Search Results - (( java attack detection algorithm ) OR ( program solution learning algorithm ))
Search alternatives:
- learning algorithm »
- solution learning »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
8
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…Students are also excited about the algorithmic techniques and the scratch program generated. …”
Get full text
Get full text
Get full text
Article -
9
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
10
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
11
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
13
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
14
Hybrid Ant Colony Optimization For Two Satisfiability Programming In Hopfield Neural Network
Published 2019“…As the number of 2SAT clauses increased, the efficiency and effectiveness of the learning phase in HNN deteriorates. Swarm intelligence metaheuristic algorithm has been introduced to reduce the learning complexity of the network. …”
Get full text
Get full text
Thesis -
15
Optimal power flow based on fuzzy linear programming and modified Jaya algorithms
Published 2017“…In the proposed novel QOJaya algorithm, an intelligence strategy, namely, quasi-oppositional based learning (QOBL) is incorporated into the basic Jaya algorithm to enhance its convergence speed and solution optimality. …”
Get full text
Get full text
Thesis -
16
-
17
Modeling a problem solving approach through computational thinking for teaching programming / Zebel Al Tareq
Published 2021“…Different teaching approaches for programming are widespread but what is essential for students is being able to computationally formulate an algorithmic solution at first and then transfer to code. …”
Get full text
Get full text
Get full text
Thesis -
18
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis -
19
The A-rray: visual animation in learning structured programming / Wan Salfarina Wan Husain ,Siti Hasrinafasya Che Hassan and Wan Norliza Wan Bakar
Published 2018“…The visual animation is considered to be a very promising potential to aid students in learning and understanding the algorithm concept in programming. …”
Get full text
Get full text
Get full text
Article -
20
Measuring GPU-accelerated parallel SVM performance using large datasets for multi-class machine learning problem
Published 2023Conference Paper
