Search Results - (( variable visualisation using algorithm ) OR ( java attack detection algorithm ))
Search alternatives:
- visualisation using »
- using algorithm »
- variable »
- java »
-
1
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Thus, making it hard to detect and successfully bypasses the detection mechanism. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…Accordingly, the aim of this study is to identify the latest SQL injection attacks based on user’s inputs in web application associated with remote server database, and to develop a new method based on dynamic detection technique to prevent SQL injection attacks. …”
Get full text
Get full text
Get full text
Article -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Many web applications are vulnerable to XSS and are attacked frequently. Most of the previously proposed approaches focused on preventing and detecting XSS attacks during runtime, after vulnerable applications are already deployed. …”
Get full text
Get full text
Thesis -
7
ENGINEERING DESIGN WITH PSO ALGORITHM
Published 2019“…It assists design engineers as it gives a clearer visualization to predict which value of the variables gives a best produced result. This dissertation will demonstrate the ability of PSO Algorithm in improving design areas by the use of recommendation system that helps engineering designers to visualise an optimal design.…”
Get full text
Get full text
Final Year Project -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
Get full text
Get full text
Conference or Workshop Item -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization
Published 2021“…ML models were constructed using 302 patients and 54 input variables from the Malaysian National Cardiovascular Disease Database. …”
Get full text
Get full text
Get full text
Article -
11
Predictors on outcomes of cardiovascular disease of male patients in Malaysia using Bayesian network analysis
Published 2023“…Conclusions The data visualisation analysis can be a powerful tool to understand the relationships between the CVD prognostic variables and can be useful to clinicians.…”
Get full text
Get full text
Get full text
Get full text
Article -
12
Analysis of the dynamics of a vector-borne infection with the effect of imperfect vaccination from a fractional perspective
Published 2024“…On the other hand, vaccination, memory index or fractional order, and treatment could be used as efficient controlling variables. � 2023, Springer Nature Limited.…”
Article -
13
Axis manipulation to solve Inverse Kinematics of Hyper-Redundant Robot in 3D Space
Published 2022“…In this study, an axis manipulation using a geometrical approach is used. Initially, a general algorithm for a 2-m-link hyper-redundant robot in 3D is generated. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria
Published 2024“…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
Get full text
Get full text
Get full text
Article -
15
Bioinformatics analysis and spatiotemporal distribution of the fliC gene and its protein isolated from Escherichia coli-infected patients in eastern Algeria
Published 2024“…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
Get full text
Get full text
Get full text
Article
