Search Results - (( developing models optimization algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- models optimization »
- developing models »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
Advancements in crop water modelling: algorithmic developments and parameter optimization strategies for sustainable agriculture: a review
Published 2024“…The review concludes with a discussion on the key findings and future directions in algorithm development and optimization for crop water modelling. …”
Get full text
Get full text
Get full text
Article -
9
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems
Published 2011“…This thesis describes the development of an efficient algorithm for solving nonlinear stochastic optimal control problems in discrete-time based on the principle of model-reality differences. …”
Get full text
Get full text
Thesis -
12
Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi
Published 2020“…This study also shows that Ant Colony Optimization is a suitable technique in developing the classification model. …”
Get full text
Get full text
Thesis -
13
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…This research aimed to establish a computational model that represents the ALB-EE, propose a new Tiki-Taka Algorithm (TTA) to solve and optimize the ALB-EE and validate the developed model through a real-life case study. …”
Get full text
Get full text
Thesis -
14
Enhanced segment particle swarm optimization for large-scale kinetic parameter estimation of escherichia coli network model
Published 2021“…This development then introduces the Se-PSO algorithm in which the particles are segmented to find a local optimal solution at the beginning and later sought by the PSO algorithm. …”
Get full text
Get full text
Thesis -
15
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
16
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
Get full text
Get full text
Thesis -
17
Development of improved metaheuristic algorithms for modelling and control of a flexible manipulator system
Published 2019“…The developed algorithms are formulated based on a spiral model approach and a sine model approach. …”
Get full text
Get full text
Research Report -
18
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…A hybrid Particle Swarm Optimization-Bacterial Foraging Algorithm is developed for solving the single objective LIRP model. …”
Get full text
Get full text
Get full text
Thesis -
19
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Therefore, this study explores how to model reconfigurable manufacturing activities in an optimization perspective and how to develop and select appropriate non-conventional optimization techniques for reconfigurable process planning.In this study, a new approach to modeling Manufacturing Process Planning Optimization (MPPO) was developed by extending the concept of manufacturing optimization through a decoupled optimization method. …”
Get full text
Get full text
Thesis -
20
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…These models are developed by integrating multilayer perceptron neural network and evolutionary optimization techniques. …”
Get full text
Get full text
Article
