Search Results - (( from implementation learning algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- implementation learning »
- from implementation »
- learning algorithm »
- java »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
7
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
9
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…As an alternative, having a self-learning algorithm embedded in an autonomous system allows the system to instinctively acquire new knowledge and learn from experience. …”
Get full text
Get full text
Thesis -
10
DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES
Published 2019“…The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
Get full text
Get full text
Final Year Project -
11
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
12
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
13
Training functional link neural network with ant lion optimizer
Published 2020“…This paper proposed the implementation of Ant Lion Algorithm as learning algorithm to train the FLNN for classification tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project -
15
Multi-Robot Learning with Bat Algorithm With Mutation (Bam)
Published 2022Get full text
Get full text
Undergraduates Project Papers -
16
Object based segmentation and analysis using deep learning algorithm for cats and dogs images
Published 2023“…The deep learning algorithm implemented is the Unet architecture and the Segnet architecture respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Autism Spectrum Disorder Classification Using Deep Learning
Published 2021“…Recently, deep learning methods have significantly sharpened the cutting edge of learning algorithms in a wide range of artificial intelligence tasks. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Design and Implementation of a Robot for Maze-Solving using Flood-Fill Algorithm
Published 2012“…This paper describes an implementation of a maze-solving robot designed to solve a maze based on the flood-fill algorithm. …”
Get full text
Get full text
Get full text
Citation Index Journal -
19
Feature selection in intrusion detection, state of the art: A review
Published 2016“…By removing these irrelevant and redundant features accuracy of the learning algorithms can be increased. In this paper implementation of different feature selection techniques have been reviewed. …”
Get full text
Get full text
Article -
20
Rapid software framework for the implementation of machine learning classification models
Published 2021“…This paper provides an insight of a rapid software framework for implementing machine learning. This paper also demonstrates the empirical research results of machine learning classification models from the rapid software framework. …”
Get full text
Get full text
Article
