Search Results - (( developing countries function algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…This complexity can be done by designing an algorithm that consists of substitution function and permutation function which provides confusion and diffusion properties. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of automatic pest sampling and detection system for cash crops by Hadi, Mustafa Kareem

    Published 2019
    “…Different kernel functions such as disk, diamond, square, and sphere are used as matching functions for insect detection and counting algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Supplier selection for contractors using Fuzzy TOPSIS Algorithm / Mohamed Shafiq Mohamed Yusof by Mohamed Yusof, Mohamed Shafiq

    Published 2020
    “…The future work of this project is to develop a system by using the same domain but with different algorithm and compare the result with the current result obtained from the system…”
    Get full text
    Get full text
    Thesis
  16. 16

    A comparative study of clonal selection algorithm for effluent removal forecasting in septic sludge treatment plant by Ting, Sie Chun, Abdul Malik, Marlinda, Ismail, Amelia Ritahani

    Published 2015
    “…The development of effluent removal prediction is crucial in providing a planning tool necessary for the future development and the construction of a septic sludge treatment plant (SSTP), especially in the developing countries. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Design and development of a magnetorheological shock absorber for automotive applications by Jamaluddin, Hishamuddin

    Published 2009
    “…The algorithm is also functioning as a tool to improve the performance of the MR damper prototype. …”
    Get full text
    Monograph
  18. 18

    Development of an integrated scheduling model for handling equipment in automated port container terminals by Sadeghian, Syed Hamidreza

    Published 2014
    “…Especially, developing countries have many plans to construct new seaport container terminals or to increase the capacity of their existing ones. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implications of the Middle East Emerging Markets on International Portfolio Diversification by Mansourfar, Gholamreza

    Published 2010
    “…For the intra-regional investments, the Middle Eastern equity markets provide more portfolio diversification benefits as compared to the emerging and developed equity markets. A vital difference between emerging and developed markets is that developed countries provide the opportunities of selecting the desired investments among a similar set of portfolio risks in both the short and long-term holding periods. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Air pollution forecasting in Kuala Terengganu using Artificial Neural Network (ANN) / Nur Raudzah Abdullah by Abdullah, Nur Raudzah

    Published 2020
    “…Nowadays, air pollution is a very serious problem faced by every country due to the increase in the number of vehicles, development of industrialization and other human activities. …”
    Get full text
    Get full text
    Thesis