Journal articles on the topic 'Server-side detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Server-side detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Cohen, Yehonatan, and Danny Hendler. "Scalable Detection of Server-Side Polymorphic Malware." Knowledge-Based Systems 156 (September 2018): 113–28. http://dx.doi.org/10.1016/j.knosys.2018.05.024.
Full textMitterhofer, Stefan, Christopher Kruegel, Engin Kirda, and Christian Platzer. "Server-Side Bot Detection in Massively Multiplayer Online Games." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 29–36. http://dx.doi.org/10.1109/msp.2009.78.
Full textNtantogian, Christoforos, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, and Christos Xenakis. "NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation." Journal of Information Security and Applications 58 (May 2021): 102752. http://dx.doi.org/10.1016/j.jisa.2021.102752.
Full textShahriar, Hossain, Sarah M. North, YoonJi Lee, and Roger Hu. "Server-side code injection attack detection based on Kullback-Leibler distance." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 240. http://dx.doi.org/10.1504/ijitst.2014.065184.
Full textKim, Sangdon, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, and Jeong Nyeo Kim. "Server-Side Polymorphic Malicious Apps Detection System on Android Mobile Devices." Advanced Science Letters 21, no. 3 (March 1, 2015): 229–37. http://dx.doi.org/10.1166/asl.2015.5783.
Full textKamble, Madhubala. "Calorie Detection of Food Image based on SVM Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1836–40. http://dx.doi.org/10.22214/ijraset.2021.35419.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.
Full textHudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.
Full textKhazal, Iman, and Mohammed Hussain. "Server Side Method to Detect and Prevent Stored XSS Attack." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (August 12, 2021): 58–65. http://dx.doi.org/10.37917/ijeee.17.2.8.
Full textDalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.
Full textEstrada-Solano, Felipe, Oscar M. Caicedo, and Nelson L. S. Da Fonseca. "NELLY: Flow Detection Using Incremental Learning at the Server Side of SDN-Based Data Centers." IEEE Transactions on Industrial Informatics 16, no. 2 (February 2020): 1362–72. http://dx.doi.org/10.1109/tii.2019.2947291.
Full textWidagdo, Gede Barkah. "Real-Time Early Detection NTP Amplification Attack." ACMIT Proceedings 3, no. 1 (March 18, 2019): 76–84. http://dx.doi.org/10.33555/acmit.v3i1.29.
Full textSteinhauser, Antonín, and Petr Tůma. "DjangoChecker: Applying extended taint tracking and server side parsing for detection of context-sensitive XSS flaws." Software: Practice and Experience 49, no. 1 (October 23, 2018): 130–48. http://dx.doi.org/10.1002/spe.2649.
Full textShachi, Mehjabeen, Nurnaby Siddiqui Shourav, Abu Syeed Sajid Ahmed, Afsana Afrin Brishty, and Nazmus Sakib. "A Survey on Detection and Prevention of SQL and NoSQL Injection Attack on Server-side Applications." International Journal of Computer Applications 183, no. 10 (June 21, 2021): 1–7. http://dx.doi.org/10.5120/ijca2021921396.
Full textAlmutairi, Suzan, Saoucene Mahfoudh, Sultan Almutairi, and Jalal S. Alowibdi. "Hybrid Botnet Detection Based on Host and Network Analysis." Journal of Computer Networks and Communications 2020 (January 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/9024726.
Full textSheng, Shi Yue, Jian Yi, and Qing Yuan Zhu. "Data Transmission System Design for Environmental Monitoring System Based on 3G Network." Advanced Materials Research 846-847 (November 2013): 831–35. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.831.
Full textHe, Yukun, Qiang Li, Jian Cao, Yuede Ji, and Dong Guo. "Understanding socialbot behavior on end hosts." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694170.
Full textJ. Santhosh Kumar, B., and Kankanala Pujitha. "Web Application Vulnerability Detection Using Hybrid String Matching Algorithm." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 106. http://dx.doi.org/10.14419/ijet.v7i3.6.14950.
Full textPeriasamy, J. K., and B. Latha. "Secure and duplication detection in cloud using cryptographic hashing method." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 105. http://dx.doi.org/10.14419/ijet.v7i1.7.9585.
Full textXiang, Zuo, Patrick Seeling, and Frank H. P. Fitzek. "You Only Look Once, But Compute Twice: Service Function Chaining for Low-Latency Object Detection in Softwarized Networks." Applied Sciences 11, no. 5 (March 2, 2021): 2177. http://dx.doi.org/10.3390/app11052177.
Full textLesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.
