Search Results - (( web application testing algorithms ) OR ( based applications among algorithm ))*
Search alternatives:
- application testing »
- testing algorithms »
- based applications »
- applications among »
- web application »
- among algorithm »
-
1
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
2
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Therefore, this paper presents a new mobile botnet classification based on permission and Application Programming Interface (API) calls in the smartphone. …”
Proceedings Paper -
3
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
4
-
5
A Requirement Model For Online Web-Based Car Loan Management System For UUM Bursary
Published 2008“…This research introduces a prototype "Web Based Car Loan Management System" to help in solving the problems or the difficulties of the traditional system (manual system), the study will use the methodology for this study is based on the general methodology in research design, because it is have the logical phases that used to develop a prototype for car loan management web based system and algorithm was developed to help facilitate decision making of the car loan process. …”
Get full text
Get full text
Get full text
Thesis -
6
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
7
-
8
Mobile Malware Classification via System Calls and Permission for GPS Exploitation
Published 2024Article -
9
A review of slicing techniques in software engineering
Published 2015“…This specific survey focuses on slicing techniques in the fields of numerous programing paradigms like web applications, object oriented, and components based. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Breast Cancer Diagnosis Using Neuro-CBR Approach
Published 2005Get full text
Get full text
Get full text
Thesis -
12
Enhancement of stemming process for malay illicit web content
Published 2012Get full text
Get full text
Thesis -
13
Suspicious activities detection for anti-money laundering using machine learning techniques
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
16
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In addition, the system is developed using the developing tools that are essential in web applications, namely. web server, database server, system server and web programming tools such as ASP and Visual Basic. …”
Get full text
Get full text
Thesis -
17
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…This research was involved with the development of Web Based Applications for Energy Management System for providing Web application system, Web monitoring System and Genetic algorithm Based Network Reconfiguration Technique for loss minimization in the UiTM Distribution System. …”
Get full text
Get full text
Thesis -
18
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
19
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…This new improved approach is significant in helping web application developers to test their applications for all types of XSS and remove any detected vulnerabilities before releasing them to the public. …”
Get full text
Get full text
Get full text
Thesis -
20
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Web 2.0 is commonly associated with Web applications that facilitate interactive information sharing, interoperability, user-centred design, and collaboration utilizing of technology. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
