Search Results - (( security application testing algorithm ) OR ( java application among algorithm ))
Search alternatives:
- security application »
- application testing »
- testing algorithm »
- application among »
- java application »
- among algorithm »
-
1
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
2
-
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
6
Route optimization security in mobile IPv6 wireless networks: a test-bed experience
Published 2008Get full text
Get full text
Conference or Workshop Item -
7
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Fifteen files were then chosen to be the testing materials to examine the level of accuracy and security of the specific developed prototype. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
11
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
12
Secure mobile AES encryptor (SMAE)
Published 2016“…The reason the AES encryption algorithm selected is because it is considered as one of the most secure encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
14
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
16
An Enhanced Ant Colony Optimisation Algorithm with the Hellinger Distance for Shariah-Compliant Securities Companies Bankruptcy Prediction
Published 2024“…The effectiveness of HD-AntMiner is benchmarked against established classifiers—PART and J48—as well as the conventional Ant-Miner, using public datasets and a specialized dataset of 759 Shariah-compliant securities companies in Malaysia. Utilising the Friedman test and F-score for validation, HD-AntMiner demonstrates superior performance in handling imbalanced datasets compared to other algorithms, as affirmed by the Friedman test. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Design and Implementation of a Genetic Algorithm-Based Block Cipher For Enhanced Cryptographic Security
Published 2025conference output::conference proceedings::conference paper -
18
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
19
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
20
An Enhanced Hybrid Method Using AES Algorithm And Arabic Text Steganography
Published 2024thesis::master thesis
