Search Results - site detection algorithm

Refine Results
  1. 1

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect and remove cross-site scripting vulnerabilities from the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…In this paper, we propose to explore an approach based on genetic algorithms that will be able to detect cross-site scripting vulnerabilities in the source code before an application is deployed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…The NRGDD is compared with Multi-Cycle of Deadlock Detection and Recovery (MC2DR) algorithm based on the time required for both models to detect two deadlock cycles and using different numbers of transactions. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Online fake news detection algorithm by Sirajudeen, Sakeena M, A. Azmi, Nur Fatihah, Abubakar, Adamu

    Published 2017
    “…Due to the difficulty in preventing and evaluating what does fake news contain prior to publishing it online, if an algorithm is known for detecting fake news, then spreading online fake news wouldn’t exist in the first place, lead this paper to presents an evaluation of the effectiveness of algorithm(s), able to detect and filter to reasonable degree of accuracy what constitute an online fake news. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…Some of well-known web application vulnerabilities are Structured Query Language (SQL) Injection, Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF). …”
    Get full text
    Get full text
    Research Reports
  7. 7

    Towards cross-site scripting vulnerability detection in mobile web applications by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2018
    “…It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Wind direction and speed estimation for quadrotor based gas tracking robot by Eu, Kok Seng *, Chia, Wei Zheng, Yap, Kian Meng *

    Published 2017
    “…In gas extraction sites, the incidents of gas leaking poses a damage to workers on site. …”
    Get full text
    Book Section
  10. 10

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…Transferability of each of the models was verified by testing in another site for consistency. The overall accuracy of the Support Vector Machine SVM and Random Forest RF classifiers revealed that three of the six algorithms exhibited higher ranks in the landslide detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…Content Security Policy (CSP) is powerful client-side security layer that helps in mitigating and detecting wide ranges of web attacks including cross-site scripting (XSS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection by Muhammad Arif, Mohamad, Muhammad Aliif, Ahmad, Zuriani, Mustaffa

    Published 2024
    “…There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm by Yap K.S., Abidin I.Z., Ahmad A.R., Hussien Z.F., Pok H.L., Ismail F.I., Mohamad A.M.

    Published 2023
    “…(SESB) to reduce their distribution loss, estimated around 15% at present in Sabah State, Malaysia. The hybrid algorithm is able to preselect customers to be inspected on-site for abnormalities or potential fraud according to their consumption patterns. …”
    Conference Paper
  16. 16

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…The performance of the NDVI image differencing algorithm for deforestation detection between 1973 and 1996 was investigated at three test sites covered with reliable ground truths. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Image Detection Model for Construction Worker Safety Conditions using Faster R-CNN by Madihah Mohd Saudi, Azuan Ahmad, Ma'arof, Aiman Hakim, Saudi, Ahmad Shakir Mohd, Ali, Mohd Hanafi, Narzullaev, Anvar, Ghazali, Mohd Ifwat Mohd

    Published 2024
    “…Thus, this paper presents an image detection model about workers' safety conditions based on PPE compliance by using the Faster Region-based Convolutional Neural Networks (R-CNN) algorithm. …”
    Article
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This approach is also able to remove the vulnerabilities detected in the tested web application source codes. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Site safety with ability of Artifical Intelligent camera / Marshitah Mustafa and Mohd Fareh Majid by Mustafa, Marshitah, Majid, Mohd Fareh

    Published 2023
    “…Site safety with the ability of Artificial Intelligence (AI) camera highlights the integration of advanced technology to enhance safety in various work environments. …”
    Get full text
    Get full text
    Conference or Workshop Item