Search Results - (( java web detection algorithm ) OR ( basic computing tree algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…Many solutions have been proposed for their detection. However, the problem of cross-site scripting vulnerabilities present in web applications still persists. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Stereo matching algorithm using census transform and segment tree for depth estimation by Hamzah, Rostam Affendi, Zainal Azali, Muhammad Nazmi, Mohd Noh, Zarina, Tengku Wook, Tg Mohd Faisal, Zainal Abidin, Izwan

    Published 2023
    “…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…© 2018 The Natural Computing Applications Forum…”
    Get full text
    Get full text
    Article
  15. 15

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…© 2018 The Natural Computing Applications Forum…”
    Get full text
    Get full text
    Article
  16. 16

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia by Lim, San Yee

    Published 2018
    “…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking by Wisitponchai, Tanchanok, Shoombuatong, Watshara, Lee, Vannajan Sanghiran, Kitidee, Kuntida, Tayapiwatana, Chatchai

    Published 2017
    “…Background: Computational analysis of protein-protein interaction provided the crucial information to increase the binding affinity without a change in basic conformation. …”
    Get full text
    Get full text
    Article