Search Results - (( web application ((new algorithm) OR (tree algorithm)) ) OR ( mobile applications _ algorithm ))
Search alternatives:
- mobile applications »
- web application »
- tree algorithm »
- new algorithm »
-
1
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment
Published 2024Proceedings Paper -
2
Intelligent cooperative web caching policies for media objects based on decision tree supervised machine learning algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Also, as more users are browsing the Internet through their mobile applications, this approach will help in protecting their private data and make browsing safer for them with both Desktop and Mobile web applications.…”
Get full text
Get full text
Get full text
Thesis -
4
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
journal::journal article -
5
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
6
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…Furthermore, data were collected simulated based on the mobile application prototype to be used for finding the suitable machine learning algorithms in the recommendation system module. …”
Get full text
Get full text
Get full text
Article -
7
Route planner mobile web application for UiTM Malaysia / Suzana Ahmad ... [et al.]
Published 2009“…A Route Planner Mobile Web Application for UiTM Malaysia has been developed to produce a list of routes from two selected points in order of the shortest first. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
-
11
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The rapid growth of Web 2.0 applications, such as blogs and social networks creates rich online information and provides various new sources of knowledge. …”
Get full text
Get full text
Thesis -
12
-
13
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
14
Car dealership web application
Published 2022“…Thus, explainable AI and AI monitoring become the integral components for any new development of commercial applications, including used car dealership web application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…The phenomenal growth of e-commerce applications in the World Wide Web requires the need to increase the security of data communications over the Internet, especially for highly sensitive document transfer. …”
Get full text
Get full text
Student Project -
17
Lightweight Cryptography Techniques for MHealth Cybersecurity
Published 2024“…A new integration of wireless communication technologies into the mobile heath system also known as mHealth has instigated a momentous research interest in the field of mobile security. mHealth systems are unique in terms of characteristics, challenges, architecture, and applications. …”
Proceedings Paper -
18
A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF
Published 2021“…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
Get full text
Get full text
Get full text
Book Chapter -
19
-
20
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article
