Search Results - "Web-based attacks"
-
1
Authors: et al.
Contributors: et al.
Source: Alexandria Engineering Journal, Vol 127, Iss, Pp 677-689 (2025)
Subject Terms: Cybersecurity, Web-based attacks, AI, Mayfly optimization, TA1-2040, Engineering (General). Civil engineering (General), NLP, Industry 5.0
File Description: application/pdf
-
2
-
3
Authors: et al.
Source: IEEE Access, Vol 12, Pp 153285-153294 (2024)
-
4
Authors: et al.
Subject Terms: bezpečnost, GSM, HTTPS, informační systém, IPSec, Kerberos, SSH, SSL, UMTS, výkonnostní testy, webové útoky, WEP, Wi-Fi, WPA s PSK autentizací, benchmarks, information system, security, web-based attacks, WPA with PSK authentication
File Description: text; application/pdf
Relation: Elektrorevue; http://www.elektrorevue.cz/; https://hdl.handle.net/11012/244490
Availability: https://hdl.handle.net/11012/244490
-
5
Authors: et al.
Source: University of Ibadan Journal of Science and Logics in ICT Research; Vol. 11 No. 2 (2024): Journal of Science and Logics in ICT Research; 14-23
Subject Terms: Web Based Attacks, Random Forest, Correlation Feature Selection, machine learning
File Description: application/pdf
-
6
Authors: et al.
Contributors: et al.
Source: idUS. Depósito de Investigación de la Universidad de Sevilla
Universidad de Sevilla (US)Subject Terms: Cybersecurity, Web-based attacks, Automatic signatures generation, Intrusion Detection
File Description: application/pdf
-
7
Authors: et al.
Source: Technologies, Vol 11, Iss 107, p 107 (2023)
Subject Terms: cyber-physical systems, CNN, Industry 5.0, transformer models, web-based attacks, Technology
Relation: https://www.mdpi.com/2227-7080/11/4/107; https://doaj.org/toc/2227-7080; https://doaj.org/article/59e2cced98394fe38a90affde5febb05
-
8
Authors: et al.
Source: International Journal of Information Security. 18:481-504
Subject Terms: Browser attacks, Browser security, Clickjacking, Cyber attacks, Web-based attacks, Software, Information Systems, Safety, Risk, Reliability and Quality, Computer Networks and Communications, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
9
Authors: et al.
Source: Applied Sciences, Vol 12, Iss 60, p 60 (2021)
Subject Terms: web-based attacks, feature selection, Shapley additive explanations, tree ensemble methods, machine learning, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Relation: https://www.mdpi.com/2076-3417/12/1/60; https://doaj.org/toc/2076-3417; https://doaj.org/article/12102e964945465dbdfc67f190972b27
-
10
Authors: et al.
Contributors: et al.
Source: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. :1382-1393
Subject Terms: Technology, Science & Technology, Computer Science, Information Systems, Computer Science, Theory & Methods, Computer Science, web-based attacks, 0202 electrical engineering, electronic engineering, information engineering, Side-channel attacks, 02 engineering and technology, Computer Science, Software Engineering, privacy
Access URL: https://lirias.kuleuven.be/bitstream/123456789/541727/1/ccsfp206-vangoethem-1.pdf
https://tom.vg/papers/timing-attacks_ccs2015.pdf
https://dl.acm.org/doi/pdf/10.1145/2810103.2813632
http://tom.vg/papers/timing-attacks_ccs2015.pdf
https://lirias.kuleuven.be/bitstream/123456789/541727/1/ccsfp206-vangoethem-1.pdf
https://vagosec.org/papers/timing-attacks_ccs2015.pdf
https://dl.acm.org/citation.cfm?doid=2810103.2813632 -
11
Authors: et al.
Source: IEEE Access
Subject Terms: Android, accessibility services, malicious websites, web-based attacks, web security
-
12
Authors: Prenalee Nanaware
Source: International Journal of Integrated Science and Technology; Vol. 2 No. 1 (2024): January 2024; 29-36 ; 3026-4685 ; 10.59890/ijist.v2i1
Subject Terms: Malicious URL Detection, Web Based Attacks, Feature Extraction, Malicious Web Pages
File Description: application/pdf
Relation: https://journal.multitechpublisher.com/index.php/ijist/article/view/1289/1204; https://journal.multitechpublisher.com/index.php/ijist/article/view/1289
-
13
Authors: et al.
Contributors: et al.
Source: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. :918-929
Subject Terms: ecosystem, Technology, certification, Science & Technology, security seals, Web applications, web-based attacks, Engineering, Electrical & Electronic, security, 02 engineering and technology, Engineering, Computer Science, Theory & Methods, Computer Science, Telecommunications, 0202 electrical engineering, electronic engineering, information engineering
Access URL: https://lirias.kuleuven.be/bitstream/123456789/471360/1/p918-vangoethem.pdf
https://tom.vg/papers/seals_ccs2014.pdf
https://2015.appsec.eu/wp-content/uploads/2015/09/owasp-appseceu2015-vangoethem.pdf
https://www.securitee.org/files/seals_ccs2014.pdf
https://dblp.uni-trier.de/db/conf/ccs/ccs2014.html#GoethemPJN14
http://tom.vg/papers/seals_ccs2014.pdf
https://vagosec.org/papers/seals_ccs2014.pdf
https://lirias.kuleuven.be/handle/123456789/471360
https://doi.org/10.1145/2660267.2660279 -
14
-
15
Authors: et al.
Subject Terms: výkonnostní testy, WPA with PSK authentication, SSL, web-based attacks, WPA s PSK autentizací, security, webové útoky, bezpečnost, information system, benchmarks, IPSec, UMTS, SSH, GSM, WEP, Wi-Fi, informační systém, Kerberos
File Description: text; application/pdf
Access URL: https://hdl.handle.net/11012/244490
-
16
Authors:
Contributors:
Subject Terms: Computer security, Artificial immunology, negative selection, web based attacks
File Description: xvi, 54 p.; application/pdf
-
17
Authors: et al.
Contributors: et al.
Subject Terms: Computer Systems Management and Standards, Computer Programming and Software, computer security, web browsers, network protocols, high level languages, operating systems, computer access control, web applications, network architecture, cyberattacks, computer programs, COUNTERMEASURES, VULNERABILITY, WEB SECURITY, WEB-BASED ATTACKS, WEB-BASED DEFENSES, info, scipo
Availability: http://www.dtic.mil/docs/citations/AD1021692
-
18
Authors: Likarish, Peter F.
Thesis Advisors: Jung, Eunjin
Source: Theses and Dissertations.
Subject Terms: applied machine learning, Computer security, Domain Name System, javascript, phishing, web-based attacks, Computer Sciences
File Description: application/pdf
-
19
Authors:
Subject Terms: anomaly-based detection, artificial neural networks, hybrid web application firewall, web-based attacks, web application security
Subject Geographic: 189-206
File Description: média; svazek
-
20
Authors:
Contributors:
Subject Terms: General Terms Algorithms, Attack Types. Keywords Machine Learning, Feature Extraction, Benign, Malicious Web Pages, Classification Module, Web-Based Attacks
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.5517; http://research.ijcaonline.org/volume99/number17/pxc3898247.pdf
Full Text Finder
Nájsť tento článok vo Web of Science