Search Results - (( web applications security algorithm ) OR ( web application design algorithm ))*
Search alternatives:
- application design »
- web applications »
- design algorithm »
- web application »
-
1
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
2
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
3
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application supports encoding and decoding images for concealing data in images. …”
Get full text
Get full text
Get full text
Article -
4
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
6
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…Motivated by a number of security experts in cloud computing, we proposed an innovative solution of authentication for cloud web-based applications. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
9
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…A short message service (SMS) alert system was set up using a modem router to notify car owner in case of unauthorized user access. In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
Article -
10
Web page design for electronic commerce / Lee Fong Wai
Published 2003Get full text
Get full text
Thesis -
11
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis -
12
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
Get full text
Get full text
Get full text
Article -
13
An e-voting application using cryptography technology
Published 2020“…The project is mainly a web application for the purpose of online voting. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Steganography For Embedding Data In Digital Image
Published 2003“…This thesis discusses the issues regarding Steganography and its application to multimedia security and communication, addressing both theoretical and practical aspects, and tackling both design and attack problems. …”
Get full text
Get full text
Thesis -
15
Explore Ease
Published 2024“…"Explore Ease" makes advantage of cutting-edge web technologies, such as secure authentication mechanisms via email, Google, and GitHub, complete responsiveness for seamless user interaction across devices, and Tailwind for design and animations. …”
Get full text
Get full text
Final Year Project -
16
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
17
Named entity recognition using a new fuzzy support vector machine.
Published 2008“…Machine learning method is more famous and applicable than others, because it’s more portable and domain independent. …”
Get full text
Get full text
Article -
18
-
19
-
20
