-
1دورية أكاديمية
المؤلفون: Doležel, Radek, Humpolík, Jan, Jelínek, Martin, Jirkovská, Šárka, Lúdik, Michal
مصطلحات موضوعية: bezpečnost, GSM, HTTPS, informační systém, IPSec, Kerberos, SSH, SSL, UMTS, výkonnostní testy, webové útoky, WEP, Wi-Fi, WPA s PSK autentizací, benchmarks, information system, security, web-based attacks, WPA with PSK authentication
وصف الملف: text; application/pdf
العلاقة: Elektrorevue; http://www.elektrorevue.czTest/; Elektrorevue. 2010, vol. 12, č. 1, s. 1-5. ISSN 1213-1539; https://hdl.handle.net/11012/244490Test
-
2مؤتمر
المؤلفون: Estepa Alonso, Rafael María, Díaz Verdejo, Jesús, Estepa Alonso, Antonio José, Madinabeitia Luque, Germán, Muñoz Calle, Francisco Javier
المساهمون: Universidad de Sevilla. Departamento de Ingeniería Telemática, Universidad de Sevilla. TIC154: Departamento de Ingeniería Telemática, Junta de Andalucía
مصطلحات موضوعية: Cybersecurity, Intrusion Detection, Automatic signatures generation, Web-based attacks
العلاقة: XV Jornadas de Ingeniería Telemática, JITEL 2021: Libro de actas (2021), pp. 192-195.; 2020/00000172; https://jitel21.udc.es/files/actasJITEL21.pdfTest; https://idus.us.es/handle//11441/143918Test
-
3دورية أكاديمية
المؤلفون: Abdu Salam, Faizan Ullah, Farhan Amin, Mohammad Abrar
المصدر: Technologies, Vol 11, Iss 4, p 107 (2023)
مصطلحات موضوعية: cyber-physical systems, CNN, Industry 5.0, transformer models, web-based attacks, Technology
وصف الملف: electronic resource
-
4دورية أكاديمية
المؤلفون: Prenalee Nanaware
المصدر: International Journal of Integrated Science and Technology; Vol. 2 No. 1 (2024): January 2024; 29-36 ; 3026-4685 ; 10.59890/ijist.v2i1
مصطلحات موضوعية: Malicious URL Detection, Web Based Attacks, Feature Extraction, Malicious Web Pages
وصف الملف: application/pdf
العلاقة: https://journal.multitechpublisher.com/index.php/ijist/article/view/1289/1204Test; https://journal.multitechpublisher.com/index.php/ijist/article/view/1289Test
الإتاحة: https://doi.org/10.59890/ijist.v2i1.1289Test
https://doi.org/10.59890/ijist.v2i1Test
https://journal.multitechpublisher.com/index.php/ijist/article/view/1289Test -
5دورية أكاديمية
المؤلفون: Samuel Ndichu, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, Daisuke Inoue
المصدر: Applied Sciences; Volume 12; Issue 1; Pages: 60
مصطلحات موضوعية: web-based attacks, feature selection, Shapley additive explanations, tree ensemble methods, machine learning
جغرافية الموضوع: agris
وصف الملف: application/pdf
العلاقة: Computing and Artificial Intelligence; https://dx.doi.org/10.3390/app12010060Test
-
6
المؤلفون: Samuel Ndichu, Sangwook Kim, Seiichi Ozawa, Tao Ban, Takeshi Takahashi, Daisuke Inoue
المصدر: Applied Sciences; Volume 12; Issue 1; Pages: 60
Applied Sciences, Vol 12, Iss 60, p 60 (2022)مصطلحات موضوعية: Fluid Flow and Transfer Processes, Technology, tree ensemble methods, QH301-705.5, Physics, QC1-999, Process Chemistry and Technology, General Engineering, web-based attacks, Engineering (General). Civil engineering (General), Computer Science Applications, Shapley additive explanations, Chemistry, feature selection, machine learning, General Materials Science, TA1-2040, Biology (General), QD1-999, Instrumentation
وصف الملف: application/pdf
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d88d758e12d13d17963e3821c82d9722Test
http://www.lib.kobe-u.ac.jp/handle_kernel/90009126Test -
7
-
8رسالة جامعية
المؤلفون: Karataş, Mustafa Mer
المساهمون: Acar, Aybar Can, Department of Cyber Security
مصطلحات موضوعية: Computer security, Artificial immunology, negative selection, web based attacks
وصف الملف: xvi, 54 p.; application/pdf
العلاقة: http://etd.lib.metu.edu.tr/upload/12624943/index.pdfTest; https://hdl.handle.net/11511/45344Test
-
9
المؤلفون: Mauro Conti, Manoj Singh Gaur, Anil Kumar Saini, Vijay Laxmi
مصطلحات موضوعية: Risk, Web-based attacks, Computer science, Clickjacking, Computer Networks and Communications, 0211 other engineering and technologies, Scalable Vector Graphics, Browser attacks, Browser security, Cyber attacks, Software, Information Systems, Safety, Risk, Reliability and Quality, Cryptography, 02 engineering and technology, Computer security, computer.software_genre, Set (abstract data type), Web page, False positive paradox, 021110 strategic, defence & security studies, Finite-state machine, business.industry, computer.file_format, Reliability and Quality, The Internet, Safety, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::56f5effa3f7665ab9e34b29d6770f2e8Test
http://hdl.handle.net/11577/3299779Test -
10دورية أكاديمية
المؤلفون: Bauer,Kevin S, Hobson,T, Okhravi,Hamad, Roberts,S C, Streilein,William W
المساهمون: MIT Lincoln Laboratory Lexington United States
مصطلحات موضوعية: Computer Systems Management and Standards, Computer Programming and Software, computer security, web browsers, network protocols, high level languages, operating systems, computer access control, web applications, network architecture, cyberattacks, computer programs, COUNTERMEASURES, VULNERABILITY, WEB SECURITY, WEB-BASED ATTACKS, WEB-BASED DEFENSES, info, scipo