Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
With the advancement ment of ICT technology, especially on web technologies, people have changes their way of doing this. Online transactions have become more popular compared to physically going at the specific location to do transactions. However, the advancement of web technology has also...
| मुख्य लेखक: | Mustafa, Mohd Nawawi |
|---|---|
| स्वरूप: | थीसिस |
| भाषा: | अंग्रेज़ी |
| प्रकाशित: |
2015
|
| विषय: | |
| ऑनलाइन पहुंच: | http://psasir.upm.edu.my/id/eprint/50428/1/FSKTM%202015%2039%20IR.pdf |
समान संसाधन
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
द्वारा: Hydara, Isatou
प्रकाशित: (2015)
द्वारा: Hydara, Isatou
प्रकाशित: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
द्वारा: Hydara, Isatou
प्रकाशित: (2024)
द्वारा: Hydara, Isatou
प्रकाशित: (2024)
An improved user authentication model for mobile application systems
द्वारा: Mohamed, Kartini
प्रकाशित: (2017)
द्वारा: Mohamed, Kartini
प्रकाशित: (2017)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
द्वारा: Draib, Najla'a Ateeq Mohammed
प्रकाशित: (2022)
द्वारा: Draib, Najla'a Ateeq Mohammed
प्रकाशित: (2022)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
द्वारा: Javan, Ali
प्रकाशित: (2011)
द्वारा: Javan, Ali
प्रकाशित: (2011)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
द्वारा: Hussein, Noor Sabeeh
प्रकाशित: (2016)
द्वारा: Hussein, Noor Sabeeh
प्रकाशित: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
द्वारा: Mohd Ariffin, Noor Afiza
प्रकाशित: (2017)
द्वारा: Mohd Ariffin, Noor Afiza
प्रकाशित: (2017)
Design of a lightweight virtual honeynet based on linux container virtualization
द्वारा: Memari, Nogol
प्रकाशित: (2014)
द्वारा: Memari, Nogol
प्रकाशित: (2014)
Fake review annotation model and classification through reviewers' writing style
द्वारा: Shojaee, Somayeh
प्रकाशित: (2019)
द्वारा: Shojaee, Somayeh
प्रकाशित: (2019)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
द्वारा: Abdu Muthana, Abdulrahman Ahmad
प्रकाशित: (2008)
द्वारा: Abdu Muthana, Abdulrahman Ahmad
प्रकाशित: (2008)
Adaptive artificial neural network for power system security assessment and control action
द्वारा: Al-Masri, Ahmed Naufal A.
प्रकाशित: (2012)
द्वारा: Al-Masri, Ahmed Naufal A.
प्रकाशित: (2012)
Network security situation awareness based on indicators extracted
द्वारा: Xie, Zeqiang
प्रकाशित: (2016)
द्वारा: Xie, Zeqiang
प्रकाशित: (2016)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
द्वारा: Malekzadeh, Mina
प्रकाशित: (2007)
द्वारा: Malekzadeh, Mina
प्रकाशित: (2007)
Scientific forensic framework for smartphones
द्वारा: Shahpasand, Maryam
प्रकाशित: (2015)
द्वारा: Shahpasand, Maryam
प्रकाशित: (2015)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
द्वारा: Hadi, Ahmed Adnan
प्रकाशित: (2022)
द्वारा: Hadi, Ahmed Adnan
प्रकाशित: (2022)
Steganography in webpages using CSS color attributes enhanced by rule-based system
द्वारा: Nehzati, Seyedeh Sheida
प्रकाशित: (2016)
द्वारा: Nehzati, Seyedeh Sheida
प्रकाशित: (2016)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
द्वारा: Abiodun, Balogun Kamoru
प्रकाशित: (2021)
द्वारा: Abiodun, Balogun Kamoru
प्रकाशित: (2021)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
द्वारा: Ismail, Haqi Khalid
प्रकाशित: (2021)
द्वारा: Ismail, Haqi Khalid
प्रकाशित: (2021)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
द्वारा: Malekzadeh, Mina
प्रकाशित: (2011)
द्वारा: Malekzadeh, Mina
प्रकाशित: (2011)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
द्वारा: H. Belgassem, Seddeq
प्रकाशित: (2004)
द्वारा: H. Belgassem, Seddeq
प्रकाशित: (2004)
Danger theory based node replication attack detection and mitigation in cluster mobile wireless sensor nodes
द्वारा: Shaukat, Haafizah Rameeza
प्रकाशित: (2014)
