Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,872 papers from all fields of science
Search
Sign In
Create Free Account
Internet security
Known as:
Protecting internet communications
, Web Security
Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
AVG
Asprox botnet
Authentication
Avast Antivirus
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Log Visualization of Intrusion and Prevention Reverse Proxy Server against Web Attacks
T. Mantoro
,
Normaziah Binti Abdul Aziz
,
Nur Dalilah Binti Meor Yusoff
,
Nor Aishah Binti Abu Talib
International Conference on Informatics and…
2013
Corpus ID: 15562240
SQL Injection Attack (SQLIA) has made to the top of the OWASP, Top 10 Web Application Security Risks in 2013 and in 2010. The…
Expand
Review
2012
Review
2012
Self-Exfiltration : The Dangers of Browser-Enforced Information Flow Control
E. Chen
,
Sergey Gorbaty
,
A. Singhal
,
Collin Jackson
2012
Corpus ID: 16268595
Since the early days of Netscape, browser vendors and web security researchers have restricted out-going data based on its…
Expand
2012
2012
Web Security by Preventing SQL Injection Using Encryption in Stored Procedures
D. Rani
,
B. S. Kumar
,
L. Rao
,
V. T. S. Jagadish
,
M. Pradeep
2012
Corpus ID: 14975732
SQL Injection attacks target databases that are accessible through a web front-end, and take advantage of flaws in the input…
Expand
2010
2010
Hidden web crawling for SQL injection detection
Xin Wang
,
Luhua Wang
,
G. Wei
,
Dongmei Zhang
,
Yixian Yang
3rd IEEE International Conference on Broadband…
2010
Corpus ID: 13980361
With the development of web technology, the web application has become an important part of our lives. And because of the widely…
Expand
2008
2008
Evolution of cross site request forgery attacks
Renaud Feil
,
L. Nyffenegger
Journal in Computer Virology
2008
Corpus ID: 120211
This paper presents a state of the art of cross-site request forgery (CSRF) attacks and new techniques which can be used by…
Expand
2007
2007
Discussion of One Improved Hash Algorithm Based on MD5 and SHA1 1
Xiaorui Chan
,
Guangzhong Liu
2007
Corpus ID: 72533
We have devised one 160 bits improved hash algorithm based on MD5 and SHA1. And in additional, we also introduce four assistant…
Expand
2005
2005
Security and Privacy Issues in Machine Readable Travel Documents (MRTDs)
Gaurav S. Kc
,
P. Karger
2005
Corpus ID: 116016243
After the tragic terror attacks of 9/11, the U.S. Congress resolved to bring about a major overhaul of the immigration process at…
Expand
2004
2004
A Predicative Semantic Model for Integrating UML Models
J. Yang
,
Quan Long
,
Zhiming Liu
,
Xiaoshan Li
International Colloquium on Theoretical Aspects…
2004
Corpus ID: 6922682
This paper presents a predicative semantic model for integrating models from UML class diagrams and sequence diagrams. The…
Expand
2002
2002
Testing Web Security: Assessing the Security of Web Sites and Applications
Steven Splaine
2002
Corpus ID: 106667455
From the Publisher: Protect your companys Web site from hack attacks with this guide to proven security-testing techniques It…
Expand
1989
1989
Selective Conscientious Objection
Michael F. Noone
1989
Corpus ID: 159048000
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE