Search Results - (( security application testing algorithm ) OR ( java application among algorithm ))

Refine Results
  1. 1

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Fifteen files were then chosen to be the testing materials to examine the level of accuracy and security of the specific developed prototype. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14
  15. 15

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  16. 16

    An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction by Zainol, Annuur Zakiah, Saian, Rizauddin, Teoh, Yeong Kin, Mohd Razali, Muhammad Hasbullah, Abu Bakar, Sumarni

    Published 2024
    “…The effectiveness of HD-AntMiner is benchmarked against established classifiers—PART and J48—as well as the conventional Ant-Miner, using public datasets and a specialized dataset of 759 Shariah-compliant securities companies in Malaysia. Utilising the Friedman test and F-score for validation, HD-AntMiner demonstrates superior performance in handling imbalanced datasets compared to other algorithms, as affirmed by the Friedman test. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20