Search Results - (( web applications security algorithm ) OR ( web application a algorithm ))
Search alternatives:
- web applications »
- web application »
- application a »
- a algorithm »
-
1
-
2
-
3
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. …”
Get full text
Get full text
Thesis -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
6
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
7
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
9
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
10
-
11
An optimized attack tree model for security test case planning and generation
Published 2018“…This paper presents an attack tree modeling algorithm for deriving a minimal set of effective attack vectors required to test a web application for SQL injection vulnerabilities. …”
Get full text
Get full text
Article -
12
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015“…Software security vulnerabilities have led to many successful attacks on applications, especially web applications, on a daily basis. …”
Get full text
Get full text
Conference or Workshop Item -
15
An approach for cross-site scripting detection and removal based on genetic algorithms.
Published 2014“…Software security vulnerabilities have led to many successful attacks on applications, on a daily basis. …”
Get full text
Get full text
Conference or Workshop Item -
16
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. The major objective of the proposed technique referred to as a Secure Web Access Control (SWAC) is to provide mechanisms for control web access based on user access behavior. …”
Get full text
Get full text
Thesis -
18
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis
