Search Results - (( developing virtual optimization algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- virtual optimization »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
An efficient virtual tour : a merging of path planning and optimization
Published 2004“…This paper describes the result of a research project aimed to integrate a path-planning optimization-algorithm and produce an efficient tour in a virtual environment. …”
Get full text
Get full text
Article -
12
-
13
Optimal virtual microgrid design using community energy storage for distribution networks
Published 2023“…This research develops a framework for designing optimal virtual microgrid (VM) in two steps: boundary identification considering both structural characteristics and operating states of PV residential networks and sizing and locating Community Energy Storage (CES). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
15
CSGO: a game-inspired metaheuristic algorithm for global optimization
Published 2023“…This paper presents a video game-inspired meta-heuristic algorithm and its performance evaluation. This optimizer algorithm is developed by assembling impressive features of previous well-known optimizer algorithms such as stochastic fractal search (SFS), artificial gorilla troops optimizer (GTO) and marine predators algorithm (MPA) with addition of chaotic operators. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Development of an augmented reality based facility layout planning and optimization / Tan Chee Hau
Published 2020“…Production line commonly used algorithm such as shortest processing time (SPT), longest processing time (LPT), cycle time optimization and centre of gravity (CoG) algorithm are coded in this system which enables the production schedule and sequence to be optimized. …”
Get full text
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Published 2017“…Dynamic consolidation of virtual machines (VMs) using live migration and putting idle nodes in sleep mode allows cloud providers to optimize resource utilization and reduce energy consumption. …”
Get full text
Get full text
Get full text
Article -
20
HSO: A hybrid swarm optimization algorithm for reducing energy consumption in the cloudlets
Published 2018“…There was also a decrease in the node loss which allowed the optimization algorithm to achieve a minimal overhead on cloud compute resources while still saving energy significantly. …”
Get full text
Get full text
Get full text
Article
