This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Stock, B., Johns, M., Steffens, M., & Backes, M. (2017). How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security}. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 971-987).StockB.JohnsM.SteffensM.BackesM. (2017). How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security}. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 971-987).Search in Google Scholar
Sufardy, D. B., & Widiasari, I. R. (2024). The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers. INOVTEK Polbeng-Seri Informatika, 9(2), 765-777.SufardyD. B.WidiasariI. R. (2024). The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers. INOVTEK Polbeng-Seri Informatika, 9(2), 765-777.Search in Google Scholar
Ali, F. A. B. H., & Jali, M. Z. (2018, May). Human-technology centric in cyber security maintenance for digital transformation era. In Journal of Physics: Conference Series (Vol. 1018, No. 1, p. 012012). IOP Publishing.AliF. A. B. H.JaliM. Z. (2018, May). Human-technology centric in cyber security maintenance for digital transformation era. In Journal of Physics: Conference Series (Vol. 1018, No. 1, p. 012012). IOP Publishing.Search in Google Scholar
Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., & Paxson, V. (2017, February). The Security Impact of HTTPS Interception. In NDSS.DurumericZ.MaZ.SpringallD.BarnesR.SullivanN.BurszteinE.PaxsonV. (2017, February). The Security Impact of HTTPS Interception. In NDSS.Search in Google Scholar
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security system using Arduino and Wi-fi. International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698.ChandramohanJ.NagarajanR.SatheeshkumarK.AjithkumarN.GopinathP. A.RanjithkumarS. (2017). Intelligent smart home automation and security system using Arduino and Wi-fi. International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698.Search in Google Scholar
Zhang, T., & Du, L. (2022, April). Research on it operation and maintenance and management and maintenance methods in cloud computing environment. In 2022 International Conference on Creative Industry and Knowledge Economy (CIKE 2022) (pp. 168-172). Atlantis Press.ZhangT.DuL. (2022, April). Research on it operation and maintenance and management and maintenance methods in cloud computing environment. In 2022 International Conference on Creative Industry and Knowledge Economy (CIKE 2022) (pp. 168-172). Atlantis Press.Search in Google Scholar
Lang, J., Czeskis, A., Balfanz, D., Schilder, M., & Srinivas, S. (2017). Security keys: Practical cryptographic second factors for the modern web. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20 (pp. 422-440). Springer Berlin Heidelberg.LangJ.CzeskisA.BalfanzD.SchilderM.SrinivasS. (2017). Security keys: Practical cryptographic second factors for the modern web. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20 (pp. 422-440). Springer Berlin Heidelberg.Search in Google Scholar
Raina, P., & Shah, H. (2018). Security in Networks. International Journal of Business Management and Visuals, ISSN: 3006-2705, 1(2), 30-48.RainaP.ShahH. (2018). Security in Networks. International Journal of Business Management and Visuals, ISSN: 3006-2705, 1(2), 30-48.Search in Google Scholar
Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385-392.AljawarnehS. A.AlawnehA.JaradatR. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385-392.Search in Google Scholar
Clincy, V., & Shahriar, H. (2018, July). Web application firewall: Network security models and configuration. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1, pp. 835-836). IEEE.ClincyV.ShahriarH. (2018, July). Web application firewall: Network security models and configuration. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1, pp. 835-836). IEEE.Search in Google Scholar
Hoque, M. A., & Davidson, C. (2019). Design and implementation of an IoT-based smart home security system. International Journal of Networked and Distributed Computing, 7(2), 85-92.HoqueM. A.DavidsonC. (2019). Design and implementation of an IoT-based smart home security system. International Journal of Networked and Distributed Computing, 7(2), 85-92.Search in Google Scholar
Malatji, M., Von Solms, S., & Marnewick, A. (2019). Socio-technical systems cybersecurity framework. Information & Computer Security, 27(2), 233-272.MalatjiM.Von SolmsS.MarnewickA. (2019). Socio-technical systems cybersecurity framework. Information & Computer Security, 27(2), 233-272.Search in Google Scholar
