Detection and avoidance of input validation attacks in web application using deterministic push down automata
Saved in:
| Date: | 2019 |
|---|---|
| Main Authors: | V. Nitja, S. Sentilkumar |
| Format: | Article |
| Language: | English |
| Published: |
2019
|
| Series: | International Scientific Technical Journal «Problems of Control and Informatics» |
| Online Access: | http://jnas.nbuv.gov.ua/article/UJRN-0001246370 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Library portal of National Academy of Sciences of Ukraine | LibNAS |
Institution
Library portal of National Academy of Sciences of Ukraine | LibNASSimilar Items
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Collectives of automata on infinite grid graph with deterministic vertex labeling
by: S. V. Sapunov
Published: (2019)
by: S. V. Sapunov
Published: (2019)
Features of input data usage in deterministic and stochastic life-cycle models
by: Shulzhenko S.V.
Published: (2014)
by: Shulzhenko S.V.
Published: (2014)
Features of input data usage in deterministic and stochastic life-cycle models
by: Kulyk М.M.
Published: (2014)
by: Kulyk М.M.
Published: (2014)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Detection of Deterministically Moderated Signals in Astronomical Photometric Systems
by: Zhilin, E. I., et al.
Published: (2013)
by: Zhilin, E. I., et al.
Published: (2013)
Modeling of Attack Detection System based on Hybridization of Binary Classifiers
by: O. I. Belei, et al.
Published: (2020)
by: O. I. Belei, et al.
Published: (2020)
Averaging of Push-Pull DC Converter Model
by: Ju. V. Rudenko
Published: (2018)
by: Ju. V. Rudenko
Published: (2018)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2022)
by: Gorbatiuk, V.O., et al.
Published: (2022)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
A three-layer defense mechanism based on web servers against distributed denial of service attacks
by: A. T. Rakhmanov, et al.
Published: (2019)
by: A. T. Rakhmanov, et al.
Published: (2019)
Transmission Electron Microscopy Past and Present: Pushing the Limits of Cognition
by: A. G. Derzhipolskij, et al.
Published: (2012)
by: A. G. Derzhipolskij, et al.
Published: (2012)
Transformer faultiness influence on processes at forward push-pull converter
by: Ju. V. Rudenko
Published: (2014)
by: Ju. V. Rudenko
Published: (2014)
Construction of a multi-agent attack detection system based on artificial intelligence models
by: O. Belej, et al.
Published: (2021)
by: O. Belej, et al.
Published: (2021)
Symmetries of automata
by: Egri-Nagy, A., et al.
Published: (2015)
by: Egri-Nagy, A., et al.
Published: (2015)
Symmetries of automata
by: Egri-Nagy, Attila, et al.
Published: (2018)
by: Egri-Nagy, Attila, et al.
Published: (2018)
Symmetries of automata
by: A. Egri-Nagy, et al.
Published: (2015)
by: A. Egri-Nagy, et al.
Published: (2015)
Deterministic diffusion
by: L. P. Nyzhnyk, et al.
Published: (2019)
by: L. P. Nyzhnyk, et al.
Published: (2019)
Deterministic diffusion
by: Nizhnik, I. L., et al.
Published: (2026)
by: Nizhnik, I. L., et al.
Published: (2026)
Modeling of pitting-like defects evolution with application of cellular automata
by: B. P. Rusyn, et al.
Published: (2014)
by: B. P. Rusyn, et al.
Published: (2014)
Robotic Grasping with Obstacle Avoidance Using Octrees
by: V. V. Rud
Published: (2020)
by: V. V. Rud
Published: (2020)
Avoidable rings of range 1
by: B. M. Kuznitska, et al.
Published: (2014)
by: B. M. Kuznitska, et al.
Published: (2014)
Partial actions and automata
by: Dokuchaev, M., et al.
Published: (2018)
by: Dokuchaev, M., et al.
Published: (2018)
Groups of linear automata
by: Oliynyk, Andriy
Published: (2018)
by: Oliynyk, Andriy
Published: (2018)
Partial actions and automata
by: Dokuchaev, M., et al.
Published: (2011)
by: Dokuchaev, M., et al.
Published: (2011)
Representation of automata by groups
by: Skobelev, V. G., et al.
Published: (1992)
by: Skobelev, V. G., et al.
Published: (1992)
Modeling of intensity of external migration of Ukrainian population in the conditions of strengthening of the push environment
by: O. O. Levytska, et al.
Published: (2020)
by: O. O. Levytska, et al.
Published: (2020)
Stochastic and Deterministic Bundles
by: Leandre, R.
Published: (2005)
by: Leandre, R.
Published: (2005)
Stochastic and Deterministic Bundles
by: Leandre, R., et al.
Published: (2005)
by: Leandre, R., et al.
Published: (2005)
On the use and avoidance of birds overhead transmission lines in the Crimea
by: V. N. Kucherenko, et al.
Published: (2014)
by: V. N. Kucherenko, et al.
Published: (2014)
Development of main cracks in a gas-saturated coal bed at the stationary pushing of coalface
by: N. A. Kalugina, et al.
Published: (2014)
by: N. A. Kalugina, et al.
Published: (2014)
FRAUD IN HEALTH INSURANCE AND WAYS TO AVOIDANCE
by: Nikolaienko, Serhii
Published: (2019)
by: Nikolaienko, Serhii
Published: (2019)
Fraud in health insurance and ways to avoidance
by: S. Nikolaienko
Published: (2019)
by: S. Nikolaienko
Published: (2019)
On sequences of Mealy automata and their limits
by: Reznykov, I.I.
Published: (2006)
by: Reznykov, I.I.
Published: (2006)
Automata over finite T-quasigroups
by: V. V. Skobelev, et al.
Published: (2018)
by: V. V. Skobelev, et al.
Published: (2018)
Affine automata and classical fractals
by: I. K. Rystsov
Published: (2018)
by: I. K. Rystsov
Published: (2018)
Representation of Automata by Groups. II
by: Skobelev, V. G., et al.
Published: (2000)
by: Skobelev, V. G., et al.
Published: (2000)
Electricity demand forecasting using UP-DOWN method
by: Sas
Published: (2013)
by: Sas
Published: (2013)
The Non-Deterministic Strategy of Rewriting
by: Letichevsky, A.A., et al.
Published: (2013)
by: Letichevsky, A.A., et al.
Published: (2013)
Similar Items
-
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021) -
Collectives of automata on infinite grid graph with deterministic vertex labeling
by: S. V. Sapunov
Published: (2019) -
Features of input data usage in deterministic and stochastic life-cycle models
by: Shulzhenko S.V.
Published: (2014) -
Features of input data usage in deterministic and stochastic life-cycle models
by: Kulyk М.M.
Published: (2014) -
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)