Search Results - (( its application using algorithmic ) OR ( web applications security algorithm ))*
Search alternatives:
- web applications »
- its application »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…This SOA implementation does not possess adequate security solutions within it, and its security is completely dependent on network/transport layer security that is obsolete owing to latest web technologies such as Web 2.0 and its upgraded version, Web 3.0. …”
Get full text
Get full text
Article -
4
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
5
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
9
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
12
A comparative analysis of anti-phishing website techniques: identifying optimal approaches to enhance cybersecurity
Published 2023“…By integrating the Google Safe Browsing List and the Random Forest classifier, a web application is created. Upon receiving the user's URL, the web application utilises a pre-trained Random Forest classifier to ascertain the probability that the requested URL is a fraud site. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…As a result, 16 permissions and 31 API calls that are most related with mobile botnet have been extracted using feature selection and later classified and tested using machine learning algorithms. …”
Proceedings Paper -
14
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
15
Secured mobile transaction using NFC Technology: Top-Up printing system
Published 2011“…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
18
An e-voting application using cryptography technology
Published 2020“…HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
Published 2022“…The test was conducted using eleven PHP Web applications: ten applications available on the internet and that other researchers have used and one application that the researcher developed. …”
Get full text
Get full text
Thesis -
20
