Search Results - (( java attack detection algorithm ) OR ( basic computing ((based algorithm) OR (bee algorithm)) ))

Refine Results
  1. 1

    Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches by Mohd Pauzi, Nur Fazlinda

    Published 2015
    “…The main objective of this research is to develop a computer program with capability of manipulating the onlooker bee approaches in ABC Algorithm for solving flowshop scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Adaptive mechanism for enhanced performance of shark smell optimization / Nur Atharah Kamarzaman, Shahril Irwan Sulaiman and Intan Rahayu Ibrahim by Kamarzaman, Nur Atharah, Sulaiman, Shahril Irwan, Ibrahim, Intan Rahayu

    Published 2021
    “…Numerical results indicate that the ASSO algorithm strategy outperforms the basic SSO algorithm, Genertic Algorithm (GA), Particle Swarm Intelligence (PSO), Firefly Algorithm (FA), Artificial Bee Colony (ABC) and Teaching Learning Based Optimization (TBLO) in term of reaching for global solution.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of supply chain management by simulation based RFID with XBEE Network by Soomro, Aftab Ahmed

    Published 2015
    “…This algorithm computes the optimal results of objective functions in a scientific manner. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Mobile First-Person Shooter (FPS) Game Using Basic Theta* Algorithm / Muhammad Syurahbil Abd Rohaman by Abd Rohaman, Muhammad Syurahbil

    Published 2020
    “…Basic Theta* is implemented in the game using grid-based map representation. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
    Get full text
    Get full text
    Monograph
  18. 18

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
    Get full text
    Get full text
    Thesis