Search Results - (( _ application learning algorithm ) OR ( web applications security algorithm ))*
Search alternatives:
- application learning »
- learning algorithm »
- web applications »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
3
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…By integrating the Google Safe Browsing List and the Random Forest classifier, a web application is created. Upon receiving the user's URL, the web application utilises a pre-trained Random Forest classifier to ascertain the probability that the requested URL is a fraud site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. The experimental result shows that the Random Forest Algorithm has achieved the highest detection accuracy of 99.4% with the lowest false positive rate of 16.1% as compared to other machine learning algorithms. …”
Proceedings Paper -
5
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Malware visualizer: A web apps malware family classification with machine learning
Published 2021“…The web apps is developed using Python with help of Streamlit with is a Python library for building datadriven web apps. …”
Get full text
Get full text
Conference or Workshop Item -
7
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
8
-
9
A machine learning approach to movie recommendation system
Published 2025“…The final system is implemented as a web application with features such as secure login, dynamic movie interaction, and personalized profile management. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
-
12
-
13
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
14
-
15
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
16
An optimized attack tree model for security test case planning and generation
Published 2018“…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
Get full text
Get full text
Article -
17
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
18
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article
