Search Results - (( java application based algorithm ) OR ( attack detection computer algorithm ))
Search alternatives:
-
1
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
2
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
3
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
4
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
5
Phishing attack detection using machine learning method
Published 2019Get full text
Get full text
Get full text
Undergraduates Project Papers -
6
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. …”
Get full text
Get full text
Thesis -
7
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2024Subjects:journal::journal article -
8
-
9
Cloud Co-Residency Denial of Service Threat Detection Inspired by Artificial Immune System
Published 2024“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud Co-Residency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Proceedings Paper -
10
An evaluation on KNN-SVM algorithm for detection and prediction of DDoS attack
Published 2016Get full text
Get full text
Get full text
Book Section -
11
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Hence, the detection of network attacks on computer systems has remain a relevant field of research for some time. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Campus hybrid intrusion detection system using SNORT and C4.5 Algorithm
Published 2020“…As a result of implementing this system: misused detection module uses the signature of attacks to detection the known attacks; anomaly detection module can detect the unknown attacks; signature generation module extracts the signature of attacks that are detected by Anomaly Detection System module, and maps the signatures into snort rules.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Cloud co-residency denial of service threat detection inspired by artificial immune system
Published 2018“…This research aims to provide a hybrid intrusion detection model for Cloud computing environment. For this purpose, a modified DCA is proposed in this research as the main detection algorithm in the new hybrid intrusion detection mechanism which works on Cloud CoResidency Threat Detection (CCTD) that combines anomaly and misuse detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In future, the HW-DBN algorithm can be proposed as an integrated deep Learning for the classification performance of attack detection models.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Nowadays, attack detection strategies have become the most vital component in computer security despite the main preventive measure in detecting the attacks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019“…The detection of network attacks on computer systems remains an attractive but challenging research scope. …”
Get full text
Get full text
Conference or Workshop Item -
20
