Academic literature on the topic 'Server-side detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Server-side detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Server-side detection"

1

Cohen, Yehonatan, and Danny Hendler. "Scalable Detection of Server-Side Polymorphic Malware." Knowledge-Based Systems 156 (September 2018): 113–28. http://dx.doi.org/10.1016/j.knosys.2018.05.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mitterhofer, Stefan, Christopher Kruegel, Engin Kirda, and Christian Platzer. "Server-Side Bot Detection in Massively Multiplayer Online Games." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 29–36. http://dx.doi.org/10.1109/msp.2009.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ntantogian, Christoforos, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, and Christos Xenakis. "NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation." Journal of Information Security and Applications 58 (May 2021): 102752. http://dx.doi.org/10.1016/j.jisa.2021.102752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shahriar, Hossain, Sarah M. North, YoonJi Lee, and Roger Hu. "Server-side code injection attack detection based on Kullback-Leibler distance." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 240. http://dx.doi.org/10.1504/ijitst.2014.065184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Sangdon, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, and Jeong Nyeo Kim. "Server-Side Polymorphic Malicious Apps Detection System on Android Mobile Devices." Advanced Science Letters 21, no. 3 (March 1, 2015): 229–37. http://dx.doi.org/10.1166/asl.2015.5783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kamble, Madhubala. "Calorie Detection of Food Image based on SVM Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1836–40. http://dx.doi.org/10.22214/ijraset.2021.35419.

Full text
Abstract:
Nowadays, standard intake of healthy food is vital for keeping a diet to avoid obesity within the human body . In this paper, we present a totally unique system supported machine learning that automatically performs accurate classification of food images and estimates food attributes. This paper proposes a machine learning model consisting of a support vector machine that classifies food into specific categories within the training a part of the prototype system. The most purpose of the proposed method is to reinforce the accuracy of the pre-training model. The paper designs a prototype system supported the client server network model. The client sends an image detection request and processes it on the server side. The prototype system is meant with three main software components, including a pre-trained support vector machine training module for classification purposes, a text data training module for attribute estimation models, and a server-side module. We experimented with a selection of food categories, each containing thousands of images, and therefore the machine learning training to understand higher classification accuracy.
APA, Harvard, Vancouver, ISO, and other styles
7

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.

Full text
Abstract:
This research creates home security service with social interaction based on a web-based multiple stations supervisory control framework. An Arduino controller is used as a thin-controller to control a home security system. Most control laws are computed in server-side, driving commands are transferred to local controllers for execution. A supervisory control server kept in a company can serve numerous Arduino controllers to provide home security service. The Arduino controller can sense door switch, motion detection, smoke detection, gas detection, CO detection, and an emergency button, and can drive door lock, two relays. Besides, RFID is used to help personnel in/out management and alert enable/disable. The controller reads inputs, uploads input/output data to the supervisory server, executes commands from the server, and drives output continuously. Once a controller is connected to the supervisory server, it can be monitored and controlled remotely. Condition control is proposed for the framework to help program control laws for Arduino controllers. In condition control, conditions are set. When some condition is met, certain actions are taken. There are three types of conditions; time condition, input/output condition, and location condition. And there are three kinds of actions; SMS notification, email notification, and output drive. Conditions, actions and their connections are set by system users in a browser with the help of the supervisory control information management system. The control laws set in the condition control are executed in server-side. User of the home security system can open the read/write rights of his input/output points to other users. With appropriate control law, a motion detection signal of one user can activate the alarm of another user. Therefore, the home security service is not just a security for users home, but a security for a social group.
APA, Harvard, Vancouver, ISO, and other styles
8

Hudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.

Full text
Abstract:
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Khazal, Iman, and Mohammed Hussain. "Server Side Method to Detect and Prevent Stored XSS Attack." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (August 12, 2021): 58–65. http://dx.doi.org/10.37917/ijeee.17.2.8.

Full text
Abstract:
Cross-Site Scripting (XSS) is one of the most common and dangerous attacks. The user is the target of an XSS attack, but the attacker gains access to the user by exploiting an XSS vulnerability in a web application as Bridge. There are three types of XSS attacks: Reflected, Stored, and Dom-based. This paper focuses on the Stored-XSS attack, which is the most dangerous of the three. In Stored-XSS, the attacker injects a malicious script into the web application and saves it in the website repository. The proposed method in this paper has been suggested to detect and prevent the Stored-XSS. The prevent Stored-XSS Server (PSS) was proposed as a server to test and sanitize the input to web applications before saving it in the database. Any user input must be checked to see if it contains a malicious script, and if so, the input must be sanitized and saved in the database instead of the harmful input. The PSS is tested using a vulnerable open-source web application and succeeds in detection by determining the harmful script within the input and prevent the attack by sterilized the input with an average time of 0.3 seconds.
APA, Harvard, Vancouver, ISO, and other styles
10

Dalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.

Full text
Abstract:
Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Server-side detection"

1

Huang, Jin. "Detecting Server-Side Web Applications with Unrestricted File Upload Vulnerabilities." Wright State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=wright163007760528389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Staněk, Martin. "Přístupy pro tvorbu mobilního webu." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114137.

Full text
Abstract:
This work deals with an analysis of ways to create webpages optimized for mobile devices. Issues concerning current state of mobile market along with theoretical foundations of mobile industry are described in the beginning of the thesis. The main part examines methods of creating webpages for mobiles devices. The imlementation part describes a prototype of a webpage, which is based on analyzed methods.
APA, Harvard, Vancouver, ISO, and other styles
3

Jégrová, Eliška. "Detekce útoků cílených na webové aplikace." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376961.

Full text
Abstract:
This thesis is dealing with vulnerabilities of web applications. The aim of the work is to create tools for attack detection of certain attacks, specifically Same Origin Method Execution (SOME), XML Signature Wrapping attack, XPATH Injection, HTTP Response Smuggling and Server-Side Includes (SSI) injection. Another aim is to create logs that display detected attacks. In the first part, the theory is analyzed and vulnerabilities of chosen attacks are described including their misuse. In the next section there are web application implemented which contain vulnerabilities for successful execution of the attacks. Furthermore, in Python language detection methods are designed and developed for these attacks, which are accompanied by a log entry.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Server-side detection"

1

Tengana, Lizzy, Jesus Solano, Alejandra Castelblanco, Esteban Rivera, Christian Lopez, and Martin Ochoa. "Centy: Scalable Server-Side Web Integrity Verification System Based on Fuzzy Hashes." In Detection of Intrusions and Malware, and Vulnerability Assessment, 371–90. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Moniruzzaman, Md, Adil Bagirov, Iqbal Gondal, and Simon Brown. "A Server Side Solution for Detecting WebInject: A Machine Learning Approach." In Lecture Notes in Computer Science, 162–67. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04503-6_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mishra, Shivansh, and Surjit Singh. "Secure Data Deduplication on Cloud Storage." In Advances in Wireless Technologies and Telecommunication, 23–40. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7335-7.ch002.

Full text
Abstract:
Deduplication is the process of removing duplicate data by storing only one copy of the original data and replacing the others simply as a reference to the original. When data is stored on cloud storage, client-side deduplication helps in reducing storage and communications overheads both from the client as well as the server perspective. Secure deduplication is the practice by which the data stored on the cloud is secured from external influences such that the clients maintain the privacy of their data, and the server also gets to take advantage of deduplication. This is done by encrypting the data using different schemes into ciphertext, which makes sense only to the original client. The schemes created for secure deduplication on cloud storage provide a solution to the problem of duplication detection in encrypted ciphertext. This chapter provides a brief overview of secure deduplication used on cloud storage along with the issues encountered during its implementation. The chapter also includes a literature review and comparison of some deduplication techniques.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Server-side detection"

1

Jakobsson, Markus, and Ari Juels. "Server-side detection of malware infection." In the 2009 workshop. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1719030.1719033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barua, Anton, Hossain Shahriar, and Mohammad Zulkernine. "Server Side Detection of Content Sniffing Attacks." In 2011 IEEE 22nd International Symposium on Software Reliability Engineering (ISSRE). IEEE, 2011. http://dx.doi.org/10.1109/issre.2011.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ruei-Min Lin, Yi-Chun Chou, and Kuan-Ta Chen. "Stepping stone detection at the server side." In IEEE INFOCOM 2011 - IEEE Conference on Computer Communications Workshops. IEEE, 2011. http://dx.doi.org/10.1109/infcomw.2011.5928952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shyry, S. Prayla, Venkat Sai Charan K, and V. Sudheer Kumar. "Spam Mail Detection and Prevention at Server Side." In 2019 Innovations in Power and Advanced Computing Technologies (i-PACT). IEEE, 2019. http://dx.doi.org/10.1109/i-pact44901.2019.8959960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Johns, Martin, Björn Engelmann, and Joachim Posegga. "XSSDS: Server-Side Detection of Cross-Site Scripting Attacks." In 2008 Annual Computer Security Applications Conference (ACSAC). IEEE, 2008. http://dx.doi.org/10.1109/acsac.2008.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zheng, Yunhui, and Xiangyu Zhang. "Static detection of resource contention problems in server-side scripts." In 2012 34th International Conference on Software Engineering (ICSE 2012). IEEE, 2012. http://dx.doi.org/10.1109/icse.2012.6227158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tripathi, Nikhil, and Neminath Hubballi. "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack." In 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS). IEEE, 2015. http://dx.doi.org/10.1109/ants.2015.7413661.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mrugalski, Tomasz, Jozef Wozniak, and Krzysztof Nowicki. "Remote stateful autoconfiguration for mobile IPv6 nodes with server side Duplicate Address Detection." In 2010 Australasian Telecommunication Networks and Applications Conference (ATNAC 2010). IEEE, 2010. http://dx.doi.org/10.1109/atnac.2010.5679590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shanmugam, Jayamsakthi, and M. Ponnavaikko. "Behavior-Based Anomaly Detection on the Server Side to Reduce the Effectiveness of Cross Site Scripting Vulnerabilities." In Third International Conference on Semantics, Knowledge and Grid (SKG 2007). IEEE, 2007. http://dx.doi.org/10.1109/skg.2007.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shanmugam, Jayamsakthi, and M. Ponnavaikko. "Behavior-Based Anomaly Detection on the Server Side to Reduce the Effectiveness of Cross Site Scripting Vulnerabilities." In Third International Conference on Semantics, Knowledge and Grid (SKG 2007). IEEE, 2007. http://dx.doi.org/10.1109/skg.2007.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography