Search Results - (( java attack detection algorithm ) OR ( program visualization path algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
    Get full text
    Get full text
    Thesis
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Computer algorithm for playing checkers by Chua Shin Lee

    Published 2023
    “…The Checkers game is programmed using Visual C++. Two players can play the game or against the computer The Al algorithm will select the best path to win when playing against the human. …”
    text::Thesis
  9. 9

    Development of Path Loss Models for Smooth and Convex Surfaces Terrains in Malaysian Environment by Wong, Peng Kiong

    Published 2004
    “…The measurement system consists of a spectrum analyzer and a log-periodic antenna. A computer program was developed to acquire measured field strength data from the spectrum analyzer and convert the values to path loss using Agilent Visual Engineering Environment (VEE). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    PID controller for unmanned aerial vehicle in closed environment using fiducial marker systems by Amiri, Mohammad Soleimani, Ramli, Rizauddin, Zaidi, I. E., Van, Mien

    Published 2024
    “…The aim of this paper is to develop an autonomous navigation algorithm for a UAV using a tag-based visual system. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    MOTION TARGET TRACKING OF MOBILE ROBOTS by NOOR RASHID, NOOR AIMAN

    Published 2015
    “…The main hardware and has been tested with basic programs based on the algorithms of the said methods. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    A Development Of An Internet Of Things Equipped Unmanned Ground Vehicle For Surveilance Purpose by Azizan, Anis Natasha

    Published 2019
    “…Therefore, controller is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The code has been developed using Object-Oriented Programming Language and Graphic User Interface. The developed control algorithms enable the user to control the mobile robot manually, automatically or by voice recognition commands. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Foldable Structures Adapted From Tessellation Origami With High Degree Of Freedom by Chai, Chen Chu

    Published 2018
    “…The second objective is the development of an alternative simulation approach using generative algorithm. A generative modeling tool using visual programming editor Grasshopper® which provides a more realistic simulation tool by incorporating the kinematic property of the origami was developed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Development Of Distributed Grid-Based Hydrological Model And Floodplain Inundation Management System by Al_Fugara, A’kif Mohammed Salem

    Published 2008
    “…The system has integrated GIS, RS, DEM, data management capability and a dynamic basin model within a common Windows environment. The simulation algorithms of the rainfall-runoff model have operated on grid bases compatible with the MATLAB programming language, which has been used to write instructions to many grid-based operations. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The main objective of this research is the novel application of Partial least square path analysis (PLS-PA) to explore the latent sub-constructs of knowledge, attitude, and practices (KAP) on dengue via R programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of mapping methods for seagrass meadows in Malaysia by using landsat images by Hossain, Mohammad Shawkat

    Published 2015
    “…The mapping approach and the map products produced in this study will provide a useful tool for detection, distribution mapping and monitoring changes of seagrass and associated resources for coastal management and conservation programs.…”
    Get full text
    Get full text
    Thesis