द्वारा: Shaukat, Haafizah Rameeza
प्रकाशित: (2014)
Smart gate mobile application in residential area Putra Perdana using geofencing / Maisarah Mahazil
द्वारा: Mahazil, Maisarah
प्रकाशित: (2020)
द्वारा: Mahazil, Maisarah
प्रकाशित: (2020)
Performance analysis on detection and prevention of wormhole attack in wireless network
द्वारा: Apandi, Mohamad Aiman Hanif
प्रकाशित: (2019)
द्वारा: Apandi, Mohamad Aiman Hanif
प्रकाशित: (2019)
Information security policy compliance model for government agency
द्वारा: Ramli, Muhamad Amirnazmi
प्रकाशित: (2018)
द्वारा: Ramli, Muhamad Amirnazmi
प्रकाशित: (2018)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
द्वारा: Mohamed, Amir Mohamed Talib
प्रकाशित: (2012)
द्वारा: Mohamed, Amir Mohamed Talib
प्रकाशित: (2012)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
द्वारा: Mohd Nasir, Rinie Narinie
प्रकाशित: (2015)
द्वारा: Mohd Nasir, Rinie Narinie
प्रकाशित: (2015)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
द्वारा: Pitchan, Muhammad Adnan
प्रकाशित: (2017)
द्वारा: Pitchan, Muhammad Adnan
प्रकाशित: (2017)
Predicting online safety behavior based on health belief model with internet literacy and gender as moderators
द्वारा: Abkooh, Elaheh Taheri
प्रकाशित: (2016)
द्वारा: Abkooh, Elaheh Taheri
प्रकाशित: (2016)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
द्वारा: Mohamed Yassin, Warusia
प्रकाशित: (2015)
द्वारा: Mohamed Yassin, Warusia
प्रकाशित: (2015)
Secure lightweight client for cloud-based E-Health Model
द्वारा: Zhang, Xiaowei
प्रकाशित: (2023)
द्वारा: Zhang, Xiaowei
प्रकाशित: (2023)
An efficient crime group of secured data sharing scheme in cloud
द्वारा: Rashid, Mustafa Noori
प्रकाशित: (2018)
द्वारा: Rashid, Mustafa Noori
प्रकाशित: (2018)
A relay attack for host-based card emulation (HCE) using NFC-enabled device for mobile payment
द्वारा: Che Hasan, Hafizah
प्रकाशित: (2018)
द्वारा: Che Hasan, Hafizah
प्रकाशित: (2018)
Enhancing speed performance of the cryptographic algorithm based on the lucas sequence
द्वारा: M. Abulkhirat, Esam
प्रकाशित: (2003)
द्वारा: M. Abulkhirat, Esam
प्रकाशित: (2003)
Zero distortion-based steganography for handwritten signature
द्वारा: Iranmanesh, Vahab
प्रकाशित: (2018)
द्वारा: Iranmanesh, Vahab
प्रकाशित: (2018)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
द्वारा: Hasheminejad, Hamidreza
प्रकाशित: (2015)
द्वारा: Hasheminejad, Hamidreza
प्रकाशित: (2015)
Secure authentication for sensitive digital systems in mobile devices
द्वारा: Hussein, Khalid Waleed
प्रकाशित: (2016)
द्वारा: Hussein, Khalid Waleed
प्रकाशित: (2016)
Features selection for intrusion detection system using hybridize PSO-SVM
द्वारा: Tabaan, Alaa Abdulrahman
प्रकाशित: (2016)
द्वारा: Tabaan, Alaa Abdulrahman
प्रकाशित: (2016)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
द्वारा: Abdulkader, Zaid A.
प्रकाशित: (2018)
द्वारा: Abdulkader, Zaid A.
प्रकाशित: (2018)
Hybrid cryptography algorithm to improve security cloud storage
द्वारा: Abd Almohsen, Inam Razzaq
प्रकाशित: (2017)
द्वारा: Abd Almohsen, Inam Razzaq
प्रकाशित: (2017)
Digital forensics framework for investigating client cloud storage applications on smartphones
द्वारा: Daryabar, Farid
प्रकाशित: (2015)
द्वारा: Daryabar, Farid
प्रकाशित: (2015)
समान संसाधन
-
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
द्वारा: Hydara, Isatou
प्रकाशित: (2015) -
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
द्वारा: Hydara, Isatou
प्रकाशित: (2024) -
An improved user authentication model for mobile application systems
द्वारा: Mohamed, Kartini
प्रकाशित: (2017) -
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
द्वारा: Draib, Najla'a Ateeq Mohammed
प्रकाशित: (2022) -
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
द्वारा: Javan, Ali
प्रकाशित: (2011)