Academic literature on the topic 'Web application firewall policies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Web application firewall policies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Web application firewall policies"

1

Mohammed, Mustafa Khan. "Developing Comprehensive Web Application Firewall (WAF) Policies for Multiple Environments, Enhancing Web Application Security." Journal of Scientific and Engineering Research 11, no. 4 (2024): 358–65. https://doi.org/10.5281/zenodo.13950690.

Full text
Abstract:
Web servers are the engines that drive web applications. Web applications are the critical elements in an organization that need maximum security protection to secure workloads. Therefore, a web application firewall (WAF) is deployed to guard the web server from a plethora of attack vectors, including all the OWASP's top 10 common attacks. WAF focuses on the application layer, which is the seventh layer of the OSI (Open System Interconnection) model, due to the application layer's inherent features, which give the WAF a conducive environment in which to operate. The superiority of WAF in inspe
APA, Harvard, Vancouver, ISO, and other styles
2

Terentyev, Alexander, Yevhenii Gorbatyuk, Tamara Lyashchenko, and Oleh Kuzminskyi. "NEW GENERATION FIREWORKS: A STUDY OF THE HISTORY OF DEVELOPMENT." Management of Development of Complex Systems, no. 45 (March 1, 2021): 102–6. http://dx.doi.org/10.32347/2412-9933.2021.45.102-106.

Full text
Abstract:
Attempts at unauthorized intrusion occur quite often, even after the adoption of the necessary security policies and practices for the information network. These are attacks in which an attacker gains access to the system using various hacking techniques. A firewall is a hardware and software-based network security system that uses certain rules to manage incoming and outgoing network packets. The firewall controls access to network resources through a positive management model. There are various traditional firewalls, such as packet filters, program-level gateways, and chip-level gateways, wh
APA, Harvard, Vancouver, ISO, and other styles
3

Prajapati, Gourishankar, and Nilay Khare. "A Comparative Study of Software Firewall on Windows and Linux Platform." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 8 (2015): 5967–78. http://dx.doi.org/10.24297/ijct.v14i8.1868.

Full text
Abstract:
Nowadays, the communication through World Wide Web (WWW) is growing rapidly. All the gadgets, computer and handheld devices are connected via wire or wireless media and communicated to each others. Thus, network security is the essential requirement of an organization or individuals. Organizations are protecting their communication from unauthorized access by introducing network firewalls. A Firewall is an application program which runs on any platform such as windows, Linux, Solaris, Macintosh etc and protected the networks or systems via implementing policies and rules. In this paper, the pe
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Jae-Kook, Taeyoung Hong, and Gukhua Lee. "AI-Based Approach to Firewall Rule Refinement on High-Performance Computing Service Network." Applied Sciences 14, no. 11 (2024): 4373. http://dx.doi.org/10.3390/app14114373.

Full text
Abstract:
High-performance computing (HPC) relies heavily on network security, particularly when supercomputing services are provided via public networks. As supercomputer operators, we introduced several security devices, such as anti-DDoS, intrusion prevention systems (IPSs), firewalls, and web application firewalls, to ensure the secure use of supercomputing resources. Potential threats are identified based on predefined security policies and added to the firewall rules for access control after detecting abnormal behavior through anti-DDoS, IPS, and system access logs. After analyzing the status chan
APA, Harvard, Vancouver, ISO, and other styles
5

Kalyan Manohar, Immadisetti, Dadisetti Vishnu Datta, and Lekshmi S. Raveendran. "Website Vulnerability Scanning System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43079.

Full text
Abstract:
With the increasing reliance on web applications for business and personal use, ensuring website security has become a critical concern. Cyber threats such as SQL injection, cross-site scripting (XSS), malware infections, and unauthorized access pose significant risks to websites, leading to data breaches and service disruptions. This project aims to develop a comprehensive website security scanner that systematically identifies vulnerabilities and potential security risks.The proposed system integrates automated vulnerability scanning, penetration testing techniques, and real-time monitoring
APA, Harvard, Vancouver, ISO, and other styles
6

A. Karunamurthy, Dr. "SECURE AND SCALABLE WORDPRES DEPLOYMENT ON AWS WITH RDS." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04077.

