Search Results - (( its application a algorithm ) OR ( web application security algorithm ))*
Search alternatives:
- its application »
- web application »
- application a »
- a algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
4
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
5
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
9
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…By integrating the Google Safe Browsing List and the Random Forest classifier, a web application is created. Upon receiving the user's URL, the web application utilises a pre-trained Random Forest classifier to ascertain the probability that the requested URL is a fraud site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
Get full text
Get full text
Thesis -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
14
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
15
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…NFC technology has become a success across a broad range of applications depending on its large- scale adoption by enterprises and consumers. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…It has a more significant impact on the backend database than the first-order SQLIA, simply because its respective SQL injection is seeded first into the application's persistent storage, which is usually deemed a trusted source, before its actual exploitation. …”
Get full text
Get full text
Thesis -
18
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
19
An e-voting application using cryptography technology
Published 2020“…The project is mainly a web application for the purpose of online voting. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
