Search Results - (( developing service function algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- developing service »
- function algorithm »
- service function »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Development of kano model and quality function development integration to assess customer satisfaction and dissatisfaction of service at local public hospital.
Published 2015“…As a result, the developed service satisfaction model has contributed to be inaccurate to understanding of patient’s behavior towards healthcare service. …”
Get full text
Get full text
UMK Etheses -
10
The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach
Published 2001“…From standard static formula for bearing capacity of a single pile foundation, an algorithm using a reliability approach for the determination of service load was developed. …”
Get full text
Get full text
Article -
11
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item -
12
Modeling approach of cloud 4D printing service composition optimization based on non-dominated sorting genetic algorithm III
Published 2024“…In this research, the NSGA III algorithm is employed to develop a multiobjective optimization framework for 4D printing service portfolios, addressing critical issues such as service cost, time, quality, adaptability, and overall service optimization amidst fluctuating demand and service availability. …”
Get full text
Get full text
Get full text
Article -
13
Modelling and optimization of a transit services with feeder bus and rail system / Mohammadhadi Almasi
Published 2015“…In this study, optimized transit services and coordinated schedules are developed using metaheuristic algorithms such as genetic algorithm (GA), particle swarm optimization (PSO), water cycle algorithm (WCA) and imperialist competitive algorithm (ICA). …”
Get full text
Get full text
Thesis -
14
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…In this work, a new microcontroller board was designed and developed with Genetic Algorithm (GA) embedded on board. …”
Conference paper -
15
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…Thus, an interest has developed in having the Internet to provide some degree of Quality of Service (QoS). …”
Get full text
Get full text
Thesis -
16
Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat
Published 2017“…The aim of this thesis is to develop a fair and efficient packet scheduling and adaptive bandwidth allocation algorithms to support QoS for a diverse service class for A-MSDU aggregation in IEEE 802.11n network. …”
Get full text
Get full text
Book Section -
17
Facility location models development to maximize total service area
Published 2009“…This paper present and discuss the new developed model to maximize total service area of a fixed number of facilities. …”
Get full text
Get full text
Get full text
Article -
18
A hybrid algorithm for improving the quality of service in MANET
Published 2018Get full text
Get full text
Article -
19
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The functionalities of existing systems across the members in the group are wrapped and introduce in the IIMA as services. …”
Get full text
Get full text
Get full text
Article -
20
The application of queuing theory model and fuzzy queuing theory model using DSW algorithm to optimize vehicle flow at ferry terminal / Noratiqah Nasokha, Nurhamizah Salim and Nurs...
Published 2019“…For the fuzzy queuing system, the DSW algorithm is used for the a¬ cut process. The Dong, Shah, and Wong algorithm (DSW) are being used to determine the membership function of the Fuzzy Queuing Model performance measures. …”
Get full text
Get full text
Student Project
