4.5 Article

Web Attack Detection Using the Input Validation Method: DPDA Theory

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks

Ahmad F. Subahi et al.

Summary: The proposed method, Ad Hoc On-Demand and Distance Vector-Packet Drop Battling Mechanism (AODV-PDBM), aims to detect and prevent packet drop attacks in mobile ad hoc networks while conserving energy. It identifies optimal routes prioritizing jumps, battery life, and security, serving as an effective defense mechanism against network threats.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

A New Database Intrusion Detection Approach Based on Hybrid Meta-Heuristics

Youseef Alotaibi

Summary: A new secure database management system architecture is proposed in this paper, utilizing intrusion detection systems and a new clustering algorithm to create user profiles and using a simple classifier for detection. Experimental results show that this method results in very small False Negative (FN) and False Positive (FP) rates.

CMC-COMPUTERS MATERIALS & CONTINUA (2021)

Article Computer Science, Information Systems

Towards a Hybrid Immune Algorithm Based on Danger Theory for Database Security

Wael Said et al.

IEEE ACCESS (2020)

Article Telecommunications

Detecting Cross-Site Scripting in Web Applications Using Fuzzy Inference System

Bakare K. Ayeni et al.

JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS (2018)

Article Computer Science, Information Systems

SQL Injection Attack classification through the feature extraction of SQL query strings using a Gap-Weighted String Subsequence Kernel

Paul R. McWhirter et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2018)

Article Computer Science, Theory & Methods

Intent-Based Extensible Real-Time PHP Supervision Framework

Victor Prokhorenko et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Computer Science, Information Systems

How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints

Dimitris Mitropoulos et al.

ACM TRANSACTIONS ON PRIVACY AND SECURITY (2016)

Article Computer Science, Hardware & Architecture

Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning

Lwin Khin Shar et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Review Computer Science, Information Systems

Current state of research on cross-site scripting (XSS) - A systematic literature review

Isatou Hydara et al.

INFORMATION AND SOFTWARE TECHNOLOGY (2015)

Article Computer Science, Information Systems

A Survey on Detection and Prevention of Cross-Site Scripting Attack

V. Nithya et al.

INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2015)

Article Computer Science, Information Systems

Detecting SQL injection attacks using query result size

Young-Su Jang et al.

COMPUTERS & SECURITY (2014)

Article Computer Science, Information Systems

Semantic security against web application attacks

Abdul Razzaq et al.

INFORMATION SCIENCES (2014)

Article Computer Science, Information Systems

CANDID: Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks

Prithvi Bisht et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2010)

Article Computer Science, Software Engineering

WASP: Protecting web applications using positive tainting and syntax-aware evaluation

William G. J. Halfond et al.

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (2008)