Full text
Abstract:
Abstract This paper digital landscape, ensuring high availability, scalability, and security for web applications is crucial. This project focuses on deploying a secure and scalable WordPress website on Amazon Web Services (AWS) using industry best practices. By leveraging AWS services such as EC2, Auto Scaling, RDS, S3, VPC, IAM, and Security Groups, this deployment achieves high performance, reliability, and security. The architecture includes Amazon EC2 instances running WordPress in an Auto Scaling Group, ensuring seamless horizontal scalability. Amazon RDS is used for the MySQL database,
APA, Harvard, Vancouver, ISO, and other styles
7

Matheus Da Silva Noronha, Gabriel, Alessandro Andrade Da Silva, and Jaqueline Silva De Souza Pinheiro. "INFORMATION SECURITY POLICIES AND STRATEGIES AND PRACTICES ADOPTED IN IT: THE IMPORTANCE OF CONSULTANCY IN SMALL AND MEDIUM-SIZED COMPANIES." International Journal of Advanced Research 10, no. 11 (2022): 779–86. http://dx.doi.org/10.21474/ijar01/15730.

Full text
Abstract:
Objective: Companies in the cybersecurity consulting market are expanding their services in periodic training to business stakeholders and enforcement of security policies. The objective of this work is to demonstrate the importance of consulting in information security policies aimed at small and medium-sized companies. Methods: It is characterized as a narrative literature review with a qualitative approach, which does not use explicit and systematic criteria for the search and critical analysis of the selected literature. Results: Tools needed for cybersecurity include endpoint detection an
APA, Harvard, Vancouver, ISO, and other styles
8

Rohmat, Aas, Hanuring Ayu Ardhani Putri, Muhammad Muhtarom, Ismiyanto Ismiyanto, and Anies Fortina Febriani. "Potential Cybercrime and Prevention in the Overseas Official Travel Approval Letter." AL-MANHAJ: Jurnal Hukum dan Pranata Sosial Islam 6, no. 1 (2024): 87–98. http://dx.doi.org/10.37680/almanhaj.v6i1.4674.

Full text
Abstract:
The aim of this research is to the potential for cybercrime and its prevention in foreign official travel approval letters. The research method used is normative juridical. The data collection technique is library research. The data analysis technique is descriptive qualitative which is used in the form of an interactive analysis model. The research results show that the potential for cybercrime in foreign official travel approval letters includes hacking, identity theft, data breaches, phishing, spamming, cyber vandalism, virus writers, XML injection, security configuration errors. To prevent
APA, Harvard, Vancouver, ISO, and other styles
9

Riska, Riska, and Hendri Alamsyah. "Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 11, no. 1 (2021): 37–42. http://dx.doi.org/10.33369/jamplifier.v11i1.16683.

Full text
Abstract:
The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in which the purpose of implementing this web security system is to understand the concept of a security system on the web and pay attention to the results before the application of the firewall and after the application of the firewall on the web. This research uses experimental research methods, in this study the implementation of a web application
APA, Harvard, Vancouver, ISO, and other styles
10

Rizal, Randi, and Yusuf Sumaryana. "Peningkatan Keamanan Aplikasi Web Menggunakan Web Application Firewall (WAF) Pada Sistem Informasi Manajemen Kampus Terintegrasi." Jurnal ICT : Information Communication & Technology 20, no. 2 (2021): 323–30. http://dx.doi.org/10.36054/jict-ikmi.v20i2.416.

Full text
Abstract:
Increasing the security of web applications on the integrated campus management information system needs to be done because the application is accessed by public networks so that there are many attacks and attempts to prevent threats from attackers. This study applies a Web Application Firewall (WAF)-based application security using ModeSecurity and Core Rules Set from Owasp which aims to improve the security system of the web application by using a firewall. This study uses an experimental method by implementing a Web Application Firewall (WAF) as a web-based protection system, then the proce
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Web application firewall policies"

1

Thomassen, Pål. "AppSensor : Attack-aware applications compared against a web application firewall and an intrusion detection system." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18576.

