Search Results - (( web application among algorithm ) OR ( _ applications security algorithm ))*
Search alternatives:
- application among »
- web application »
- among algorithm »
- _ applications »
-
1
-
2
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
4
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
5
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
6
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. …”
Get full text
Get full text
Get full text
Proceeding -
7
A new algorithm to measure relevance among Web pages
Published 2006“…This paper proposes a new algorithm to measure relevance among Web pages (RWP) using a hybrid method of hyperlink analysis and content analysis. …”
Get full text
Get full text
Get full text
Article -
8
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013Get full text
Get full text
Final Year Project -
9
Smart student timetable planner
Published 2025“…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A new ant based rule extraction algorithm for web classification
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
11
Phishing image spam classification research trends: Survey and open issues
Published 2020“…A phishing email is an attack that focused completely on people to circumvent existing traditional security algorithms. The email appears to be a dependable, appropriate, and solid communication medium for internet users. …”
Get full text
Get full text
Article -
12
Web cluster load balancing via genetic-fuzzy based algorithm
Published 2007Get full text
Get full text
Get full text
Article -
13
Adaptive System State Based Load Balancing For Web Application Server Cluster Of Heterogeneous Performance Nodes
Published 2013“…This research is to propose a new efficient DNS-based load balancing algorithms that can solve a sudden increase of demand for service requests when they are applied to a local Domain Name Service (DNS) server for Web based applications and selected services. …”
Get full text
Get full text
Get full text
Thesis -
14
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
15
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
16
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The existing sequential and the proposed parallel algorithms were simulated successfully while preserving security properties. …”
Get full text
Get full text
Thesis -
18
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Trust-based enhanced ACO algorithm for secure routing in IoT
Published 2024“…In comparison to the standard bioinspired algorithms and existing secure routing protocols, the proposed system reduces average energy consumption by nearly 50% regardless of the increase in the number of nodes and end-to-end delay of 40%, while finding the secure and optimal path in unison is designed to ensure trust in the IoT environment.…”
Get full text
Get full text
Get full text
Get full text
Article
