Search Results - (( developing agent optimization algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- agent optimization »
- developing agent »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023“…We propose a new dimension to detect learning styles, which involves the individuals of learners' social surrounding such as friends, parents, and teachers in developing a novel agent-based framework. The multi-agent system applies ant colony optimization and fuzzy logic search algorithms as tools to detecting learning styles. …”
Conference Paper -
8
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The MGT algorithm is useful to explore the properties of the Pareto-optimal offers. …”
Get full text
Get full text
Thesis -
9
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
Published 2024“…Metaheuristic algorithms, including the Simulated Kalman Filter (SKF), have been developed to solve these problems. …”
Get full text
Get full text
Get full text
Article -
10
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…The first modeling technique applies graph algorithms to compute a new set of optimal weighted structural properties of C60 and C70 fullerenes. …”
Get full text
Get full text
Thesis -
11
Recent research in cooperative path planning algorithms for multi-agent using mixed- integer linear programming
Published 2016“…Path planning is one of the issues to be handled in the development of autonomous systems. For a group of agents, cooperative path planning is crucial to ensure that a given mission is accomplished in the shortest time possible with optimal solution. …”
Get full text
Get full text
Article -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
13
Software testing optimization for large systems using agent-based and NSGA-II algorithms
Published 2023“…Consequently, a multi-objective optimization technique can be used to optimize the large system testing process. …”
Get full text
Get full text
Get full text
Article -
14
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016“…Besides biology, physics and chemistry, state estimation algorithm also has become a source of inspiration for developing metaheuristic algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
15
Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri
Published 2020“…In this research, the empirical experiments have been conducted for the five selected algorithms in the engineering optimization discipline, namely Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), Ant Colony Optimization (ACO) and Artificial Immune System (AIS). …”
Get full text
Get full text
Thesis -
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems
Published 2024“…The empirical assessment of these proposed methods encompasses a diverse set of 23 benchmark functions, demonstrating their efficacy comparable to well-established metaheuristic algorithms such as as the Grey Wolf Optimizer (GWO), Multi-Verse Optimization (MVO), Sine Cosine Algorithm (SCA), Ant Lion Optimizer (ALO), Moth-Flame Optimization Algorithm (MFO), and Grasshopper Optimization Algorithm (GOA). …”
Get full text
Get full text
Thesis -
18
Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
Get full text
Get full text
Conference or Workshop Item -
20
A modified crow search algorithm with niching technique for numerical optimization
Published 2019“…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
Get full text
Get full text
Conference or Workshop Item
