Search Results - (( developing online function algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- function algorithm »
- developing online »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A new hybrid fuzzy ARTMAP and radial basis function neural network with online pruning strategy
Published 2023Conference Paper -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Position control of robot manipulator: Design a novel SISO adaptive sliding mode fuzzy PD fuzzy sliding mode control.
Published 2011“…To attenuate the chattering phenomenon this method developed a linear boundary layer and the parameter of the sliding function is online tuned by adaptation laws. …”
Get full text
Get full text
Article -
11
Marketplace product recommendation using collaborative filter / Muhammad Alif Fauzan Ismail
Published 2021“…The algorithm used to develop a product recommendation engine is collaborative filtering algorithm and this algorithm is written in python. …”
Get full text
Get full text
Thesis -
12
Online Clothing Shopbots via Web Content Extraction / Nurul Syazwani Ramzi
Published 2017“…Online shopping has become a huge phenomenon lately. …”
Get full text
Get full text
Thesis -
13
-
14
Economic power dispatch solution with non-smooth cost functions using differential evolution: article / Muhammad Firdaus Abd Rahim
Published 2011“…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
Get full text
Get full text
Article -
15
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
16
Economic power dispatch solution with non-smooth cost functions using differential evolution / Muhammad Firdaus Abd Rahim
Published 2011“…The results obtained show that DE can solve Economic Dispatch with non-smooth cost function successfully. The program for this algorithm has been developed in Matlab 7.6 platform.…”
Get full text
Get full text
Thesis -
17
Online Programming Judge System (UOJ)
Published 2013“…This research conducts a study to build an Online Programming Judge system with a mechanism to generate test cases automatically using Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Final Year Project -
18
-
19
Analysis of training function for NNARX in solar radiation prediction modeling
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Adaptive model predictive control based on wavelet network and online sequential extreme learning machine for nonlinear systems
Published 2015“…Moreover, the ability of initialization the hidden nodes parameters using density function and recursive algorithm will help WN-OSELM to perform useful generalization facility and modeling accuracy. …”
Get full text
Get full text
Thesis
