Search Results - (( development code replication algorithm ) OR ( java _ verification algorithm ))
Search alternatives:
- verification algorithm »
- replication algorithm »
- development code »
- code replication »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
3
Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR)
Published 2026“…Malware, such as spyware, ransomware, and self-replicating worms, is designed to steal credentials and gain remote access while obfuscating its code to evade detection by traditional analysis systems. …”
thesis::doctoral thesis -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The formal verification is performed using BAN logic to prove the security and mutual authentications. …”
Get full text
Get full text
Thesis -
6
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the Hyper Text Markup Language (HTML) pages of an application. …”
Get full text
Get full text
Thesis
