Search Results - (( java attack detection algorithm ) OR ( based loading optimisation algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimising cloud computing performance with an enhanced dynamic load balancing algorithm for superior task allocation by Zhanuzak, Raiymbek, Ala'anzy, Mohammed Alaa, Othman, Mohamed, Algarni, Abdulmohsen

    Published 2024
    “…This paper presents an Enhanced Dynamic Load Balancing (EDLB) algorithm designed to optimise task scheduling and resource allocation in cloud environments. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Performance evaluation of load balancing algorithm for virtual machine in data centre in cloud computing by Parmesivan, Yuganes, Hasan, Sazlinah, Muhammed, Abdullah

    Published 2018
    “…Cloud computing has become biggest buzz in the computer era these days.It runs entire operating systems on the cloud and doeverything on cloud to store data off-site.Cloud computing is primarily based on grid computing, but it’s a new computational model.Cloud computing has emerged into a new opportunity to further enhance way of hosting data centre and provide services.The primary substance of cloud computing is to deal the computing power,storage,different sort of stages and services which assigned tothe external users on demand through the internet.Task scheduling in cloud computing is vital role optimisation and effective dynamic resource allocation for load balancing.In cloud, the issue focused is under utilisation and over utilisation of the resources to distribute workload of multiple network links for example,when cloud clients try to access and send request tothe same cloud server while the other cloud server remain idle at that moment, leads to the unbalanced of workload on cloud data centers.Thus, load balancing is to assign tasks to the individual cloud data centers of the shared system so that no single cloud data centers is overloaded or under loaded.A Hybrid approach of Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm is combined in order to get effective response time.The proposed hybrid algorithm has been experimented by using CloudSim simulator.The result shows that the hybrid load balancing algorithm improves the cloud system performance by reducing the response time compared to the Honey Bee (HB) and Particle Swarm Optimisation (PSO) load balancing algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…Finally, an AHP was integrated with FA to form Firefly Analytical Hierarchy Algorithm (FAHA) to automatically calculate the weight of each objective function based on the load flow outputs followed by the optimisation process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling of optimal placement and sizing of battery energy storage system using hybrid whale optimization algorithm and artificial immune system for total system losses reduct... by Wong Ling Ai

    Published 2023
    “…Lastly, the effectiveness of WOA and WOA-AIS in attaining optimal solutions was validated with other well-known optimisation algorithms, including particle swarm optimisation (PSO) and firefly algorithm (FA). …”
    text::Thesis
  11. 11

    A new optimisation framework based on Monte Carlo embedded hybrid variant mean–variance mapping considering uncertainties by Norhafidzah, Mohd Saad, Muhamad Zahim, Sujod, Mohd Ikhwan, Muhammad Ridzuan, Mohammad Fadhil, Abas, Mohd Shawal, Jadin, Mohd Fadzil, Abdul Kadir

    Published 2024
    “…The Monte Carlo-embedded MVMO-SH was then used to optimise PVDG in the urban RDN. Simulations were run for several scenarios in three load cases based on 288 segments: residential, commercial, and industrial urban loads. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Immunized-evolutionary algorithm based technique for loss control in transmission system with multi-load increment by Shaaya S.A., Musirin I., Sulaiman S.I., Mansor M.H.

    Published 2023
    “…This paper presents immunized-evolutionary algorithm based technique for loss control in transmission system with multi -load increment. …”
    Article
  13. 13
  14. 14

    Optimization of electrical wiring design in buildings using particle swarm optimization and genetic algorithm / Tuan Ahmad Fauzi Tuan Abdullah by Tuan Ahmad Fauzi, Tuan Abdullah

    Published 2017
    “…The electrical wiring system design includes sizing of cables and bus ducts, customers’ load and placement of load, cables and bus ducts. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
    Get full text
    Get full text
    Thesis