Cited By
View all- Nia MAtani RFabian BBabulak E(2016)On detecting unidentified network traffic using pattern-based random walkSecurity and Communication Networks10.1002/sec.15579:16(3509-3526)Online publication date: 10-Nov-2016
This paper presents a new approach to network traffic control based on the pattern theorem. In order to generate unique detection patterns for the process of traffic analysis, a self-avoiding walk algorithm is used. During data processing and analysis, ...
Day after day, SQL Injection (SQLI) attack is consistently proliferating across the globe. According to Open Web Application Security Project (OWASP) Top Ten Cheat Sheet-2014, SQLI is at top in the list of online attacks. The cause of spread of SQLI is ...
John Wiley & Sons, Inc.
United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in