Search Results - (( developing using linear algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- developing using »
- linear algorithm »
- java »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Article -
10
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Article -
11
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The performance of the proposed algorithm is also compared to the model developed using the orthogonal least squares (OLS) algorithm. …”
Get full text
Get full text
Article -
13
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…Filtered-X least mean square (FXLMS) control algorithm is a conventional algorithm employed to cancel the noise in linear environment. …”
Get full text
Get full text
Thesis -
14
Motion control algorithm development and testing for a free-piston engine generator
“…This research aims objectives to construct simulation model of a free-piston linear generator for piston motion control algorithm development and testing on a linear actuators prototype. …”
Get full text
Get full text
Research Report -
15
Widely linear dynamic quaternion valued least mean square algorithm for linear filtering
Published 2017“…The performance of the proposed algorithms are compared with quaternion least mean square QLMS, zero-attract quaternion least mean square ZA-QLMS, and widely linear quaternion least mean square WL-QLMS algorithms. …”
Get full text
Get full text
Get full text
Thesis -
16
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…This model estimated warped coefficients using the overall linear trend found in linear segments of non-linear relationships. …”
Get full text
Get full text
Thesis -
17
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
18
Sales prediction for media platforms advertising expenditure using Linear Regression / Nur Athirah Abdurahman
Published 2023“…The study focuses on the application of the Linear Regression algorithm to predict sales outcomes based on advertising spending patterns. …”
Get full text
Get full text
Thesis -
19
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
20
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The algorithm tested use KDD Cup dataset and the result shows a significant improvement in detection accuracy and reducing the false alerts …”
Get full text
Get full text
Get full text
Citation Index Journal
