Search Results - (( web applications using algorithm ) OR ( based applications security algorithm ))*
Search alternatives:
- applications using »
- based applications »
- web applications »
- using algorithm »
-
1
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…This project is a web based application for medical consultation system, it describes a special security way to process a medical care data which transporting through a public networks such as the Internet. …”
Get full text
Get full text
Thesis -
2
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
4
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
5
-
6
The Implementation of Securing Plaintext File Using Cryptography Method in Web Based Environment
Published 2004“…The objective of this research in primarily to find the best fit crytography system that can encrypt and decrypt the extension file .doc, implement it in a simple application which works similar to email and construct and run a set of evaluation to securing plaintext file in a web based environment. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
8
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
9
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
10
-
11
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024Proceedings Paper -
12
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…They possess a wide range of applications, spanning from guaranteeing the security of web traffic through protocols like SSL/TLS to encrypting confidential data stored on hard drives. …”
Get full text
Get full text
Thesis -
13
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
Article -
15
Data hiding mobile application by using encryption and decryption / Nuha Bakizah Mohd Asri
Published 2021“…Numerous data security and hiding algorithms have been developed in the last decade. …”
Get full text
Get full text
Student Project -
16
Online Transaction Fraud Detection Using Backlogging On E-Commerce Website: A Review
Published 2024Article -
17
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…This paper presents work in progress on detecting cross-site scripting vulnerabilities in mobile versions of web applications. It proposes an enhanced genetic algorithm-based approach that detects cross-site scripting vulnerabilities in mobile versions of web applications. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise
