Search Results - Design Keywords Code Injection Attacks
-
1
Novel Defense Method of Malicious Code Injection in High Concurrency Database
Published: IEEE 13.03.2024Published in 2024 3rd International Conference on Sentiment Analysis and Deep Learning (ICSADL) (13.03.2024)“… on Node.js for efficient high concurrency processing. To protect against code injection, a randomization algorithm is applied that adds random prefixes to HTML and J avaScript keywords in trusted server-side code…”
Get full text
Conference Proceeding -
2
McEliece/Niederreiter PKC: Sensitivity to Fault Injection
ISBN: 1424469481, 9781424469482ISSN: 2159-7006Published: IEEE 01.05.2010Published in 2010 5th International Conference on Future Information Technology (01.05.2010)“… We present the injection fault in the McEliece scheme using Goppa codes and in two variants using quasi-cyclic alternant and quasi-dyadic codes, and describe the main…”
Get full text
Conference Proceeding -
3
Defense against REST-based web service attacks for enterprise systems
ISSN: 1543-5970, 1941-6687Published: San Bernadino International Information Management Association 01.01.2013Published in Communications of the IIMA (01.01.2013)“… However, the simplicity of a REST-based implementation has caused the neglect of its systematic security threat analysis and design…”
Get full text
Journal Article Trade Publication Article

