimization and differential evolution algorithms. Design/methodology/approach: The optimal modulation index along with the switching angles are calculated for an 11 level inverter. …”
Get full text
Get full text
Article -
11
Hybrid DE-PEM algorithm for identification of UAV helicopter
Published 2014“…Purpose – The purpose of this paper is to develop a hybrid algorithm using differential evolution (DE) and prediction error modeling (PEM) for identification of small-scale autonomous helicopter state-space model. …”
Get full text
Get full text
Get full text
Article -
12
Efficient radio resource management algorithms for downlink long term evolution networks
Published 2018“…Hence, the major problem is developing a scheduling algorithm which creates a trade-off between the system performances. …”
Get full text
Get full text
Thesis -
13
-
14
Optimization of an extended H-infinity controller for unmanned helicopter control using multiobjective differential evolution (MODE)
Published 2015“…Purpose – The purpose of this paper is to develop a multiobjective differential evolution (MODE)-based extended H-infinity controller for autonomous helicopter control. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…New algorithms, journal papers and computerized system were also developed. …”
Get full text
Get full text
Monograph -
16
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Even so, it parallels the evolution of these methods to penetrate systems. Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…This reason motivated the researchers to exploit the evolution of machine learning to develop water level forecasting systems that were characterized by accuracy, simplicity and low cost. …”
Get full text
Get full text
Thesis -
18
-
19
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
20
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Since the developed downlink scheduler and the partial feedback scheme affect the QoS, self-configured versions of both algorithms are developed to provide QoS provisioning. …”
Get full text
Get full text
Thesis
