咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 2 篇 软件工程

主题

  • 5 篇 web attacks dete...
  • 2 篇 deep learning
  • 2 篇 lstm
  • 2 篇 machine learning
  • 1 篇 web applications...
  • 1 篇 svm
  • 1 篇 systematic liter...
  • 1 篇 http
  • 1 篇 data mining
  • 1 篇 web applications...
  • 1 篇 web applications
  • 1 篇 data mining algo...
  • 1 篇 web security
  • 1 篇 cnn
  • 1 篇 web vulnerabilit...
  • 1 篇 stacked generali...
  • 1 篇 word2vec
  • 1 篇 web applications...

机构

  • 1 篇 sidi mohamed ben...
  • 1 篇 feng chia univ s...
  • 1 篇 gebze tech univ ...
  • 1 篇 itti ltd poznan
  • 1 篇 adam mickiewicz ...
  • 1 篇 ut& ls inst tele...
  • 1 篇 xiamen univ mala...
  • 1 篇 feng chia univ d...
  • 1 篇 phd student lisa...
  • 1 篇 full professor l...

作者

  • 1 篇 nfaoui el habib
  • 1 篇 sogukpinar ibrah...
  • 1 篇 kozik rafal
  • 1 篇 liong sze-teng
  • 1 篇 choras michal
  • 1 篇 gan y. s.
  • 1 篇 yau wei-chuen
  • 1 篇 renk rafal
  • 1 篇 holubowicz witol...
  • 1 篇 alaoui rokia lam...
  • 1 篇 rokia lamrani al...
  • 1 篇 el habib nfaoui
  • 1 篇 zhou luchen
  • 1 篇 sahin metin

语言

  • 5 篇 英文
检索条件"主题词=Web Attacks Detection"
5 条 记 录,以下是1-10 订阅
排序:
web attacks detection using stacked generalization ensemble for LSTMs and word embedding
收藏 引用
Procedia Computer Science 2022年 215卷 687-696页
作者: Rokia Lamrani Alaoui El Habib Nfaoui PhD student LISAC Laboratory Department of Computer Science Faculty of Sciences Dhar El Mahraz Sidi Mohamed Ben Abdellah University Fez Morocco Full Professor LISAC Laboratory Department of Computer Science Faculty of Sciences Dhar El Mahraz Sidi Mohamed Ben Abdellah University Fez Morocco
web-based applications are prone to many web security attacks because they are openly-accessible and convenient. Most techniques used to prevent web attacks have some limitations; they cannot detect zero-day attacks a... 详细信息
来源: 评论
E-webGuard: Enhanced neural architectures for precision web attack detection
收藏 引用
COMPUTERS & SECURITY 2025年 148卷
作者: Zhou, Luchen Yau, Wei-Chuen Gan, Y. S. Liong, Sze-Teng Xiamen Univ Malaysia Sch Comp & Data Sci Sepang 43900 Selangor Malaysia Feng Chia Univ Sch Architecture Taichung 40724 Taiwan Feng Chia Univ Dept Elect Engn Taichung 40724 Taiwan
web applications have become a favored tool for organizations to disseminate vast amounts of information to the public. With the increasing adoption and inherent openness of these applications, there is an observed su... 详细信息
来源: 评论
A Proposal of Algorithm for web Applications Cyber Attack detection  13
A Proposal of Algorithm for Web Applications Cyber Attack De...
收藏 引用
13th IFIP TC8 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)
作者: Kozik, Rafal Choras, Michal Renk, Rafal Holubowicz, Witold ITTI Ltd Poznan Poland UT& LS Inst Telecommunicat Bydgoszcz Poland Adam Mickiewicz Univ UAM Poznan Poland
Injection attacks (e.g. XSS or SQL) are ranked at the first place in world-wide lists (e.g. MITRE and OWASP). These types of attacks can be easily obfuscated. Therefore it is difficult or even impossible to provide a ... 详细信息
来源: 评论
Deep Learning for Vulnerability and Attack detection on web Applications: A Systematic Literature Review
收藏 引用
FUTURE INTERNET 2022年 第4期14卷 118-118页
作者: Alaoui, Rokia Lamrani Nfaoui, El Habib Sidi Mohamed Ben Abdellah Univ Fac Sci Dhar EL Mahraz FSDM Comp Sci Dept LISAC Lab Fes 30000 Morocco
web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount... 详细信息
来源: 评论
An Efficient Firewall For web Applications (EFWA)  2
An Efficient Firewall For Web Applications (<i>EFWA</i>)
收藏 引用
2017 International Conference on Computer Science and Engineering (UBMK)
作者: Sahin, Metin Sogukpinar, Ibrahim Gebze Tech Univ Comp Engn Dept Kocaeli Turkey
Today, with the development of technology, communication tools like computers, phones, tablets and etc. use the http as default protocol. The fact that large data stream transactions are over the http protocol has cau... 详细信息
来源: 评论