Search Results - (( developing using minimum algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State by Far Chen, Jong

    Published 2022
    “…In each case, the Traveling Salesman Problem-Genetic Algorithm (TSP-GA) algorithm is applied to determine a minimum total distance of RES sites integration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Development of low power viterbi decoder on complex programmable logic device platform by Abu, Mohd Azlan

    Published 2018
    “…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Finding the shortest route using Dijkstra’s algorithm with application to ride hailing in UiTM Cawangan Negeri Sembilan Kampus Seremban / Nur Husnina Hassan, Nurin Hadrah Syahira M... by Hassan, Nur Husnina, Muhamad Bakri, Nurin Hadrah Syahira, Sazeli, Alya Batrisyia

    Published 2022
    “…Therefore, to find the shortest route with minimum time, Dijkstra's Algorithm will be used. Apart from that, the Dijkstra’s Algorithm used in this study will allow us to find the smallest weight path for all permanently labelled Nod once it has been run. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Development of collision avoidance warning system for heavy vehicles featuring adaptive minimum safe distance / Airul Sharizli Abdullah by Airul Sharizli, Abdullah

    Published 2017
    “…To represent the adaptive minimum safe distance which will be used in activation algorithm for CAWS, the new distance-based CAWS model, namely Minimum Safe Distance Gap (MSDG) is introduced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…The aim of the study is to develop an algorithm that can extract a minimum set of factors that can be used to assess companies’ performances. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Multi objective optimisation for high speed end milling using simulated annealing algorithm by Al Hazza, Muataz Hazza Faizi, Adesta, Erry Yulian Triblas, Shaffiar, Norhashimah, Seder, Amin M. F., Riza, Muhammad

    Published 2015
    “…The mathematical models have been developed, in terms of cutting speed, feed rate, and axial depth of cut by using Response surface Methodology (RSM). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    An improved algorithm for channel allocation on direct sequence spread spectrum by Handrizal, M

    Published 2011
    “…Graph coloring is an assignment a color to each vertex, which each vertex that adjacent is given a different color. Graph coloring is a useful algorithm for channel allocation on Direct Sequence Spread Spectrum (DSSS).Through this algorithm,each access point (AP) that adjacent gives different channels based on colors available.Welsh Powell algorithm and Degree of saturation (Dsatur) are the popular algorithms being used for channel allocation in this domain. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Loss reduction in distribution networks using new network reconfiguration algorithm by Kashem, M.A., Moghavvemi, M., Mohamed, A., Jasmon, G.B.

    Published 1996
    “…For this purpose a simple-to-use formula, called loop loss reduction formula, has been developed. …”
    Get full text
    Article
  20. 20

    Combined heat and power economic dispatch using Shuffled Frog Leaping Algorithm (SFLA) / Saidatul Maisarah Fadzli by Fadzli, Saidatul Maisarah

    Published 2015
    “…This thesis discusses the solution of combined heat and power economic dispatch (CHPED) problem using shuffled frog leaping algorithm (SFLA), which is inspired by the behavior of a group of frogs to find a place that has the most food for an optimization technique purposes that has been developed for solving the CHPED problem. …”
    Get full text
    Get full text
    Thesis