Search Results - (( developing using partial algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- partial algorithm »
- developing using »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Job shop rescheduling using a hybrid artificial immune system and genetic algorithm model
Published 2012“…This paper discusses on developing a hybrid model to tackle the problem of changing environment in the job shop scheduling problem.The main idea is to develop building blocks of partial schedules using the model developed that can be used to provide backup solutions when disturbances occur during production.This model hybridizes genetic algorithm (GA) with artificial immune systems (AIS) techniques to generate these partial schedules.Each partial schedule, also known as antibody, is assigned a fitness value for the selection of final population of best partial schedules. …”
Get full text
Get full text
Conference or Workshop Item -
10
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
Get full text
Get full text
Article -
11
Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming……”
Get full text
Get full text
Book Section -
12
Binary search algorithm-based maximum power point tracking for photovoltaic system under partial shaded conditions
Published 2018“…The BSA-based algorithm, together with well-established PSO and another commonly used hill climbing method, perturb and observe (P&O) were developed and simulated in MATLAB Simulink. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Ball surface representations using partial differential equations
Published 2015“…Thus, this research develops an algorithm to generalise Ball surfaces from boundary curves using elliptic PDEs. …”
Get full text
Get full text
Get full text
Thesis -
14
Job shop rescheduling using a hybridization of genetic algorithm and artificial immune systems
Published 2012“…The main idea is to use the model to develop building blocks of partial schedules that can be used to provide backup solutions when disturbances occur during production.Each partial schedule, also known as antibody, is assigned a fitness value for the selection of final population of best partial schedules.The results of the analysis are compared with a previous work. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Binary search algorithm as maximum power tracking technique for photovoltaic system under partial shaded conditions
Published 2018“…This paper presents an approach to determine the maximum power point (MPP) in photovoltaic (PV) system under partial shaded conditions using Binary Search Algorithm (BSA). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez
Published 2015“…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental-Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming. …”
Get full text
Get full text
Thesis -
17
Moth flame optimization maximum power point tracking algorithm for photovoltaic system under partial shaded conditions
Published 2022“…The study aims to identify the performance of MFO based MPPT algorithm under partial shaded conditions. A simulation model of MFO based MPPT algorithm was developed and implemented with DC/DC boost converter in MATLAB Simulink. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Self-configured link adaptation using channel quality indicator-modulation and coding scheme mapping with partial feedback for green long-term evolution cellular systems
Published 2015“…Since the developed downlink scheduler and the partial feedback scheme affect the QoS, self-configured versions of both algorithms are developed to provide QoS provisioning. …”
Get full text
Get full text
Thesis -
19
Identification algorithms of flexible structure using neural networks
Published 2006“…A simulation algorithm of the plate is developed through a discretisation of the governing partial differential equation formulation of the plate dynamics using finite difference methods. …”
Get full text
Get full text
Conference or Workshop Item -
20
Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system
Published 2021“…In this study, a four-module 980 W solar PV system together with a DC/DC Boost Converter model was developed in MATLAB-Simulink as the MPPT algorithm test platform. …”
Get full text
Get full text
Thesis
