Efficient assessment and evaluation for websites vulnerabilities using SNORT

被引:0
|
作者
Yarmouk University, Jordan [1 ]
机构
来源
Int. J. Secur. Appl. | / 1卷 / 7-16期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Evaluation in Mobile Websites
    Santos, Paulo J. F.
    Silveira, Maria Clara
    SISTEMAS Y TECNOLOGIAS DE INFORMACION, 2010, : 242 - 247
  • [32] Evaluation of tourism websites
    Bonjisse, Brito José
    Morais, Elisabete Paulo
    Proceedings of the 29th International Business Information Management Association Conference - Education Excellence and Innovation Management through Vision 2020: From Regional Development Sustainability to Global Economic Growth, 2017, : 3685 - 3699
  • [33] EVALUATION OF GOVERNMENT WEBSITES USING INTUITIONISTIC FUZZY AHP AND TOPSIS
    Buyukozkan, Gulcin
    Gocer, Fethullah
    UNCERTAINTY MODELLING IN KNOWLEDGE ENGINEERING AND DECISION MAKING, 2016, 10 : 930 - 935
  • [34] Activities using websites and social networks: tools and indicators for evaluation
    Jose Lopez, Maria
    Continente, Xavier
    Sanchez, Esther
    Bartroli, Montse
    GACETA SANITARIA, 2017, 31 (04) : 346 - 348
  • [35] E-Government websites Evaluation using Correspondence Analysis
    Nariman, Dahlan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS 2010), 2010, : 1147 - 1152
  • [36] Implementation of Simple SNORT Processor for Efficient Intrusion Detection Systems
    Azimi, Ehsan
    Ghaznavi-Ghoushchi, M. B.
    Rahmani, Amir Masoud
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 533 - +
  • [37] Brute Force Attack To Exploit Vulnerabilities of Websites with CMS Content Management System
    Aquino-Cruz, Mario
    Ibarra, Manuel
    Peralta-Ascue, Marleny
    Ilasaca-Cahuata, Edwar
    Apaza-Tarqui, Alejandro
    IBERO-AMERICAN SYMPOSIUM ON COMPUTER PROGRAMMING JOINTLY HELD WITH THE INTERNATIONAL CONGRESS ON TECHNOLOGY EDUCATION, 2018, : 14 - 25
  • [38] Assessment of SCADA System Vulnerabilities
    Yadav, Geeta
    Paul, Kolin
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 1737 - 1744
  • [39] Identifying SCADA Vulnerabilities Using Passive and Active Vulnerability Assessment Techniques
    Samtani, Sagar
    Yu, Shuo
    Zhu, Hongyi
    Patton, Mark
    Chen, Hsinchun
    IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS: CYBERSECURITY AND BIG DATA, 2016, : 25 - 30
  • [40] Using Readers' and Organizations' Goals to Guide Assessment of Success in Information Websites
    Watson, Robert B.
    Spyridakis, Jan
    HUMAN-COMPUTER INTERACTION: DESIGN AND EVALUATION, PT I, 2015, 9169 : 283 - 294