Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

POST (HTTP)

Known as: HTTP POST, POST request, Post 
In computing, POST is one of many request methods supported by the HTTP protocol used by the World Wide Web. By design, the POST request method… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
We introduce a new cryptographic primitive: Proofs of Space-Time (PoSTs) and construct a practical protocol for implementing… Expand
2016
2016
Slow HTTP Denial of Service (DoS) is an application layer DoS attack in which large number of incomplete HTTP requests are sent… Expand
  • figure 3
  • table I
  • figure 4
  • figure 5
  • figure 6
2015
2015
The work described in this paper consists of a temperature tracking system that follows a Client-Server architecture. A Raspberry… Expand
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • figure 5
2014
2014
Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on the Internet. Differently… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2013
2013
To gain insight into the Public Company Accounting Oversight Board’s (PCAOB) impact on audit quality, this study investigates the… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
2011
2011
NoBot is a novel malware detection system that employs packet classification and distinct counting techniques to achieve reliable… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Highly Cited
2010
Highly Cited
2010
With software-as-a-service becoming mainstream, more and more applications are delivered to the client through the Web. Unlike a… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • figure 6
2010
2010
We describe a Webmail server that runs on a bare PC without an operating system (OS) or kernel, and give details of its… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 7
  • figure 8
Highly Cited
1998
Highly Cited
1998
In just a few years since its inception, the World Wide Web has grown to be the most dominant application in the Internet. Since… Expand
  • figure 1.1
  • figure 1.2
  • table 1.1
  • figure 1.3
  • table 1.2