Uneingeschränkter Zugang

Research on computer security maintenance based on web server

  
19. März 2025

Zitieren
COVER HERUNTERLADEN

Stock, B., Johns, M., Steffens, M., & Backes, M. (2017). How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security}. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 971-987). Stock B. Johns M. Steffens M. Backes M. ( 2017 ). How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security} . In 26th USENIX Security Symposium (USENIX Security 17) (pp. 971 - 987 ). Search in Google Scholar

Sufardy, D. B., & Widiasari, I. R. (2024). The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers. INOVTEK Polbeng-Seri Informatika, 9(2), 765-777. Sufardy D. B. Widiasari I. R. ( 2024 ). The Use of PFSense and Suricata as a Network Security Attack Detection and Prevention Tool on Web servers . INOVTEK Polbeng-Seri Informatika , 9 ( 2 ), 765 - 777 . Search in Google Scholar

Ali, F. A. B. H., & Jali, M. Z. (2018, May). Human-technology centric in cyber security maintenance for digital transformation era. In Journal of Physics: Conference Series (Vol. 1018, No. 1, p. 012012). IOP Publishing. Ali F. A. B. H. Jali M. Z. ( 2018 , May ). Human-technology centric in cyber security maintenance for digital transformation era . In Journal of Physics: Conference Series (Vol. 1018 , No. 1 , p. 012012 ). IOP Publishing . Search in Google Scholar

Durumeric, Z., Ma, Z., Springall, D., Barnes, R., Sullivan, N., Bursztein, E., & Paxson, V. (2017, February). The Security Impact of HTTPS Interception. In NDSS. Durumeric Z. Ma Z. Springall D. Barnes R. Sullivan N. Bursztein E. Paxson V. ( 2017 , February ). The Security Impact of HTTPS Interception . In NDSS . Search in Google Scholar

Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P. A., & Ranjithkumar, S. (2017). Intelligent smart home automation and security system using Arduino and Wi-fi. International Journal of Engineering And Computer Science (IJECS), 6(3), 20694-20698. Chandramohan J. Nagarajan R. Satheeshkumar K. Ajithkumar N. Gopinath P. A. Ranjithkumar S. ( 2017 ). Intelligent smart home automation and security system using Arduino and Wi-fi . International Journal of Engineering And Computer Science (IJECS) , 6 ( 3 ), 20694 - 20698 . Search in Google Scholar

Zhang, T., & Du, L. (2022, April). Research on it operation and maintenance and management and maintenance methods in cloud computing environment. In 2022 International Conference on Creative Industry and Knowledge Economy (CIKE 2022) (pp. 168-172). Atlantis Press. Zhang T. Du L. ( 2022 , April ). Research on it operation and maintenance and management and maintenance methods in cloud computing environment . In 2022 International Conference on Creative Industry and Knowledge Economy (CIKE 2022) (pp. 168 - 172 ). Atlantis Press . Search in Google Scholar

Lang, J., Czeskis, A., Balfanz, D., Schilder, M., & Srinivas, S. (2017). Security keys: Practical cryptographic second factors for the modern web. In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20 (pp. 422-440). Springer Berlin Heidelberg. Lang J. Czeskis A. Balfanz D. Schilder M. Srinivas S. ( 2017 ). Security keys: Practical cryptographic second factors for the modern web . In Financial Cryptography and Data Security: 20th International Conference, FC 2016, Christ Church, Barbados, February 22–26, 2016, Revised Selected Papers 20 (pp. 422 - 440 ). Springer Berlin Heidelberg . Search in Google Scholar

Raina, P., & Shah, H. (2018). Security in Networks. International Journal of Business Management and Visuals, ISSN: 3006-2705, 1(2), 30-48. Raina P. Shah H. ( 2018 ). Security in Networks . International Journal of Business Management and Visuals , ISSN: 3006-2705, 1 ( 2 ), 30 - 48 . Search in Google Scholar

Aljawarneh, S. A., Alawneh, A., & Jaradat, R. (2017). Cloud security engineering: Early stages of SDLC. Future Generation Computer Systems, 74, 385-392. Aljawarneh S. A. Alawneh A. Jaradat R. ( 2017 ). Cloud security engineering: Early stages of SDLC . Future Generation Computer Systems , 74 , 385 - 392 . Search in Google Scholar

Clincy, V., & Shahriar, H. (2018, July). Web application firewall: Network security models and configuration. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1, pp. 835-836). IEEE. Clincy V. Shahriar H. ( 2018 , July ). Web application firewall: Network security models and configuration . In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC) (Vol. 1 , pp. 835 - 836 ). IEEE . Search in Google Scholar

Hoque, M. A., & Davidson, C. (2019). Design and implementation of an IoT-based smart home security system. International Journal of Networked and Distributed Computing, 7(2), 85-92. Hoque M. A. Davidson C. ( 2019 ). Design and implementation of an IoT-based smart home security system . International Journal of Networked and Distributed Computing , 7 ( 2 ), 85 - 92 . Search in Google Scholar

Malatji, M., Von Solms, S., & Marnewick, A. (2019). Socio-technical systems cybersecurity framework. Information & Computer Security, 27(2), 233-272. Malatji M. Von Solms S. Marnewick A. ( 2019 ). Socio-technical systems cybersecurity framework . Information & Computer Security , 27 ( 2 ), 233 - 272 . Search in Google Scholar

Ullah, M. U., Hassan, A., Asif, M., Farooq, M. S., Saleem, M., & Ullah, U. (2022). Intelligent intrusion detection system for Apache web server empowered with machine learning approaches. International Journal of Computational and Innovative Sciences, 1(1), 21-27. Ullah M. U. Hassan A. Asif M. Farooq M. S. Saleem M. Ullah U. ( 2022 ). Intelligent intrusion detection system for Apache web server empowered with machine learning approaches . International Journal of Computational and Innovative Sciences , 1 ( 1 ), 21 - 27 . Search in Google Scholar

Fett, D., Küsters, R., & Schmitz, G. (2017, August). The web sso standard openid connect: In-depth formal security analysis and security guidelines. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (pp. 189-202). IEEE. Fett D. Küsters R. Schmitz G. ( 2017 , August ). The web sso standard openid connect: In-depth formal security analysis and security guidelines . In 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (pp. 189 - 202 ). IEEE . Search in Google Scholar

Liu, J. (2021, February). Analysis of Computer Network Maintenance Strategy Based on Lan. In Journal of Physics: Conference Series (Vol. 1744, No. 3, p. 032131). IOP Publishing. Liu J. ( 2021 , February ). Analysis of Computer Network Maintenance Strategy Based on Lan . In Journal of Physics: Conference Series (Vol. 1744 , No. 3 , p. 032131 ). IOP Publishing . Search in Google Scholar

Kusumarini, A. I., & Seta, H. B. (2021, October). Information System Security Analysis to Determine Server Security Vulnerability with Penetration Testing Execution Standard (PTES) Method at VWX University. In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS (pp. 7-12). IEEE. Kusumarini A. I. Seta H. B. ( 2021 , October ). Information System Security Analysis to Determine Server Security Vulnerability with Penetration Testing Execution Standard (PTES) Method at VWX University . In 2021 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS (pp. 7 - 12 ). IEEE . Search in Google Scholar

Nazar, N., Shukla, V. K., Kaur, G., & Pandey, N. (2021, September). Integrating web server log forensics through deep learning. In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1-6). IEEE. Nazar N. Shukla V. K. Kaur G. Pandey N. ( 2021 , September ). Integrating web server log forensics through deep learning . In 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO) (pp. 1 - 6 ). IEEE . Search in Google Scholar

Silvestri, L., Forcina, A., Introna, V., Santolamazza, A., & Cesarotti, V. (2020). Maintenance transformation through Industry 4.0 technologies: A systematic literature review. Computers in industry, 123, 103335. Silvestri L. Forcina A. Introna V. Santolamazza A. Cesarotti V. ( 2020 ). Maintenance transformation through Industry 4.0 technologies: A systematic literature review . Computers in industry , 123 , 103335 . Search in Google Scholar

