Search Results - (( development using vector algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- development using »
- vector algorithm »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Mobile robot path optimization algorithm using vector calculus and mapping of 2 dimensional space
Published 2015“…This research explores path integration in mobile robot navigation and path optimization technique using vector calculus. A simulated robot in a simulated environment is used to test the algorithm that is to be developed. …”
Get full text
Get full text
Get full text
Article -
11
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
Get full text
Get full text
Get full text
Thesis -
12
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…This paper presents an intelligent system to reduce Non Technical Loss (NTL) using hybrid Support Vector Machine (SVM) and Genetic Algorithm (GA). …”
Conference Paper -
13
Development of language identification system using MFCC and vector quantization
Published 2017“…The MFCC will be extracted to derive the related feature vector. Vector Quantization (VQ) algorithm is then used as classifier. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Implementation of CORDIC Algorithm in vectoring mode / Anis Shahida Mokhtar and Abdullah Mohd Fadzullah
Published 2015“…The algorithm was developed using Verilog HDL in Quartus II software and the results obtained were compared with actual values of the CORDIC algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
16
Implementation of Space Vector Modulation for Voltage Source Inverter
Published 2013“…A simple method to produce space vector modulation using an algorithm that easy to implement to DSP are develop in this paper. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The combined influence of the genetic algorithm and correlation analysis are used in this technique. …”
Get full text
Get full text
Article -
20
Predicting dengue transmission rates by comparing different machine learning models with vector indices and meteorological data
Published 2023“…In this study, we use vector indices and meteorological data as predictors to develop the ML models. …”
Get full text
Get full text
Get full text
Get full text
Article
