D-Crush: A stronger approach towards web security
Abstract
Full Text:
PDFReferences
Waxman, Matthew C., Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4) (March 16, 2011). Yale Journal of International Law, Vol. 36, 2011.
Ianelli, Nicholas, and Aaron Hackworth. "Botnets as a vehicle for online crime." FORENSIC COMPUTER SCIENCE IJoFCS (2005): 19
Cooke, Evan, Farnam Jahanian, and Danny McPherson. "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets." SRUTI 5 (2005): 6-6.
Vogt, Ryan, John Aycock, and Michael J. Jacobson Jr. "Army of Botnets." NDSS. 2007.
Sagiroglu, Seref, and Gurol Canbek. "Keyloggers." IEEE technology and society magazine 28.3 (2009): 10 -17.
Subramanyam, Kishore, Charles E. Frank, and Donald H. Galli. "Keyloggers: The overlooked threat to computer security." 1st Midstates Conference for Undergraduate Research in Computer Science and Mathematics. 2003.
Halfond, William G., Jeremy Viegas, and Alessandro Orso. "A classification of SQL-injection attacks and countermeasures." Proceedings of the IEEE International Symposium on Secure Software Engineering. Vol. 1. IEEE, 2006.
Anley, Chris. "Advanced SQL injection in SQL server applications." (2002).
Spett, Kevin. "Cross-site scripting." SPI Labs 1 (2005): 1-20.
Bodmer, Fabrice. "Cross-Site Scripting."
Desmedt, Yvo. "Man-in-the-middle attack." Encyclopedia of Cryptography and Security. Springer US, 2011. 759-759.
Joshi, Yogesh, Debabrata Das, and Subir Saha. "Mitigating man in the middle attack over secure sockets layer." Internet Multimedia Services Architecture and Applications (IMSAA), 2009 IEEE International Conference on. IEEE, 2009.
Obaida Mohammad Awad Al-Hazaimeh. “A new approach for complex encrypting and decrypting data.”International Journal of computer networks & communication (IJCNC) Vol.5, No. 2, March 2013.
Dr. Devendra Kumar, Analytical Study of Structure of Models and Techniques of Privacy Preserving Data Mining, International Journal of ICT and Management, June, 2013,Vol-I,Issue-2
Devendra Kumar, Study of Privacy Preserving Data Mining Techniques for Securing Web Services” 27-April, 2013, Proceeding of National Conference on “Role of ICT in Inclusive Sustainable National Development”
Yatin Agarwal, Devendra Kumar, Komal Sharma, Challenges of Artificial Intelligence (past, present and future)” 13-March, 2013, Proceeding of National Conference on “Cloud Computing Technologies and Services”.
Important aspects for securing web serving using privacy data mining Techniques” 24-Nov, 2012, proceeding of National Conference on “Strategies for sustainable growth in the era of Information Technology”
DOI: https://doi.org/10.37628/ijosct.v3i2.302
Refbacks
- There are currently no refbacks.