Showing 41 - 46 of 46
In this paper, we present comprehensive survey of secured web application by identifying numerous serious threats faced by several-related organizations. Based on this, we have summarized the statistics of all emerging web application vulnerabilities by referring several-linked vulnerabilities...
Persistent link: https://www.econbiz.de/10012043377
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and...
Persistent link: https://www.econbiz.de/10012043386
This article describes how in the summer of 1999, the Computer Incident Advisory Capability first reported about Distributed Denial of Service (DDoS) attack incidents and the nature of Denial of Service (DoS) attacks in a distributed environment that eliminates the availability of resources or...
Persistent link: https://www.econbiz.de/10012044746
This article introduces a distributed intelligence network of Fog computing nodes and Cloud data centres for smart devices against XSS vulnerabilities in Online Social Network (OSN). The cloud data centres compute the features of JavaScript, injects them in the form of comments and saved them in...
Persistent link: https://www.econbiz.de/10012048759
"This book explores the latest advances in network forensics and analysis techniques. It explores topics such as network security: attacks and controls, analysis of attacks, defenses, and countermeasures, anonymity, privacy, id theft and ethics, dependability and security forensics,...
Persistent link: https://www.econbiz.de/10012393400
Persistent link: https://www.econbiz.de/10010078046