Search Results - (( development code replication algorithm ) OR ( java _ verification algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1
  2. 2
  3. 3

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
    thesis::doctoral thesis
  4. 4

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the Hyper Text Markup Language (HTML) pages of an application. …”
    Get full text
    Get full text
    Thesis