Search Results - (( java attack detection algorithm ) OR ( parameter extraction method algorithm ))
Search alternatives:
- parameter extraction »
- extraction method »
- method algorithm »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Parameter extraction of photovoltaic module using hybrid evolutionary algorithm
Published 2023“…Algorithms; Diodes; Extraction; Iterative methods; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Different evolutions; Differential Evolution; Diode modeling; Electromagnetism-like algorithm; Extracting parameter; Hybrid evolutionary algorithm; Photovoltaic model; Photovoltaic modules; Evolutionary algorithms…”
Conference Paper -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
9
A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model
Published 2023“…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
Article -
10
Parameters extraction of double diode photovoltaic module's model based on hybrid evolutionary algorithm
Published 2023“…Algorithms; Diodes; Errors; Extraction; Iterative methods; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Differential evolution algorithms; Diode modeling; Electromagnetism-like algorithm; Fast convergence speed; Hybrid evolutionary algorithm; IV characteristics; Photovoltaic model; Root mean square errors; Evolutionary algorithms…”
Article -
11
Novel parameter extraction for single, double, and three diodes photovoltaic models based on robust adaptive arithmetic optimization algorithm and adaptive damping method of Berndt-Hall-Hall-Hausman
Published 2022“…Experimental data-oriented parameter extraction helps in giving an accurate assessment to forecast the output current of the photovoltaic cells. …”
Get full text
Get full text
Article -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
Extracting crown morphology with a low-cost mobile LiDAR scanning system in the natural environment
Published 2021“…Finally, morphological parameters of the canopy, such as crown height, crown diameter, and crown volume, are extracted using statistical and voxel methods. …”
Get full text
Get full text
Get full text
Article -
14
-
15
A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models
Published 2022“…However, there is no method to date that can guarantee the extracted parameter of the PV model is the most accurate one. …”
Get full text
Get full text
Article -
16
-
17
Parameter extraction of single, double, and three diodes photovoltaic model based on guaranteed convergence arithmetic optimization algorithm and modified third order Newton Raphson methods
Published 2022“…Extraction of the photovoltaic (PV) model parameters is critical for forecasting these systems’ energy output. …”
Get full text
Get full text
Article -
18
-
19
-
20
Development of hippocampus MRI image segmentation algorithm for progression detection of alzheimer’s disease (AD)
Published 2022“…The active contour method (Chan-Vese) was utilized to extract the ROI parameters (hippocampus). …”
Get full text
Get full text
Get full text
Get full text
Thesis
