Search Results - (( java attack detection algorithm ) OR ( program evaluation using algorithm ))
Search alternatives:
- evaluation using »
- using algorithm »
- java »
-
1
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Evaluation of dynamic programming among the existing stereo matching algorithms
Published 2015“…The algorithm used on the dynamic programming is the global optimization which provides better process on stereo images like its accuracy and its computational efficiency compared to other existing stereo matching algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis -
11
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
12
Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S...
Published 2016“…In this study proposes an evaluation of different computational intelligences, i.e Fast-Evolutionary Algorithm (FEP), Firefly Algorithm (FA) and Mutate-cuckoo Search Algorithm (MCSA) for solving single-objective optimization problem. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017Get full text
Get full text
Thesis -
15
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Book Chapter -
16
Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation
Published 2014“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Get full text
Book Chapter -
17
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
18
Linear array beampattern gain optimization techniques
Published 2023“…LMS and goal programming methods are used to evaluate the weights of the remaining array elements. …”
Conference paper -
19
Logic Algorithm for contour following task: An evaluation using Adept SCARA Robot
Published 2010“…This paper presents the performance evaluation of logic algorithms for contourfollowing task in order to automate the manual programming process. …”
Get full text
Get full text
Article -
20
