[go: up one dir, main page]

Kumar et al., 2022 - Google Patents

Empirical Methods, Anomaly Detection and Preventive Measures of Web Attacks

Kumar et al., 2022

Document ID
3778208246193741095
Author
Kumar R
Arora N
Gera T
Jain A
Thakur D
Publication year
Publication venue
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)

External Links

Snippet

The digital world has captured great market response in recent years. Users are almost completely dependent on the web for availing of products and various services. Web applications are known to solve one-stop solutions for users. Considering the importance of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
US9942250B2 (en) Network appliance for dynamic protection from risky network activities
US8826400B2 (en) System for automated prevention of fraud
Hyslip Cybercrime-as-a-service operations
Chanti et al. A literature review on classification of phishing attacks
Kumar et al. Network security–an updated perspective
Nagunwa Behind identity theft and fraud in cyberspace: the current landscape of phishing vectors
Alghenaim et al. Phishing attack types and mitigation: A survey
Diwan An investigation and analysis of cyber security information systems: latest trends and future suggestion
Rani et al. Cloud computing security: a taxonomy, threat detection and mitigation techniques
Hossain et al. Classifying cyberattacks on financial organizations based on publicly available deep web dataset
Rahman et al. Botnet threats to e-commerce web applications and their detection
Alnajim et al. An approach to the implementation of the anti-phishing tool for phishing websites detection
Banday et al. Phishing-A growing threat to e-commerce
Singh et al. Present Status of Distributed Denial of service (DDoS) attacks in internet world
Agarwal et al. Examining Newly Registered Phishing Domains at Scale
Teichmann et al. Phishing attacks: risks and challenges for law firms
Hussain et al. A survey on cyber security threats and their solutions
Kumar et al. Empirical Methods, Anomaly Detection and Preventive Measures of Web Attacks
Srivastava An introduction to network security attacks
Sujeetha et al. Cyber-space and its menaces
Ahmed et al. Cyber threats in the healthcare sector and countermeasures
Belghith Investigation on e-commerce platforms for tackling e-business security challenge.
Belghith e-CommerceShield: A framework for enhanced security in e-commerce with awareness, DNS matching, and blockchain integration
Bhardwaj et al. Types of hacking attack and their countermeasure
Terneva et al. Accessing LinkedIn and Google E-mail Databases Using Kali Linux and TheHarvester