Zebari, R. R., Zeebaree, S. R., & Jacksi, K. (2018, October). Impact analysis of HTTP and SYN flood DDoS attacks on apache 2 and IIS 10.0 Web servers. In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 156-161). IEEE. Zebari R. R. Zeebaree S. R. Jacksi K. ( 2018 , October ). Impact analysis of HTTP and SYN flood DDoS attacks on apache 2 and IIS 10.0 Web servers . In 2018 International Conference on Advanced Science and Engineering (ICOASE) (pp. 156 - 161 ). IEEE . Search in Google Scholar

Calzavara, S., Focardi, R., Squarcina, M., & Tempesta, M. (2017). Surviving the web: A journey into web session security. ACM Computing Surveys (CSUR), 50(1), 1-34. Calzavara S. Focardi R. Squarcina M. Tempesta M. ( 2017 ). Surviving the web: A journey into web session security . ACM Computing Surveys (CSUR) , 50 ( 1 ), 1 - 34 . Search in Google Scholar

Saleem, S., Sheeraz, M., Hanif, M., & Farooq, U. (2020, October). Web server attack detection using machine learning. In 2020 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1-7). IEEE. Saleem S. Sheeraz M. Hanif M. Farooq U. ( 2020 , October ). Web server attack detection using machine learning . In 2020 International Conference on Cyber Warfare and Security (ICCWS) (pp. 1 - 7 ). IEEE . Search in Google Scholar

Staicu, C. A., & Pradel, M. (2018). Freezing the Web: a study of {ReDoS} vulnerabilities in {JavaScript-based} web servers. In 27th USENIX security symposium (USENIX Security 18) (pp. 361-376). Staicu C. A. Pradel M. ( 2018 ). Freezing the Web: a study of {ReDoS} vulnerabilities in {JavaScript-based} web servers . In 27th USENIX security symposium (USENIX Security 18) (pp. 361 - 376 ). Search in Google Scholar

Gurunath, R., Agarwal, M., Nandi, A., & Samanta, D. (2018, August). An overview: security issue in IoT network. In 2018 2nd international conference on I-SMAC (IoT in social, Mobile, analytics and cloud)(ISMAC) I-SMAC (IoT in social, Mobile, analytics and cloud)(I-SMAC), 2018 2nd international conference on (pp. 104-107). IEEE. Gurunath R. Agarwal M. Nandi A. Samanta D. ( 2018 , August ). An overview: security issue in IoT network . In 2018 2nd international conference on I-SMAC (IoT in social, Mobile, analytics and cloud)(ISMAC) I-SMAC (IoT in social, Mobile, analytics and cloud)(I-SMAC), 2018 2nd international conference on (pp. 104 - 107 ). IEEE . Search in Google Scholar

Aaqib, S. M., & Sharma, L. (2019). Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems. In Software Engineering: Proceedings of CSI 2015 (pp. 441-447). Springer Singapore. Aaqib S. M. Sharma L. ( 2019 ). Evaluation and Comparison of Security Mechanisms In-Place in Various Web Server Systems . In Software Engineering: Proceedings of CSI 2015 (pp. 441 - 447 ). Springer Singapore . Search in Google Scholar

Xing, L. (2021). Computer Network Security Maintenance and Management in the Era of Big Data [J]. International Journal of Frontiers in Sociology, 3(1). Xing L. ( 2021 ). Computer Network Security Maintenance and Management in the Era of Big Data [J] . International Journal of Frontiers in Sociology , 3 ( 1 ). Search in Google Scholar

Chen, Y., & Li, B. (2019, July). Computer Network Engineering Security Problems and Countermeasure Analysis based on Network Security Maintenance. In 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019) (pp. 369-373). Atlantis Press. Chen Y. Li B. ( 2019 , July ). Computer Network Engineering Security Problems and Countermeasure Analysis based on Network Security Maintenance . In 3rd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2019) (pp. 369 - 373 ). Atlantis Press . Search in Google Scholar

Ali, F. A. H., Sukri, M. K. A. M., Jali, M. Z., Al-Fatih, M., & Yusof, M. A. M. (2023). Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance. Journal of Advanced Research in Applied Sciences and Engineering Technology, 29(3), 198-205. Ali F. A. H. Sukri M. K. A. M. Jali M. Z. Al-Fatih M. Yusof M. A. M. ( 2023 ). Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance . Journal of Advanced Research in Applied Sciences and Engineering Technology , 29 ( 3 ), 198 - 205 . Search in Google Scholar

Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., & Rieck, K. (2022). Dos and don’ts of machine learning in computer security. In 31st USENIX Security Symposium (USENIX Security 22) (pp. 3971-3988). Arp D. Quiring E. Pendlebury F. Warnecke A. Pierazzi F. Wressnegger C. Rieck K. ( 2022 ). Dos and don’ts of machine learning in computer security . In 31st USENIX Security Symposium (USENIX Security 22) (pp. 3971 - 3988 ). Search in Google Scholar

van Oorschot, P. C. (2020). Computer Security and the Internet. Springer International Publishing. van Oorschot P. C. ( 2020 ). Computer Security and the Internet . Springer International Publishing . Search in Google Scholar

Beguin, E., Besnard, S., Cros, A., Joannes, B., Leclerc-Istria, O., Noel, A., & Nicomette, V. (2019). Computer-security-oriented escape room. IEEE Security & Privacy, 17(4), 78-83. Beguin E. Besnard S. Cros A. Joannes B. Leclerc-Istria O. Noel A. Nicomette V. ( 2019 ). Computer-security-oriented escape room . IEEE Security & Privacy , 17 ( 4 ), 78 - 83 . Search in Google Scholar

Ney, P., Koscher, K., Organick, L., Ceze, L., & Kohno, T. (2017). Computer security, privacy, and {DNA} sequencing: compromising computers with synthesized {DNA}, privacy leaks, and more. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 765-779). Ney P. Koscher K. Organick L. Ceze L. Kohno T. ( 2017 ). Computer security, privacy, and {DNA} sequencing: compromising computers with synthesized {DNA}, privacy leaks, and morey . In 26th USENIX Security Symposium (USENIX Security 17) (pp. 765 - 779 ). Search in Google Scholar

Bhandari Hira Lal & Chitrakar Roshan. (2024). Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database. Data Science Journal35-35. Bhandari Hira Lal Chitrakar Roshan ( 2024 ). Enhancement of a Transformation Algorithm to Migrate SQL Database into NoSQL Graph Database . Data Science Journal 35 - 35 . Search in Google Scholar

Vitalii Yesin,Mikolaj Karpinski,Maryna Yesina,Vladyslav Vilihura,Ruslan Kozak & Ruslan Shevchuk. (2023). Technique for Searching Data in a Cryptographically Protected SQL Database. Applied Sciences(20), Vitalii Yesin Mikolaj Karpinski Maryna Yesina Vladyslav Vilihura Ruslan Kozak Ruslan Shevchuk ( 2023 ). Technique for Searching Data in a Cryptographically Protected SQL Database . Applied Sciences(20) , Search in Google Scholar

M. Veni & T. Meyyappan. (2024). Retraction Note: Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm. Multimedia Tools and Applications(34),81901-81901. M. Veni T. Meyyappan ( 2024 ). Retraction Note: Digital image Watermark embedding and extraction using oppositional fruit Fly algorithm . Multimedia Tools and Applications(34) , 81901 - 81901 . Search in Google Scholar

Xiang Yuexin,Li Tiantian,Ren Wei,He Jie,Zhu Tianqing & Choo Kim-Kwang Raymond. (2024). AdvEWM: Generating image adversarial examples by embedding digital watermarks. Journal of Information Security and Applications103662-. Xiang Yuexin Li Tiantian Ren Wei He Jie Zhu Tianqing Choo Kim-Kwang Raymond ( 2024 ). AdvEWM: Generating image adversarial examples by embedding digital watermarks . Journal of Information Security and Applications 103662- . Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere