Web application protection techniques: A taxonomy (English)
- New search for: Prokhorenko, Victor
- New search for: Choo, Kim-Kwang Raymond
- New search for: Ashman, Helen
- New search for: Prokhorenko, Victor
- New search for: Choo, Kim-Kwang Raymond
- New search for: Ashman, Helen
In:
Journal of Network and Computer Applications
;
60
;
95-112
;
2015
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Web application protection techniques: A taxonomy
-
Contributors:
-
Published in:Journal of Network and Computer Applications ; 60 ; 95-112
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2015-11-19
-
Size:18 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 60
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trustworthy and effective person-to-person payments over multi-hop MANETsCarminati, Barbara / Ferrari, Elena / Tran, Ngoc Hong et al. | 2015
- 19
-
A survey of network anomaly detection techniquesAhmed, Mohiuddin / Naser Mahmood, Abdun / Hu, Jiankun et al. | 2015
- 32
-
RESTful service composition at a glance: A surveyGarriga, Martin / Mateos, Cristian / Flores, Andres / Cechich, Alejandra / Zunino, Alejandro et al. | 2015
- 54
-
Availability in the cloud: State of the artNabi, Mina / Toeroe, Maria / Khendek, Ferhat et al. | 2015
- 68
-
Comparison-based system-level fault diagnosis protocols for mobile ad-hoc networks: A surveyJarrah, Hazim / Sarkar, Nurul I. / Gutierrez, Jairo et al. | 2015
- 82
-
A survey on mobility-assisted localization techniques in wireless sensor networksHalder, Subir / Ghosal, Amrita et al. | 2015
- 95
-
Web application protection techniques: A taxonomyProkhorenko, Victor / Choo, Kim-Kwang Raymond / Ashman, Helen et al. | 2015
- 113
-
Review and analysis of networking challenges in cloud computingMoura, Jose / Hutchison, David et al. | 2015
- 130
-
Case studies of performance evaluation of cryptographic algorithms for an embedded system and a general purpose computerSilva, Natassya B.F. / Pigatto, Daniel F. / Martins, Paulo S. / Branco, Kalinka R.L.J.C et al. | 2015
- 144
-
A novel asymmetric three-party based authentication scheme in wearable devices environmentLiu, Sha / Hu, Shun / Weng, Jian / Zhu, Shuhua / Chen, Zhiyan et al. | 2015
- 155
-
Differentiated forwarding and caching in named-data networkingKim, Yusung / Kim, Younghoon / Bi, Jun / Yeom, Ikjun et al. | 2015
- 170
-
A survey of grid-based searching techniques for large scale distributed dataBakri Bashir, Mohammed / Latiff, Muhammad Shafie Bin Abd / Coulibaly, Yahaya / Yousif, Adil et al. | 2015
- 180
-
I2CC: Interleaving two-level cache with network coding in peer-to-peer VoD systemKao, Hui-Hsiang / Lee, Chung-Nan / Kao, Yung-Cheng / Wu, Peng-Jung et al. | 2015
- 192
-
Applications of wireless sensor networks for urban areas: A surveyRashid, Bushra / Rehmani, Mubashir Husain et al. | 2015
- 220
-
Traffic matrix estimation: A neural network approach with extended input and expectation maximization iterationZhou, Haifeng / Tan, Liansheng / Zeng, Qian / Wu, Chunming et al. | 2015
- A1
-
EditorialAtiquzzaman, Mohammed et al. | 2016
- IFC
-
Editorial board| 2016