Search Results - (( development method optimisation algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Bats echolocation-inspired algorithms for global optimisation problems by Nafrizuan, Mat Yahya

    Published 2016
    “…The results validate the better performance of the developed algorithms in single objective optimisation, constrained optimisation and multi objective optimisation problems of various fields.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved Bat Algorithm for faster convergence in solving optimisation problem by Ramli, Mohamad Raziff

    Published 2021
    “…Finally, the developed IBA is found consistent with the exact method which is the simplex method when tested through fairness nurse scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective by Mousavi, Seyed Mohsen, Sadeghi R., Kiarash, Lee, Lai Soon

    Published 2023
    “…However, there needs to be more research examining the role of interactive methods in multiobjective optimisation problems. To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
    Get full text
    Get full text
    Article
  12. 12

    Optimisation of multi-stage production-inspection stations using genetic algorithm by Hassan, Azmi, Pham, Duc Trung

    Published 2000
    “…The optimisation tool to be considered is Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Article
  13. 13

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Application of ant colony optimisation algorithms in solving facility layout problems formulated as quadratic assignment problems: a review by See, Phen Chiak, Wong, Kuan Yew

    Published 2008
    “…In addition, the various ACO algorithms or variants developed to solve them are critically analysed and discussed. …”
    Get full text
    Get full text
    Article
  16. 16

    ROA-CONS: raccoon optimization job scheduling by Koohi, Sina Zangbari, Abdul Hamid, Nor Asilah Wati, Othman, Mohamed, Ibragimov, Gafurjan

    Published 2021
    “…ROA-CONS is a new job scheduling method proposed in this paper. It describes a new scheduling approach, which is a combination of an updated conservative backfilling approach further optimised by the raccoon optimisation algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    Develpoment of combinatorial optimisation for cutting tool path strategy by Alsultaney, Hazem K., Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah, Ali, Aidy, Mustapha, Faizal

    Published 2009
    “…To simulate the physical removal of material during machining, a finite element model is designed to represent a thin walled workpiece. The target was to develop models which mimic the actual cutting process using the Finite Element Method (FEM) and to validate the developed tool path strategy algorithm with the actual machining process and to programmer the developed algorithm into software. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…In the load flow analysis, the optimisation and development of FAHA was implemented on the IEEE 118-bus radial test network. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimization of zinc oxide surge arrester design in reducing leakage current / Nurul Ain Abdul Latiff by Nurul Ain , Abdul Latiff

    Published 2018
    “…Evolutionary computation methods, imperialist competitive algorithm (ICA) and gravitational search algorithm (GSA) were employed to optimise the arrester designs, which can minimise the leakage current. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm by Muhammad Arif, Abdullah

    Published 2019
    “…For optimisation purpose, this research proposed a relatively new algorithm called the Moth-Flame Optimisation (MFO). …”
    Get full text
    Get full text
    Thesis