Author:
Atienza David,Herrero Álvaro,Corchado Emilio
Publisher
Springer International Publishing
Reference24 articles.
1. Myerson, J.M.: Identifying enterprise network vulnerabilities. Int. J. Network Manage 12(3), 135–144 (2002)
2. Fielding, R., Reschke, J.: Hypertext transfer protocol (HTTP/1.1): message syntax and routing. IETF RFC 7230 (2014)
3. Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Berners-Lee, T.: Hypertext transfer protocol – HTTP/1.1. IETF RFC 2068 (1997)
4. Crist, J.: Web based attacks. SANS institute - infosec reading room (2007)
5. Ponemon Institute - Cost of Cyber Crime Study (2014)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Evaluating Classifiers’ Performance to Detect Attacks in Website Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05
2. Dimensionality-Reduction Methods for the Analysis of Web Traffic;International Joint Conference 15th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2022) 13th International Conference on EUropean Transnational Education (ICEUTE 2022);2022-11-05
3. Advanced Visualization of Intrusions in Flows by Means of Beta-Hebbian Learning;Logic Journal of the IGPL;2022-02-16
4. Research on Website Traffic Prediction Method Based on Deep Learning;Simulation Tools and Techniques;2022
5. Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity;IEEE Access;2020