Ullah, M. U., Hassan, A., Asif, M., Farooq, M. S., Saleem, M., & Ullah, U. (2022). Intelligent intrusion detection system for Apache web server empowered with machine learning approaches. International Journal of Computational and Innovative Sciences, 1(1), 21-27.UllahM. U.HassanA.AsifM.FarooqM. S.SaleemM.UllahU. (2022). Intelligent intrusion detection system for Apache web server empowered with machine learning approaches. International Journal of Computational and Innovative Sciences, 1(1), 21-27.Search in Google Scholar
Fett, D., Küsters, R., & Schmitz, G. (2017, August). The web sso standard openid connect: In-depth formal security analysis and security guidelines. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (pp. 189-202). IEEE.FettD.KüstersR.SchmitzG. (2017, August). The web sso standard openid connect: In-depth formal security analysis and security guidelines. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (pp. 189-202). IEEE.Search in Google Scholar
Liu, J. (2021, February). Analysis of Computer Network Maintenance Strategy Based on Lan. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032131). IOP Publishing.LiuJ. (2021, February). Analysis of Computer Network Maintenance Strategy Based on Lan. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032131). IOP Publishing.Search in Google Scholar
Kusumarini, A. I., & Seta, H. B. (2021, October). Information System Security Analysis to Determine Server Security Vulnerability with Penetration Testing Execution Standard (PTES) Method at VWX University. In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS (pp. 7-12). IEEE.KusumariniA. I.SetaH. B. (2021, October). Information System Security Analysis to Determine Server Security Vulnerability with Penetration Testing Execution Standard (PTES) Method at VWX University. In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS (pp. 7-12). IEEE.Search in Google Scholar
Nazar, N., Shukla, V. K., Kaur, G., & Pandey, N. (2021, September). Integrating web server log forensics through deep learning. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1-6). IEEE.NazarN.ShuklaV. K.KaurG.PandeyN. (2021, September). Integrating web server log forensics through deep learning. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1-6). IEEE.Search in Google Scholar
Silvestri, L., Forcina, A., Introna, V., Santolamazza, A., & Cesarotti, V. (2020). Maintenance transformation through Industry 4.0 technologies: A systematic literature review. Computers in industry, 123, 103335.SilvestriL.ForcinaA.IntronaV.SantolamazzaA.CesarottiV. (2020). Maintenance transformation through Industry 4.0 technologies: A systematic literature review. Computers in industry, 123, 103335.Search in Google Scholar
Zebari, R. R., Zeebaree, S. R., & Jacksi, K. (2018, October). Impact analysis of HTTP and SYN flood DDoS attacks on apache 2 and IIS 10.0 Web servers. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 156-161). IEEE.ZebariR. R.ZeebareeS. R.JacksiK. (2018, October). Impact analysis of HTTP and SYN flood DDoS attacks on apache 2 and IIS 10.0 Web servers. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 156-161). IEEE.Search in Google Scholar
Calzavara, S., Focardi, R., Squarcina, M., & Tempesta, M. (2017). Surviving the web: A journey into web session security. ACM Computing Surveys (CSUR), 50(1), 1-34.CalzavaraS.FocardiR.SquarcinaM.TempestaM. (2017). Surviving the web: A journey into web session security. ACM Computing Surveys (CSUR), 50(1), 1-34.Search in Google Scholar
Saleem, S., Sheeraz, M., Hanif, M., & Farooq, U. (2020, October). Web server attack detection using machine learning. In 2020 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-7). IEEE.SaleemS.SheerazM.HanifM.FarooqU. (2020, October). Web server attack detection using machine learning. In 2020 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-7). IEEE.Search in Google Scholar
Staicu, C. A., & Pradel, M. (2018). Freezing the Web: a study of {ReDoS} vulnerabilities in {JavaScript-based} web servers. In 27th USENIX security symposium (USENIX Security 18) (pp. 361-376).StaicuC. A.PradelM. (2018). Freezing the Web: a study of {ReDoS} vulnerabilities in {JavaScript-based} web servers. In 27th USENIX security symposium (USENIX Security 18) (pp. 361-376).Search in Google Scholar
Gurunath, R., Agarwal, M., Nandi, A., & Samanta, D. (2018, August). An overview: security issue in IoT network. In 2018 2nd international conference on I-SMAC (IoT in social, Mobile, analytics and cloud)(ISMAC) I-SMAC (IoT in social, Mobile, analytics and cloud)(I-SMAC), 2018 2nd international conference on (pp. 104-107). IEEE.GurunathR.AgarwalM.NandiA.SamantaD. (2018, August). An overview: security issue in IoT network. In 2018 2nd international conference on I-SMAC (IoT in social, Mobile, analytics and cloud)(ISMAC) I-SMAC (IoT in social, Mobile, analytics and cloud)(I-SMAC), 2018 2nd international conference on (pp. 104-107). IEEE.Search in Google Scholar
