Search Results - (( developing using minimum algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- minimum algorithm »
- developing using »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…The only way left is to use the approximation algorithm of Minimum Vertex Cover (MVC) for the solution of the Maximum Clique (MC) problem. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Outlier detection in circular regression model using minimum spanning tree method
Published 2019“…Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
Get full text
Get full text
Conference or Workshop Item -
11
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…In each case, the Traveling Salesman Problem-Genetic Algorithm (TSP-GA) algorithm is applied to determine a minimum total distance of RES sites integration. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…Consequently, the number of logic gates and the total power consumption of the STTC Viterbi decoder can be reduced by using the new algorithms. The proposed algorithms have been designed and implemented by using MATLAB, Altera Quartus 2 and Altera MAX V CPLD board. …”
Get full text
Get full text
Get full text
Thesis -
13
Finding the shortest route using Dijkstra’s algorithm with application to ride hailing in UiTM Cawangan Negeri Sembilan Kampus Seremban / Nur Husnina Hassan, Nurin Hadrah Syahira M...
Published 2022“…Therefore, to find the shortest route with minimum time, Dijkstra's Algorithm will be used. Apart from that, the Dijkstra’s Algorithm used in this study will allow us to find the smallest weight path for all permanently labelled Nod once it has been run. …”
Get full text
Get full text
Student Project -
14
Development of collision avoidance warning system for heavy vehicles featuring adaptive minimum safe distance / Airul Sharizli Abdullah
Published 2017“…To represent the adaptive minimum safe distance which will be used in activation algorithm for CAWS, the new distance-based CAWS model, namely Minimum Safe Distance Gap (MSDG) is introduced. …”
Get full text
Get full text
Get full text
Thesis -
15
An Information Retrieval Algorithm to Extract Influential Factors
Published 2012“…The aim of the study is to develop an algorithm that can extract a minimum set of factors that can be used to assess companies’ performances. …”
Get full text
Get full text
Get full text
Thesis -
16
Multi objective optimisation for high speed end milling using simulated annealing algorithm
Published 2015“…The mathematical models have been developed, in terms of cutting speed, feed rate, and axial depth of cut by using Response surface Methodology (RSM). …”
Get full text
Get full text
Get full text
Article -
17
Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification
Published 2012“…This is the basis of the proposed algorithm. The proposed algorithm involves a multistage approach that includes motion vector prediction and motion classification using the characteristics of video sequences. …”
Get full text
Get full text
Get full text
Article -
18
An improved algorithm for channel allocation on direct sequence spread spectrum
Published 2011“…Graph coloring is an assignment a color to each vertex, which each vertex that adjacent is given a different color. Graph coloring is a useful algorithm for channel allocation on Direct Sequence Spread Spectrum (DSSS).Through this algorithm,each access point (AP) that adjacent gives different channels based on colors available.Welsh Powell algorithm and Degree of saturation (Dsatur) are the popular algorithms being used for channel allocation in this domain. …”
Get full text
Get full text
Thesis -
19
Loss reduction in distribution networks using new network reconfiguration algorithm
Published 1996“…For this purpose a simple-to-use formula, called loop loss reduction formula, has been developed. …”
Get full text
Article -
20
Combined heat and power economic dispatch using Shuffled Frog Leaping Algorithm (SFLA) / Saidatul Maisarah Fadzli
Published 2015“…This thesis discusses the solution of combined heat and power economic dispatch (CHPED) problem using shuffled frog leaping algorithm (SFLA), which is inspired by the behavior of a group of frogs to find a place that has the most food for an optimization technique purposes that has been developed for solving the CHPED problem. …”
Get full text
Get full text
Thesis
