Search Results - (( simulation classification using algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- simulation classification »
- classification using »
- using algorithm »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules
Published 2013“…Thus, this thesis proposed two variants of hybrid ACO with simulated annealing (SA) algorithm for solving problem of classification rule induction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Feature Selection using Binary Simulated Kalman Filter for Peak Classification of EEG Signals
Published 2018Get full text
Get full text
Conference or Workshop Item -
9
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…At first, a peak classification algorithm is developed based on the general following processes including peak candidate identification, feature extraction, and classification. …”
Get full text
Get full text
Get full text
Thesis -
10
Ant colony optimization for rule induction with simulated annealing for terms selection
Published 2012“…This paper proposes a sequential covering based algorithm that uses an ant colony optimization algorithm to directly extract classification rules from the data set.The proposed algorithm uses a Simulated Annealing algorithm to optimize terms selection, while growing a rule.The proposed algorithm minimizes the problem of a low quality discovered rule by an ant in a colony, where the rule discovered by an ant is not the best quality rule, by optimizing the terms selection in rule construction. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The forms of urban growth can be simulated using satellite remote sensing data and suitable classification technique. …”
Get full text
Get full text
Thesis -
12
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
13
An Analysis Of Various Algorithms For Text Spam Classification And Clustering Using Rapidminer And Weka
Published 2024“…By using the same dataset, which is downloaded from UCI, Machine Learning Repository, various algorithms used in classification and clustering in this simulation has been analysed comparatively. …”
Article -
14
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Classification for large number of variables with two imbalanced groups
Published 2020“…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…The comparison showed that, the accuracy of the unsupervised classification map with value of 88.4% that was generated by using the cluster labelling algorithm was slightly more than the maximum-likelihood supervised classification map with value of 87.5%. …”
Get full text
Get full text
Thesis -
17
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
18
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…Two algorithms, the Cloth Simulation Filter (CSF) in CloudCompare and the Multiscale Curvature Classification (MCC) in Global Mapper, were tested for this purpose. …”
Get full text
Get full text
Student Project -
19
-
20
High voltage transmission line fault classification based on neural network trained by particle swarm optimization
Published 2017“…The use of neural system way to deal with recognize the fault classification of the transmission lines is led in this review. …”
Get full text
Get full text
Student Project
