Search Results - (( program implementation based algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- program implementation »
- implementation based »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Conference or Workshop Item -
10
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…The objective of this paper is to describe the implementation of autonomous navigation through the use of event-driven programming technique which was based on finite state machines (FSM). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
Get full text
Get full text
Thesis -
13
CAR TRACTION CONTROL SYSTEM
Published 2007“…VHDL is used in FPGA - based implementation. The methodology includes designing the fuzzy logic controller, development of the algorithm and codes programming. …”
Get full text
Get full text
Final Year Project -
14
Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la...
Published 2015“…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Vision-based robot indoor navigation
Published 2022“…This project aims to develop a vision-based navigation robot using OpenCV and C++ programming language in an indoor environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Drone Based People Counter And Tracking Using Unique Id Using Opencv Python
Published 2020“…The purpose of this thesis is to implement an algorithm for drone-based square boundaries using Python and OpenCV. …”
Get full text
Get full text
Monograph -
18
Development of a cost efficient vision system for defects detection / Muhammad Zarif Kamarudin
Published 2010“…A full programming documentation was done based on programming body modification and improvement. …”
Get full text
Get full text
Monograph -
19
Parallelization of speech compression based algorithm based on human auditory system on multicore system
Published 2012“…The objective of this research is to develop and implement a novel parallel speech compression algorithm based on human auditory system on a multicore system. …”
Get full text
Get full text
Get full text
Article -
20
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013Get full text
Get full text
Student Project
