Search Results - (( parameter optimization modified algorithm ) OR ( java attack detection algorithm ))

Search alternatives:

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm by Rosmazi, Rosli, Zamri, Mohamed

    Published 2021
    “…This article presents a new modified cuckoo search algorithm with dynamic discovery probability and step-size factor for optimizing the Bouc–Wen Model in magnetorheological damper application. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified Harmony Search by Najihah, Mohamed, Ahmad Lutfi, Amri Ramli, Ahmad, Abd Majid, Abd Rahni, Mt Piah

    Published 2017
    “…A metaheuristic algorithm, called Harmony Search is quite highly applied in optimizing parameters in many areas. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Hybrid Harmony Search Algorithm with Grey Wolf Optimizer and Modified Opposition-based Learning by Alomoush, Alaa A., Alsewari, Abdulrahman A., Alamri, Hammoudeh S., Aloufi, Khalid, Kamal Z., Zamli

    Published 2019
    “…Many variants have been developed to cope with this problem and improve algorithm performance. In this paper, a hybrid algorithm of HS with grey wolf optimizer (GWO) has been developed to solve the problem of HS parameter selection. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…his thesis implements a novel nature-inspired metaheuristic optimization algorithm, namely the modified Multi-Verse Optimizer (mMVO) algorithm, to identify the continuous-time model of Hammerstein system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…—Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  12. 12

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…Whale Optimization Algorithm (WOA) and Grey Wolf Optimizer (GWO) are well-perform metaheuristic algorithms used by various researchers in solving feature selection problems. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane by Julakha, Jahan Jui, Mohd Ashraf, Ahmad, Muhammad Ikram, Mohd Rashid

    Published 2021
    “…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Integrated optimal control and parameter estimation algorithms for discrete-time nonlinear stochastic dynamical systems by Kek, Sie Long

    Published 2011
    “…The main idea is the integration of optimal control and parameter estimation. In this work, a simplified model-based optimal control model with adjustable parameters is constructed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…A set of modified and novel optimization algorithms are proposed in this thesis to deal with different single and multi-objective OPF problems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A Modified Particle Swarm Optimization for Efficient Maximum Power Point Tracking Under Partial Shading Condition by Koh J.S., Tan R.H.G., Lim W.H., Tan N.M.L.

    Published 2024
    “…Therefore, a modified PSO hybridized with adaptive local search (MPSO-HALS) is designed as a robust, real-time MPPT algorithm. …”
    Article
  19. 19

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…In the hybrid scheme, the initial parameters of the modified BP neural network are optimized by using the global search ability of genetic algorithm, improved by cat chaotic mapping to enrich its optimization capability. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Modified Symbiotic Organism Search Algorithm with Lévy Flight for Software Module Clustering Problem by Nurul Asyikin, Zainal, Kamal Z., Zamli, Fakhrud, Din

    Published 2020
    “…To date, there are much increasing trends on adopting parameter free meta-heuristic algorithms for solving general optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item