Aaqib, S. M., & Sharma, L. (2019). Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems. In Software Engineering: Proceedings of CSI 2015 (pp. 441-447). Springer Singapore.AaqibS. M.SharmaL. (2019). Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems. In Software Engineering: Proceedings of CSI 2015 (pp. 441-447). Springer Singapore.Search in Google Scholar
Xing, L. (2021). Computer Network Security Maintenance and Management in the Era of Big Data [J]. International Journal of Frontiers in Sociology, 3(1).XingL. (2021). Computer Network Security Maintenance and Management in the Era of Big Data [J]. International Journal of Frontiers in Sociology, 3(1).Search in Google Scholar
Chen, Y., & Li, B. (2019, July). Computer Network Engineering Security Problems and Countermeasure Analysis based on Network Security Maintenance. In 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019) (pp. 369-373). Atlantis Press.ChenY.LiB. (2019, July). Computer Network Engineering Security Problems and Countermeasure Analysis based on Network Security Maintenance. In 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019) (pp. 369-373). Atlantis Press.Search in Google Scholar
Ali, F. A. H., Sukri, M. K. A. M., Jali, M. Z., Al-Fatih, M., & Yusof, M. A. M. (2023). Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance. Journal of Advanced Research in Applied Sciences and Engineering Technology, 29(3), 198-205.AliF. A. H.SukriM. K. A. M.JaliM. Z.Al-FatihM.YusofM. A. M. (2023). Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance. Journal of Advanced Research in Applied Sciences and Engineering Technology, 29(3), 198-205.Search in Google Scholar
Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., & Rieck, K. (2022). Dos and don’ts of machine learning in computer security. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 3971-3988).ArpD.QuiringE.PendleburyF.WarneckeA.PierazziF.WressneggerC.RieckK. (2022). Dos and don’ts of machine learning in computer security. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 3971-3988).Search in Google Scholar
van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International Publishing.van OorschotP. C. (2020). Computer Security and the Internet. Springer International Publishing.Search in Google Scholar
Beguin, E., Besnard, S., Cros, A., Joannes, B., Leclerc-Istria, O., Noel, A., & Nicomette, V. (2019). Computer-security-oriented escape room. IEEE Security & Privacy, 17(4), 78-83.BeguinE.BesnardS.CrosA.JoannesB.Leclerc-IstriaO.NoelA.NicometteV. (2019). Computer-security-oriented escape room. IEEE Security & Privacy, 17(4), 78-83.Search in Google Scholar
Ney, P., Koscher, K., Organick, L., Ceze, L., & Kohno, T. (2017). Computer security, privacy, and {DNA} sequencing: compromising computers with synthesized {DNA}, privacy leaks, and more. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 765-779).NeyP.KoscherK.OrganickL.CezeL.KohnoT. (2017). Computer security, privacy, and {DNA} sequencing: compromising computers with synthesized {DNA}, privacy leaks, and morey. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 765-779).Search in Google Scholar
Bhandari Hira Lal & Chitrakar Roshan. (2024). Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database. Data Science Journal35-35.Bhandari Hira Lal ChitrakarRoshan (2024). Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database. Data Science Journal35-35.Search in Google Scholar
Vitalii Yesin,Mikolaj Karpinski,Maryna Yesina,Vladyslav Vilihura,Ruslan Kozak & Ruslan Shevchuk. (2023). Technique for Searching Data in a Cryptographically Protected SQL Database. Applied Sciences(20),VitaliiYesinMikolajKarpinskiMarynaYesinaVladyslavVilihuraRuslanKozakRuslanShevchuk (2023). Technique for Searching Data in a Cryptographically Protected SQL Database. Applied Sciences(20),Search in Google Scholar
M. Veni & T. Meyyappan. (2024). Retraction Note: Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm. Multimedia Tools and Applications(34),81901-81901.M.VeniT.Meyyappan (2024). Retraction Note: Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm. Multimedia Tools and Applications(34),81901-81901.Search in Google Scholar
Xiang Yuexin,Li Tiantian,Ren Wei,He Jie,Zhu Tianqing & Choo Kim-Kwang Raymond. (2024). AdvEWM: Generating image adversarial examples by embedding digital watermarks. Journal of Information Security and Applications103662-.XiangYuexinLiTiantianRenWeiHeJieZhuTianqingChoo Kim-KwangRaymond (2024). AdvEWM: Generating image adversarial examples by embedding digital watermarks. Journal of Information Security and Applications103662-.Search in Google Scholar