Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Hussein Alnabulsi"'
Publikováno v:
IEEE Access, Vol 6, Pp 77829-77840 (2018)
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system
Externí odkaz:
https://doaj.org/article/a67216e2a31545758b4149b8024d8a3d
Autor:
Hussein Alnabulsi, Rafiqul Islam
Publikováno v:
TrustCom/BigDataSE
TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it provides complex services by interacting with other smart devices, objects and infrastructure wirelessly. However, there is growing concern about the threat
Autor:
Hussein Alnabulsi, Rafiqul Islam
Publikováno v:
2018 International Conference on Machine Learning and Data Engineering (iCMLDE).
Cybercriminal activities in the dark web can be considered one of the critical problems for societies around the world. It is possible that cybercriminals are using the Internet for criminal activities such as: trading and buying drugs, pedophilia, h
Autor:
Hussein Alnabulsi, Rafiqul Islam
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319987750
We propose a new methodology to sanitize web pages to prevent code injection attacks. One of a common programming error that usually happens in the web application is using of an improper encoding method to sanitize the source code of the web page. O
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b08003d0abfa96b96f4db8e552f8dbb9
https://doi.org/10.1007/978-3-319-98776-7_27
https://doi.org/10.1007/978-3-319-98776-7_27
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783319670706
The Code Injection Attack (CIA) exploits a security vulnerability or computer bug that is caused by processing invalid data, CIA is a serious attack problem that attackers try to introduce any new methodologies to bypass the defense system. In this p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dad1003f572a2b3e21d4bf1388b32ad9
https://doi.org/10.1007/978-3-319-67071-3_35
https://doi.org/10.1007/978-3-319-67071-3_35
Publikováno v:
International Journal of Computer Network and Information Security. 6:26-33
Abstrac—SQL injection attacks try to use string or text manipulations to access illegally websites and their databases. This is since using some symbols or characters in SQL statements may trick the authentication system to incorrectly allow such S
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319238012
SecureComm (2)
SecureComm (2)
Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b4ceb64b215f1b20a806c9816ca34134
https://doi.org/10.1007/978-3-319-23802-9_19
https://doi.org/10.1007/978-3-319-23802-9_19
Publikováno v:
Asia-Pacific World Congress on Computer Science and Engineering.
SQL injection attack poses a serious security threats among the Internet community nowadays and it's continue to increase exploiting flaws found in the Web applications. In SQL injection attack, the attackers can take advantage of poorly coded web ap