Search Results - (( developing web prevention algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Therefore, it is essential to develop a new technique to authenticate access to database related to web applications and prevent SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  3. 3

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This paper is written to present one of such algorithms to prevent SOA attacks on RESTful web services along the discussion on the obtained results of the conducted proof-of-concept on the real-time SOA environment. …”
    Get full text
    Get full text
    Article
  4. 4

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  5. 5
  6. 6

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
    Get full text
    Get full text
    Article
  7. 7

    Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities by Draib, Najla'a Ateeq Mohammed

    Published 2022
    “…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity by Yau, Jia Xin

    Published 2023
    “…By integrating the Google Safe Browsing List and the Random Forest classifier, a web application is created. Upon receiving the user's URL, the web application utilises a pre-trained Random Forest classifier to ascertain the probability that the requested URL is a fraud site. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Facial recognition attendance system by Lew, Tian Pei

    Published 2023
    “…A web-based system was developed to let admin and instructor to manage the class and class attendance while the Android-based system was developed to let students to check their attendance.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15
  16. 16

    Cyber parental control framework for objectionable web content classification and filtering based on topic modelling using enhanced latent dirichlet allocation / Hamza H. M. Altart... by Hamza H. M. , Altarturi

    Published 2023
    “…This problem has motivated academia and industry to develop frameworks for cyber parental control. Despite substantial advancements in automating web classification that combines web mining and content classification methods, the study identifies a gap in applying advanced machine learning algorithms for superior objectionable web content classification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Identifying suicidal ideation through twitter sentiment analysis using Naïve Bayes / Annasuha Atie Atirah Alias by Alias, Annasuha Atie Atirah

    Published 2023
    “…Thus, this project aims to design, develop, and evaluate web-based application utilizing sentiment analysis, specifically employing the Naïve Bayes algorithm, to identify and analyze suicidal ideation within Twitter posts. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Detection of SQL injection attack using machine learning by Tung, Tean Thong

    Published 2024
    “…The system utilises a machine learning approach to train and enhance its ability to identify and prevent SQLI attacks accurately. The machine learning algorithms employed in this study encompass Convolutional Neural Networks (CNN), Logistic Regression, Naïve Bayes Classifier, Support Vector Machine, and Random Forest. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19
  20. 20

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…The proposed DBBR aims also to prevent misbehaving (i.e. malicious) nodes from affecting the network performance. …”
    Get full text
    Get full text
    Thesis