Search Results - (( framework implementation based algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- framework implementation »
- implementation based »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
9
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The framework is used to increase the implementation performance of quantum algorithms. …”
Get full text
Get full text
Thesis -
10
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…The scripting language is designed and developed based on the algorithm structure that is defined in the proposed implementation frameworks with the dynamic parameterization. …”
Get full text
Get full text
Thesis -
11
Implementing case-based reasoning approach to framework documentation
Published 2023“…This paper discusses and implements the case-based reasoning (CBR) approach to documenting a framework. …”
Conference paper -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
Get full text
Get full text
Thesis -
14
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…Finally, the last experiment involves creating the complete optimized multilayered ensemble framework and implementation of the framework to find the suitable combination of methods in each layer to produce satisfactory sentiment analysis accuracy. …”
Get full text
Get full text
Thesis -
15
A BBN-based framework for adaptive IP-reuse
Published 2009“…The complexity of implementing vision algorithm on embedded systems can greatly benefit from research in HW/SW partitioning and IP-reuse. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system
Published 2020“…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
Get full text
Get full text
Get full text
Article -
18
NIS-Apriori-based rule generation with three-way decisions and its application system in SQL
Published 2020“…In the study, non-deterministic information systems-Apriori-based (NIS-Apriori-based) rule generation from table data sets with incomplete information, SQL implementation, and the unique characteristics of the new framework are presented. …”
Get full text
Get full text
Article -
19
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…A framework for the immune-based technique is discovered in this study. …”
Get full text
Get full text
Thesis -
20
Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework
Published 2019“…The expected result shows that the Enhanced Temporal Community Detection Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when implementing this proposed framework. …”
Get full text
Get full text
Get full text
Article
