Academic literature on the topic 'Server-side detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Server-side detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Server-side detection"
Cohen, Yehonatan, and Danny Hendler. "Scalable Detection of Server-Side Polymorphic Malware." Knowledge-Based Systems 156 (September 2018): 113–28. http://dx.doi.org/10.1016/j.knosys.2018.05.024.
Full textMitterhofer, Stefan, Christopher Kruegel, Engin Kirda, and Christian Platzer. "Server-Side Bot Detection in Massively Multiplayer Online Games." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 29–36. http://dx.doi.org/10.1109/msp.2009.78.
Full textNtantogian, Christoforos, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, and Christos Xenakis. "NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation." Journal of Information Security and Applications 58 (May 2021): 102752. http://dx.doi.org/10.1016/j.jisa.2021.102752.
Full textShahriar, Hossain, Sarah M. North, YoonJi Lee, and Roger Hu. "Server-side code injection attack detection based on Kullback-Leibler distance." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 240. http://dx.doi.org/10.1504/ijitst.2014.065184.
Full textKim, Sangdon, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, and Jeong Nyeo Kim. "Server-Side Polymorphic Malicious Apps Detection System on Android Mobile Devices." Advanced Science Letters 21, no. 3 (March 1, 2015): 229–37. http://dx.doi.org/10.1166/asl.2015.5783.
Full textKamble, Madhubala. "Calorie Detection of Food Image based on SVM Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1836–40. http://dx.doi.org/10.22214/ijraset.2021.35419.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textKhazal, Iman, and Mohammed Hussain. "Server Side Method to Detect and Prevent Stored XSS Attack." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (August 12, 2021): 58–65. http://dx.doi.org/10.37917/ijeee.17.2.8.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textDissertations / Theses on the topic "Server-side detection"
Huang, Jin. "Detecting Server-Side Web Applications with Unrestricted File Upload Vulnerabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright163007760528389.
Full textStaněk, Martin. "Přístupy pro tvorbu mobilního webu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114137.
Full textJégrová, Eliška. "Detekce útoků cílených na webové aplikace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376961.
Full textBook chapters on the topic "Server-side detection"
Tengana, Lizzy, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, and Martin Ochoa. "Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes." In Detection of Intrusions and Malware, and Vulnerability Assessment, 371–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_19.
Full textMoniruzzaman, Md, Adil Bagirov, Iqbal Gondal, and Simon Brown. "A Server Side Solution for Detecting WebInject: A Machine Learning Approach." In Lecture Notes in Computer Science, 162–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04503-6_16.
Full textMishra, Shivansh, and Surjit Singh. "Secure Data Deduplication on Cloud Storage." In Advances in Wireless Technologies and Telecommunication, 23–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch002.
Full textConference papers on the topic "Server-side detection"
Jakobsson, Markus, and Ari Juels. "Server-side detection of malware infection." In the 2009 workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1719030.1719033.
Full textBarua, Anton, Hossain Shahriar, and Mohammad Zulkernine. "Server Side Detection of Content Sniffing Attacks." In 2011 IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2011. http://dx.doi.org/10.1109/issre.2011.27.
Full textRuei-Min Lin, Yi-Chun Chou, and Kuan-Ta Chen. "Stepping stone detection at the server side." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications Workshops. IEEE, 2011. http://dx.doi.org/10.1109/infcomw.2011.5928952.
Full textShyry, S. Prayla, Venkat Sai Charan K, and V. Sudheer Kumar. "Spam Mail Detection and Prevention at Server Side." In 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019. http://dx.doi.org/10.1109/i-pact44901.2019.8959960.
Full textJohns, Martin, Björn Engelmann, and Joachim Posegga. "XSSDS: Server-Side Detection of Cross-Site Scripting Attacks." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.36.
Full textZheng, Yunhui, and Xiangyu Zhang. "Static detection of resource contention problems in server-side scripts." In 2012 34th International Conference on Software Engineering (ICSE 2012). IEEE, 2012. http://dx.doi.org/10.1109/icse.2012.6227158.
Full textTripathi, Nikhil, and Neminath Hubballi. "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack." In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). IEEE, 2015. http://dx.doi.org/10.1109/ants.2015.7413661.
Full textMrugalski, Tomasz, Jozef Wozniak, and Krzysztof Nowicki. "Remote stateful autoconfiguration for mobile IPv6 nodes with server side Duplicate Address Detection." In 2010 Australasian Telecommunication Networks and Applications Conference (ATNAC 2010). IEEE, 2010. http://dx.doi.org/10.1109/atnac.2010.5679590.
Full textShanmugam, Jayamsakthi, and M. Ponnavaikko. "Behavior-Based Anomaly Detection on the Server Side to Reduce the Effectiveness of Cross Site Scripting Vulnerabilities." In Third International Conference on Semantics, Knowledge and Grid (SKG 2007). IEEE, 2007. http://dx.doi.org/10.1109/skg.2007.63.
Full textShanmugam, Jayamsakthi, and M. Ponnavaikko. "Behavior-Based Anomaly Detection on the Server Side to Reduce the Effectiveness of Cross Site Scripting Vulnerabilities." In Third International Conference on Semantics, Knowledge and Grid (SKG 2007). IEEE, 2007. http://dx.doi.org/10.1109/skg.2007.202.
Full text