Full text
Abstract:
The thesis takes a look at the OWASP AppSensor project. The OWASP AppSensor project is about the idea of detecting attacks inside the applicaiton. The thesis compares OWASP AppSensor against both a web application firewall and an intrusion detection system. The comparison is based both on a short litterature study and an experiment performed. The experiment was a set of attacks based on OWASP top ten list which were executed against a simple bank web application. In the experiment the intrusion detection systems, web application firewall and the AppSensor detection points inside the applicatio
APA, Harvard, Vancouver, ISO, and other styles
2

Ляшенко, Г. Є., та В. В. Шевчук. "Дослідження можливостей міжмережних екранів нового покоління NGFW". Thesis, ФОП Петров В. В, 2021. https://openarchive.nure.ua/handle/document/18677.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
APA, Harvard, Vancouver, ISO, and other styles
4

Anantaprayoon, Amata. "Project X : All-in-one WAF testing tool." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97102.

Full text
Abstract:
Web Application Firewall (WAF) is used to protect the Web application (web app). One of the advantages of having WAF is, it can detect possible attacks even if there is no validation implemented on the web app. But how can WAF protect the web app if WAF itself is vulnerable? In general, four testing methods are used to test WAF such as fuzzing, payload execution, bypassing, and footprinting. There are several open-source WAF testing tools but it appears that it only offers one or two testing methods. That means a tester is required to have multiple tools and learn how each tool works to be abl
APA, Harvard, Vancouver, ISO, and other styles
5

VALENZA, ANDREA. "<script>alert('Expect the Unexpected')</script>: Raising Cybersecurity Awareness by Hook or by Crook." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1041466.

Full text
Abstract:
In the last decades, computer security has been a constantly growing concern. Nowadays it is a common understanding that, although crucial, technology alone is not the ultimate solution. To effectively and promptly face new menaces, well-trained security experts and a properly designed process are necessary. Both of them can only be attained via a proper cybersecurity culture. In this thesis, we address the problems related to the correct cybersecurity mindset. In particular, we focus on two important aspects, i.e., (i) using security testing to show the lack of a correct mindset in the wil
APA, Harvard, Vancouver, ISO, and other styles
6

Medici, Samuele. "Applicazioni client-server sicure per utenti in mobilità." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17993/.

Full text
Abstract:
In questa tesi è stata svolta un'analisi approfondita di una tipica architettura client server, dove il server è situato all'interno di una intranet aziendale e il client può accedere ai suoi servizi tramite dispositivi mobili e non mobili. L'analisi parte da ogni componente, dispositivi per l'accesso, le reti utilizzate e come i server della intranet mettono a disposizione tali servizi. Sono stati presi in considerazione le principali minacce che incombono su tali componenti e da questo punto sono state fatti studi su quali componenti impiegare per contrastare tali minacce. Gli sviluppi s
APA, Harvard, Vancouver, ISO, and other styles
7

Hsueh, Hsiangcheng, and 薛向程. "A Study Of Lightweight Web Application Firewall." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/60589494311676524841.

Full text
Abstract:
碩士<br>靜宜大學<br>資訊傳播工程學系<br>100<br>With the increasing number of Internet users and web sites, and the evolution of web 2.0, more and more personal data and commercial information can be retrieved through the Internet. In order to obtain the business and political benefits, malicious attacks on web sites occur frequently today. Therefore, enabling data protection on web sites and web applications is more and more important. Current network intrusion detection system can be used for comprehensive protection on local area network. However, this system is too heavy. When we need this intrusion dete
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Tsung-Chih, and 劉宗治. "Design and Implement of a Hadoop-based SIEM System-A Case Study of Web Application Firewall." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/teaw8t.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>101<br>With the tremendously improvement of network technologies and the increased popularization of networking, information security has received a significant attention from human beings. Especially, analyzing a huge amount of log data to extract implicit or explicit attacks, so to alert system managers or execute defense procedures has become a major research area. To rapidly and automatically handle the information security issue, many researchers have proposed the Security Informant and Event Management (SIEM) system. Thus, by the SIEM system, we can detect a
APA, Harvard, Vancouver, ISO, and other styles
9

BARLETTA, Michele. "Authorization Policies in Security-Sensitive Web Services and Applications - Formal Modeling and Analysis." Doctoral thesis, 2012. http://hdl.handle.net/11562/398135.

