A Survey of Network-based Security Attacks
暂无分享,去创建一个
[1] Sheikh Ariful Islam,et al. An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[2] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[3] Sudhir Aggarwal,et al. Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.
[4] Matthias Jarke,et al. Query Optimization in Database Systems , 1984, CSUR.
[6] D. Flannanghan. JavaScript: The definitive guide , 1999 .
[7] D.M. Cohen,et al. The Combinatorial Design Approach to Automatic Test Generation , 1996, IEEE Softw..
[8] Bjarne Stroustrup,et al. C++ Programming Language , 1986, IEEE Softw..
[9] Douglas Crockford,et al. The application/json Media Type for JavaScript Object Notation (JSON) , 2006, RFC.
[10] Gilbert Held,et al. The TCP/IP Protocol Suite , 2001 .
[11] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[12] Andrew V. Royappa. The PHP web application server , 2000 .
[13] Sonali B. Wankhede,et al. Study of Network-Based DoS Attacks , 2018, Nanoelectronics, Circuits and Communication Systems.
[14] Richard P. Guidorizzi. Security: Active Authentication , 2013, IT Prof..
[15] Al Stevens,et al. C programming , 1990 .
[16] B. Goode,et al. Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.
[17] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[18] Jonathan Grudin,et al. When social networks cross boundaries: a case study of workplace use of facebook and linkedin , 2009, GROUP.
[19] Muhammad Salman,et al. Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system , 2013, 2013 International Conference on QiR.
[20] Sudhir Aggarwal,et al. New Technologies in Password Cracking Techniques , 2018 .
[21] Ian S. Graham. The HTML SourceBook , 1995 .
[22] Justin Clarke,et al. SQL Injection Attacks and Defense , 2009 .
[23] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[24] M. Sarosh Umar,et al. One-Tip Secure: Next-Gen of Text-Based Password , 2019 .
[25] Alessandro Orso,et al. A Classification of SQL Injection Attacks and Countermeasures , 2006, ISSSE.
[26] Mauro Conti,et al. Amplified Distributed Denial of Service Attack in Software Defined Networking , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[27] Edward Pollack. Protecting Against SQL Injection , 2016 .
[28] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[29] Lei Guo,et al. Resilient Control of Wireless Networked Control System Under Denial-of-Service Attacks: A Cross-Layer Design Approach , 2020, IEEE Transactions on Cybernetics.
[30] David L. Mills,et al. Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..
[31] Priya Narasimhan,et al. Active network based DDoS defense , 2002, Proceedings DARPA Active Networks Conference and Exposition.
[32] Leland L. Beck,et al. System Software: An Introduction to Systems Programming , 1985 .
[33] Nghi Nguyen,et al. Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 , 2002, ISC.
[34] Zhu Cheng-rong. Comparison of approaches to data security implementation based on PHP , 2009 .
[35] Jacques Patarin,et al. How to Construct Pseudorandom and Super Pseudorandom Permutations from one Single Pseudorandom Function , 1992, EUROCRYPT.
[36] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[37] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[38] Ronaldo M. Salles,et al. Botnets: A survey , 2013, Comput. Networks.
[39] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.
[40] Leonid A. Levin,et al. A Pseudorandom Generator from any One-way Function , 1999, SIAM J. Comput..
[41] Jacob M. Howe,et al. Detecting Cross-Site Scripting Attacks Using Machine Learning , 2018, AMLTA.
[42] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[43] Norman Ramsey,et al. Specifying representations of machine instructions , 1997, TOPL.
[44] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[45] Patrick Valduriez,et al. Principles of Distributed Database Systems , 1990 .
[46] Peter Wisskirchen,et al. Object-Oriented and Mixed Programming Paradigms , 1996, Focus on Computer Graphics.
[47] Dmitry Khovratovich,et al. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family , 2012, IACR Cryptol. ePrint Arch..
[48] Daya Gupta,et al. NFC based secure mobile healthcare system , 2014, 2014 Sixth International Conference on Communication Systems and Networks (COMSNETS).
[49] Leland L. Beck. System software: an introduction to systems programming (2nd ed.) , 1990 .