Full textGatuha, George, and Tao Jiang. "Android Based Naive Bayes Probabilistic Detection Model for Breast Cancer and Mobile Cloud Computing: Design and Implementation." International Journal of Engineering Research in Africa 21 (December 2015): 197–208. http://dx.doi.org/10.4028/www.scientific.net/jera.21.197.
Full textAmir, Mochammad Taufiq Ardiansyah, and Yusrila Yeka Kerlooza. "Sistem Pendeteksi Kecelakaan Kendaraan Bermotor Menggunakan Arduino Dan Smartphone Android." Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan 8, no. 2 (April 10, 2021): 105–12. http://dx.doi.org/10.34010/telekontran.v8i2.4570.
Full textIrazoqui, Gorka, Mehmet Sinan IncI, Thomas Eisenbarth, and Berk Sunar. "Know Thy Neighbor: Crypto Library Detection in Cloud." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 25–40. http://dx.doi.org/10.1515/popets-2015-0003.
Full textAli, Qutaiba. "Security Issues of Solar Energy Harvesting Road Side Unit (RSU)." Iraqi Journal for Electrical and Electronic Engineering 11, no. 1 (June 1, 2015): 18–31. http://dx.doi.org/10.37917/ijeee.11.1.3.
Full textChen, Yen-Hung, Yuan-Cheng Lai, and Kai-Zhong Zhou. "Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis." Micromachines 12, no. 9 (August 26, 2021): 1019. http://dx.doi.org/10.3390/mi12091019.
Full textHasan, Mehdi, Fumihiko Yokota, Rafiqul Islam, Kenji Hisazumi, Akira Fukuda, and Ashir Ahmed. "A Predictive Model for Height Tracking in an Adult Male Population in Bangladesh to Reduce Input Errors." International Journal of Environmental Research and Public Health 17, no. 5 (March 10, 2020): 1806. http://dx.doi.org/10.3390/ijerph17051806.
Full textUllah, Asad, Jing Wang, M. Shahid Anwar, Arshad Ahmad, Shah Nazir, Habib Ullah Khan, and Zesong Fei. "Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition." Security and Communication Networks 2021 (January 30, 2021): 1–12. http://dx.doi.org/10.1155/2021/6673992.
Full textTang, Kai, and Lian-Juan Huo. "Optimizing Synchronization of Tennis Professional League Live Broadcast Based on Wireless Network Planning." Mobile Information Systems 2021 (June 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/8732115.
Full textAlawi, Malik, Stefan Kurtz, and Michael Beckstette. "CASSys: an integrated software-system for the interactive analysis of ChIP-seq data." Journal of Integrative Bioinformatics 8, no. 2 (June 1, 2011): 1–13. http://dx.doi.org/10.1515/jib-2011-155.
Full textElsagheer Mohamed, Samir A., Mohammad T. Parvez, Khaled A. AlShalfan, Mahmoud Y. Alaidy, Mohammed A. Al-Hagery, and Mohamed T. Ben Othman. "Autonomous Real-Time Speed-Limit Violation Detection and Reporting Systems Based on the Internet of Vehicles (IoV)." Journal of Advanced Transportation 2021 (September 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/9888789.
Full textGao, Jinxia, Longjun Liu, Peng Gao, Yihuan Zheng, Wenxuan Hou, and Junhui Wang. "Intelligent Occlusion Stabilization Splint with Stress-Sensor System for Bruxism Diagnosis and Treatment." Sensors 20, no. 1 (December 22, 2019): 89. http://dx.doi.org/10.3390/s20010089.
Full textWu, Ya-Ping, Yu-Song Lin, Wei-Guo Wu, Cong Yang, Jian-Qin Gu, Yan Bai, and Mei-Yun Wang. "Semiautomatic Segmentation of Glioma on Mobile Devices." Journal of Healthcare Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/8054939.
Full textMortazavi, Mojtaba, Abdolrazagh Barzegar, Abdorrasoul Malekpour, Mohammad Ghorbani, Saeid Gholamzadeh, and Younes Ghasemi. "In Silico Evaluation of the ATP7B Protein: Insights from the Role of Rare Codon Clusters and Mutations that Affect Protein Structure and Function." Current Proteomics 17, no. 3 (March 24, 2020): 213–26. http://dx.doi.org/10.2174/1570164617666190919114545.
Full textSzankasi, Philippe, Jonathan Schumacher, and Todd W. Kelley. "An Inexpensive Ion Torrent-Based Deep Sequencing Assay Demonstrates Marked Superiority Over Sanger Sequencing For Routine Detection Of BCR-ABL1 Kinase Domain Mutations." Blood 122, no. 21 (November 15, 2013): 2722. http://dx.doi.org/10.1182/blood.v122.21.2722.2722.
Full textHansen, J. E., O. Lund, J. Engelbrecht, H. Bohr, J. O. Nielsen, J. E. S. Hansen, and S. Brunak. "Prediction of O-glycosylation of mammalian proteins: specificity patterns of UDP-GalNAc:polypeptide N-acetylgalactosaminyltransferase." Biochemical Journal 308, no. 3 (June 15, 1995): 801–13. http://dx.doi.org/10.1042/bj3080801.
Full textOláh, László, Hiroyuki K. M. Tanaka, Gergő Hamar, and Dezső Varga. "Muographic Observation of Density Variations in the Vicinity of Minami-Dake Crater of Sakurajima Volcano." Journal of Disaster Research 14, no. 5 (August 1, 2019): 701–12. http://dx.doi.org/10.20965/jdr.2019.p0701.
Full textLee, Han Seong, and Hyung-Woo Lee. "Dynamic Analysis System for Detecting Remote Server-Side Polymorphic Malicious Mobile Apps on Android based Smartphone." International Journal of u- and e-Service, Science and Technology 8, no. 11 (November 30, 2015): 295–302. http://dx.doi.org/10.14257/ijunesst.2015.8.11.29.
Full textHao, Na, Fan Bai, and Tian Qing Chang. "Design and Implementation of Network Reliability for Intelligent Fire Control Training System." Advanced Materials Research 479-481 (February 2012): 1974–77. http://dx.doi.org/10.4028/www.scientific.net/amr.479-481.1974.
Full textHudec, Robert, Slavomír Matúška, Patrik Kamencay, and Miroslav Benco. "A Smart IoT System for Detecting the Position of a Lying Person Using a Novel Textile Pressure Sensor." Sensors 21, no. 1 (December 31, 2020): 206. http://dx.doi.org/10.3390/s21010206.
Full textAlexander, Geoffrey, Antonio M. Espinoza, and Jedidiah R. Crandall. "Detecting TCP/IP Connections via IPID Hash Collisions." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 311–28. http://dx.doi.org/10.2478/popets-2019-0071.
Full textKhudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Developed security and privacy algorithms for cyber physical system." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5379. http://dx.doi.org/10.11591/ijece.v11i6.pp5379-5389.
Full textO., Sarjiyus, and El-Yakub M. B. "Neutralizing SQL Injection Attack on Web Application Using Server Side Code Modification." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, May 1, 2019, 158–73. http://dx.doi.org/10.32628/cseit1952339.
Full text"A Framework for Web Application Vulnerability Detection." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 543–49. http://dx.doi.org/10.35940/ijeat.c4778.029320.
Full text"Detecting Cache-Based Side Channel Attacks in IaaS using Enhanced Algorithm." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S4 (October 1, 2019): 227–35. http://dx.doi.org/10.35940/ijitee.i1136.0789s419.
Full textJia, Jiyou, and Yunfan He. "The design, implementation and pilot application of an intelligent online proctoring system for online exams." Interactive Technology and Smart Education ahead-of-print, ahead-of-print (May 12, 2021). http://dx.doi.org/10.1108/itse-12-2020-0246.
Full text"Shield Advanced Mitigation System of Distributed Denial of Service Attack in Integration of Internet of Things and Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 9, no. 2 (December 10, 2019): 1300–1306. http://dx.doi.org/10.35940/ijitee.a4841.129219.
Full textParvathi, A., S. Imran Basha, M. Jayanth Kumar, B. Chandra Sekhara Bhagavan, and P. Dinesh Reddy. "Industrial Protection System using Arduino and IoT." Journal of Communication Engineering and its Innovations 7, no. 2 (July 8, 2021). http://dx.doi.org/10.46610/jocei.2021.v07i02.004.
Full textPuspitorini, Okkie, Nuradi Siswandari, Haniah Mahmudah, and Ari Wijayanti. "Measurement of Interconnecting Network for Roadside Unit Placement on Cellular Network to Support Intelligent Transportation System." Asian Journal of Applied Sciences 5, no. 2 (April 22, 2017). http://dx.doi.org/10.24203/ajas.v5i2.3243.
Full textWhittemore, Katherine, Rachel Corrado, Marc Paladini, Alexander Davidson, Chaorui C. Huang, Demetre Daskalakis, Sally Slavinski, and David E. Lucero. "Data capture and visualization for a canine influenza outbreak — New York City, 2018." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9670.
Full text