Full text
Abstract:
La sicurezza di applicazioni distribuite orientate ai servizi è cruciale in diversi ambiti quali l'e-commerce e l'e-governance, capaci di supportare transazioni di carattere finanziario ed amministrativo tra diverse parti in rete. Lo sviluppo di tali applicazioni coinvolge problemi di sicurezza che spaziano dall'autenticazione delle parti coinvolte, alla gestione del controllo degli accessi in accordo con normative finanziarie e legali. La specifica delle applicazioni orientate alla sicurezza si concentra su diversi livelli di astrazione, per esempio, protocolli per lo scambio di messaggi
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Web application firewall policies"

1

Cebula, Kerri. Governance in Sport. Edited by Bonnie Tiell. Human Kinetics, 2012. http://dx.doi.org/10.5040/9781718220997.

Full text
Abstract:
Simplify the complexities of sport governance with an engaging and thought-provoking guide to how authority, policies, rules, and regulations can influence decision making in sport organizations. Governance in Sport: Analysis and Application With Web Resource examines the structure of governance within sport organizations across a breadth of levels and a variety of industry sectors to prepare students to practice principles of good governance and ethical decision making. The content is presented from three broad perspectives: (1) Students will first learn the foundation of legal and managerial
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Web application firewall policies"

1

Pałka, Dariusz, and Marek Zachara. "Learning Web Application Firewall - Benefits and Caveats." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23300-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Prandl, Stefan, Mihai Lazarescu, and Duc-Son Pham. "A Study of Web Application Firewall Solutions." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Torrano-Gimenez, Carmen, Alejandro Perez-Villegas, and Gonzalo Alvarez. "A Self-learning Anomaly-Based Web Application Firewall." In Advances in Intelligent and Soft Computing. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04091-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raju, S. Lokesh, Santosh Sheshware, and Ruchit R. Patel. "Use ModSecurity Web Application Firewall to Mitigate OWASP's Top 10 Web Application Vulnerabilities." In Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture. River Publishers, 2022. https://doi.org/10.1201/9781003338512-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Román-Gallego, Jesús-Ángel, María-Luisa Pérez-Delgado, and Marcos Luengo Viñuela. "Development of Web Application Firewall Based on Artificial Intelligence." In Advances in Intelligent Systems and Computing. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-38344-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yuan, Hui, Lei Zheng, Liang Dong, Xiangli Peng, Yan Zhuang, and Guoru Deng. "Research and Implementation of WEB Application Firewall Based on Feature Matching." In Application of Intelligent Systems in Multi-modal Information Analytics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15740-1_154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mounika, Gollapudi, N. Sunanda, G. Sathar, V. Raghavendra Sai, and K. Chandra Shekar. "Enhancing web application security: A machine learning approach to firewall implementation." In Intelligent Computing Techniques and Applications. CRC Press, 2025. https://doi.org/10.1201/9781003658221-33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Trinh, Cong-Vu, Thien-Thanh Le, Minh-Khoi Le-Nguyen, Dinh-Thuan Le, Van-Hoa Nguyen, and Khuong Nguyen-An. "An Efficient Machine Learning-Based Web Application Firewall with Deep Automated Pattern Categorization." In Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-8296-7_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Clemente, Félix J. García, Gregorio Martínez Pérez, Juan A. Botía Blaya, and Antonio F. Gómez Skarmeta. "On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management." In On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11575863_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rungta, Neha. "A Billion SMT Queries a Day (Invited Paper)." In Computer Aided Verification. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_1.

