Search Results - (( based application design algorithm ) OR ( web applications security algorithm ))

Refine Results
  1. 1

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Microcontroller-based face recognition system with web-based application for car security by Arumugam P., Ker P.J., Tan J.Y., Mani D.

    Published 2023
    “…A short message service (SMS) alert system was set up using a modem router to notify car owner in case of unauthorized user access. In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
    Article
  6. 6

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7
  8. 8

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Nowadays more researchers use three type of approaches namely, Rule-base NER, Machine Learning-base NER and Hybrid NER to identify names. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  12. 12

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
    Get full text
    Get full text
    Article
  13. 13

    Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System by Khashan, Osama Ahmed Abdelhadi

    Published 2007
    “…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Secure mobile AES encryptor (SMAE) by Satia, Anbalagan

    Published 2016
    “…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
    Get full text
    Get full text
    Article
  17. 17

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis