Search Results - (( programming data virtualization algorithm ) OR ( java attack detection algorithm ))

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Virtual reality in algorithm programming course: practicality and implications for college students by Dewi, Ika Parma, Ambiyar, Mursyida, Lativa, Effendi, Hansi, Giatman, Muhammad, Efrizon, Hanafi, Hafizul Fahri, Ali, Siti Khadijah

    Published 2024
    “…The reliability of VR supports various variations in learning, including learning programming algorithms. This research aims to design and develop VR in learning programming algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    3D hand posture recognition using multicam by Mohd Nazrin , Muhammad, Nurdiana, Nordin

    Published 2011
    “…The availability of the distance data allows the hand posture to be recognized in z-axis direction without complex computational algorithms which also enables the program to work in real-time processing as well as eliminates the background effectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Facilitating English Language teaching through AI- based drama in Palestine by Bsharat, Tahani, Sheikh Ahmad, Ismail

    Published 2025
    “…Artificial Intelligence (AI) has the potential to significantly reshape the landscape of education through the integration of AI- powered tools, personalized learning algorithms, and virtual and augmented reality. In a study exploring the integration of AI- based drama in English language teaching in Palestine, a cohort of 43 teachers from both governmental and private schools participated in a questionnaire- based assessment. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  15. 15

    IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan by Jahangir , Hassan Khan

    Published 2019
    “…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
    Get full text
    Get full text
    Monograph
  17. 17

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    3D solid robot animation design based on ADAMS by Baojian Yang, Yongning Deng, Xia Yue, Tze, Kenneth Kin Teo

    Published 2023
    “…It is of great significance to propose an efficient and improved inverse kinematics algorithm for the development of robotic bionics in China. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Hand gesture recognition system using image processing

    Published 2007
    “…This system also used algorithm of several processing technique that may or may not be the same output for each type of it. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An AI-based mental health and loneliness support plushie by Norazhar, Fatin Nabila, Jamil, Muhammad Faris Fakhri, Baharum, Nuur Aleeysa, Roslan, Rohaiza

    Published 2025
    “…Concerning areas like data privacy, ethical use, algorithmic prejudice, and AI's inability to completely duplicate human empathy must be addressed. …”
    Get full text
    Get full text
    Book Section