Search Results - (( parameter classification model algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms by Azwa, Abdul Aziz, Fadhilah, Ahmad

    Published 2014
    “…The comparative analysis is also conducted to discover the best classification model for prediction. From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…The fourth stage is to design evaluation methodology of Max-Min Rule-Based Classification Algorithm using classifier model. Finally, both algorithms are validated against the findings in various literatures. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin by Mazlin, Mohd Irwan

    Published 2022
    “…There are 6 different ways of designing the experiment to evaluate the result of the study, which are an experiment with the model using different stemming techniques, an experiment with the model using three different algorithms, the result analysis of confusion matric of three algorithms, experiment the model using different SVM kernel, experiment the model using unseen data, produce precision, recall, F1-measure and accuracy result of the model and parameter. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Classification of gait parameters in stroke with peripheral neuropathy (PN) by using k-Nearest Neighbors (kNN) algorithm / N. Anang ...[et al.] by Anang, N., Jailani, R., Mustafah, N., Manaf, H.

    Published 2018
    “…The classification model developed has been successfully discriminate three different groups with 83.33% accuracy.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…By using this model, we then propose key sizes for different levels of information classification.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Feature selection and model selection algorithm using incremental mixed variable ant colony optimization for support vector machine classifier by Alwan, Hiba Basim, Ku-Mahamud, Ku Ruhana

    Published 2013
    “…In order to enhance SVM performance, these problems must be solved simultaneously because error produced from the feature subset selection phase will affect the values of the SVM parameters and resulted in low classification accuracy.Most approaches related with solving SVM model selection problem will discretize the continuous value of SVM parameters which will influence its performance.Incremental Mixed Variable Ant Colony Optimization (IACOMV) has the ability to solve SVM model selection problem without discretising the continuous values and simultaneously solve the two problems.This paper presents an algorithm that integrates IACOMV and SVM.Ten datasets from UCI were used to evaluate the performance of the proposed algorithm.Results showed that the proposed algorithm can enhance the classification accuracy with small number of features.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimization of support vector machine parameters in modeling of Iju deposit mineralization and alteration zones using particle swarm optimization algorithm and grid search method by Abbaszadeh M., Soltani-Mohammadi S., Ahmed A.N.

    Published 2023
    “…Copper deposits; Deposits; Geology; Learning algorithms; Mineralogy; Static Var compensators; Support vector machines; Three dimensional computer graphics; Alteration zones; Grid search; Grid-search method; Mineralization zone; Model Selection; Particle swarm optimization algorithm; Penalty parameters; Performance; Support vector classifiers; Support vectors machine; Particle swarm optimization (PSO); accuracy assessment; algorithm; classification; computer simulation; copper; geological survey; mineral alteration; mineralization; numerical model; ore deposit; parameterization; performance assessment; porphyry; resource assessment; support vector machine; three-dimensional modeling; Iran…”
    Article
  16. 16

    Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters by Teguh, Sutanto, Muhammad Rafli, Aditya, Haldi, Budiman, M.Rezqy, Noor Ridha, Usman, Syapotro, Noor, Azijah

    Published 2024
    “…This study compares four machine learning algorithms Logistic Regression, Random Forest, Support Vector Machine (SVM), and K-Nearest Neighbors (KNN) in water quality classification based on contaminant parameters. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Many researchers have trained ANFIS parameters using metaheuristic algorithms but very few have considered optimizing the ANFIS rule-base. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20