Full text
Abstract:
AbstractAmazon Web Services (AWS) is a cloud computing services provider that has made significant investments in applying formal methods to proving correctness of its internal systems and providing assurance of correctness to their end-users. In this paper, we focus on how we built abstractions and eliminated specifications to scale a verification engine for AWS access policies, Zelkova, to be usable by all AWS users. We present milestones from our journey from a thousand SMT invocations daily to an unprecedented billion SMT calls in a span of five years. In this paper, we talk about how the cloud is enabling application of formal methods, key insights into what made this scale of a billion SMT queries daily possible, and present some open scientific challenges for the formal methods community.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Web application firewall policies"

1

Nikam, Yuvraj, Sachin Ware, Tarun Patil, Harshavardhan Waghmare, Suruchi Dedgaonkar, and Pravin Futane. "Ai-Based Web Application Firewall." In 2025 International Conference on Computational, Communication and Information Technology (ICCCIT). IEEE, 2025. https://doi.org/10.1109/icccit62592.2025.10928035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maheshwari, Muskan, Aniket Nayak, Asmit Sethy, and Sujatha G. "Adaptive Web Application Firewall for Multi-Threat Detection." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Kanan, Dhanashree P. Kesarkar, Manasi M. Jadhav, Sampada S. Lagad, Nilesh B. Korade, and Vinodkumar Bhutnal. "Smart Defense: Machine Learning-Based Web Application Firewall." In 2024 IEEE Pune Section International Conference (PuneCon). IEEE, 2024. https://doi.org/10.1109/punecon63413.2024.10895868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, Anil, J. B. Simha, and Rashmi Agarwal. "Machine Learning-Based Web Application Firewall for Real-Time Threat Detection." In 2024 IEEE Conference on Engineering Informatics (ICEI). IEEE, 2024. https://doi.org/10.1109/icei64305.2024.10912239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Darmawan, Irfan, Afan Nuridwan, Alam Rahmatulloh, Rohmat Gunawan, and Randi Rizal. "Real-time Web Application Firewall Monitoring uses the OWASP CRS Framework." In 2024 Ninth International Conference on Informatics and Computing (ICIC). IEEE, 2024. https://doi.org/10.1109/icic64337.2024.10956835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Jiale, and Wen Cheng. "Design and Implementation of a Web Application Firewall System based on OpenResty." In 2024 9th International Symposium on Computer and Information Processing Technology (ISCIPT). IEEE, 2024. http://dx.doi.org/10.1109/iscipt61983.2024.10673202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhote, Sanjana, Aditya Magdum, Siddharth Singh, and Dipika Raigar. "ML based Web Application Firewall for Signature and Anomaly Detection Using Feature Extraction." In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2024. http://dx.doi.org/10.1109/icccnt61001.2024.10725511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sa'adah, Khoerina, Rayhan Ramdhany Hanaputra, Girinoto, and Setiyo Cahyono. "A Deep Learning Approach to Detect Cross-Site Scripting Attack as a Web Application Firewall." In 2024 International Conference on Information Technology and Computing (ICITCOM). IEEE, 2024. https://doi.org/10.1109/icitcom62788.2024.10762471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wiradyaksa, IGNB Dimas, Dwi Haura Putri, Roihan Muhammad Iqbal, Novia Helni Astari, Nyoman Karna, and Favian Dewanta. "Design and Implementation of Automated Web Application Firewall, Rate Limiting, and Intrusion Detection System for Cyber Defense." In 2024 8th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE). IEEE, 2024. http://dx.doi.org/10.1109/icitisee63424.2024.10730693.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Welekar, Rashmi, Firdous Sadaf M. Ismail, Ayush Bhojwani, Shrenik Mehar, Prathamesh Tidke, and Priyanshi Bopche. "Web application firewall." In 2ND INTERNATIONAL CONFERENCE ON TRENDS IN MATERIAL SCIENCE AND MANUFACTURING ENGINEERING (ICTMSME2024). AIP Publishing, 2024. http://dx.doi.org/10.1063/5.0239088.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Web application firewall policies"

1

O'Connor, Kellen, and Brad Nance. Protecting Websites from Cross-Site Scripting (XSS) Attacks: A Novel Configuration usingPulse Secure© Pulse Connect Secure© and Virtual Web Application Firewall (vWAF). Office of Scientific and Technical Information (OSTI), 2021. http://dx.doi.org/10.2172/1820799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!