[1]
|
Web and Server Attacks: Research and Analysis
|
|
Self-Powered AIoT …,
2025 |
|
|
[2]
|
NIF: Reactive Injection Attack via Nmap Piggybacking
|
|
2023 |
|
|
[3]
|
Experimenting Ensemble Machine Learning for DDoS Classification: Timely Detection of DDoS Using Large Scale Dataset
|
|
2023 4th International Conference on …,
2023 |
|
|
[4]
|
Machine Learning Techniques for Detecting DDOS Attacks
|
|
… on Emerging Smart …,
2023 |
|
|
[5]
|
Relevance of the Gaussian classification on the Detection of DDoS Attacks
|
|
… Conference on Cyber …,
2022 |
|
|
[6]
|
Web application firewall based on anomaly detection using deep learning
|
|
Acta Infologica,
2022 |
|
|
[7]
|
Deceptive directories and “vulnerable” logs: a honeypot study of the LDAP and log4j attack landscape
|
|
… EuroS&P Workshop on …,
2022 |
|
|
[8]
|
On prototype pollution and security risks of developing with third-party software components
|
|
2022 |
|
|
[9]
|
Security Implications of Insecure DNS Usage in the Internet
|
|
THESIS,
2022 |
|
|
[10]
|
Derin Öğrenme Tekniği Kullanarak Anomali Tabanlı Web Uygulama Güvenlik Duvarı
|
|
Acta Infologica,
2022 |
|
|
[11]
|
Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic. Electronics 2021, 10, 2919
|
|
2021 |
|
|
[12]
|
Developing a Framework for Automated Penetration Testing with Remediation
|
|
2021 |
|
|
[13]
|
DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
|
|
2021 |
|
|
[14]
|
Injection Attacks Reloaded: Tunnelling Malicious Payloads over {DNS}
|
|
30th USENIX Security Symposium (USENIX …,
2021 |
|
|
[15]
|
Security Analysis of DDoS Attacks Using Machine Learning Algorithms in Networks Traffic
|
|
Electronics,
2021 |
|
|
[16]
|
Comparación de algoritmos de búsqueda binarios y secuenciales para evaluar el riesgo de inyecciones SQL inferenciales en aplicaciones web
|
|
2020 |
|
|
[17]
|
Un système de détection d'intrusion pour la cybersécurité
|
|
2020 |
|
|
[18]
|
Detection of DDoS Attack in TCP protocol using Hybrid Machine Learning Techniques
|
|
2020 |
|
|
[19]
|
Network Intrusion Detection for Distributed Denial-of-Service (DDoS) Attacks using Machine Learning Classification Techniques
|
|
2020 |
|
|
[20]
|
Central autentisering för ett inbyggt system.
|
|
2018 |
|
|
[21]
|
Lecture Notes in Computer Science: JAX-RS security against code injection attacks
|
|
2017 |
|
|
[22]
|
Detection of vulnerabilities and automatic protection for web applications
|
|
2016 |
|
|
[23]
|
Secure Single Sign-On
|
|
2015 |
|
|
[24]
|
Detecting LDAP Misuse in a Distributed Big Data Environment
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[25]
|
METODOLOGIA DE CONFIGURAÇÃO DE VULNERABILIDADES PARA O MODSECURITY
|
|
2013 |
|
|
[26]
|
A taxonomy and survey of attacks on digital signatures
|
|
Computers & Security,
2013 |
|
|
[27]
|
Validation DSL for client-server applications
|
|
2012 |
|
|
[28]
|
Verifying authenticity of an attribute value signature
|
|
2011/10/25/ |
|
|
[29]
|
LDAP grouping for digital signature creation
|
|
2011/02/22/ |
|
|
[30]
|
DATABASE SECURITY FLAWS IN GIANT WEB BASED SYSTEMS AND SYSTEMATIC APPROACH
|
|
2011 |
|
|
[31]
|
Vulnerabilities of LDAP as an Authentication Service
|
|
Journal of Information Security,
2011 |
|
|
[32]
|
Een vergelijkende studie van veiligheidsscanners voor webapplicaties
|
|
|
|
|