Narrow your search

Library

KU Leuven (6)

AP (4)

EhB (4)

KDG (4)

Odisee (3)

Thomas More Kempen (3)

Thomas More Mechelen (3)

UCLL (3)

ULB (3)

ULiège (3)

More...

Resource type

book (11)

digital (4)


Language

English (15)


Year
From To Submit

2018 (2)

2011 (1)

2010 (6)

2009 (3)

2008 (1)

More...
Listing 1 - 10 of 15 << page
of 2
>>
Sort by

Digital
Information Systems Security : 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings
Authors: ---
ISBN: 9783642177149 9783642177132 9783642177156 Year: 2010 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Book
Information Systems Security : 6th International Conference, ICISS 2010 ; Gandhinagar, India, December 17-19, 2010 : proceedings
Authors: --- ---
ISBN: 3642177131 364217714X Year: 2010 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Computers --- Information networks --- Access control --- Automated information networks --- Networks, Information --- Computer science. --- Computer communication systems. --- Computer security. --- Information storage and retrieval. --- User interfaces (Computer systems). --- Biometrics (Biology). --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- User Interfaces and Human Computer Interaction. --- Systems and Data Security. --- Information Storage and Retrieval. --- Management of Computing and Information Systems. --- Biometrics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Protection --- Security measures --- Distributed processing --- Information services --- Information storage and retrieval systems --- Information storage and retrieva. --- Information Systems. --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval


Book
Information Systems Security
Authors: --- ---
ISBN: 9783642177149 9783642177132 9783642177156 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoillegallymanipulatedatabase byinjectingmalicious SQL codes into the values of input parameters of http requests sentto the victim web site. 1: Fig.1. An example of a program written in PHP which contains SQL Injection v- nerability Figure 1 showsaprogram that uses the database query function mysql query togetuserinformationcorrespondingtothe userspeci?edby the GETinput- rameterusername andthen printtheresultto the clientbrowser.Anormalhttp request with the input parameter username looks like http://example.com/ index.php?username=bob . The dynamically created database query at line2 is SELECT * FROM users WHERE username='bob' AND usertype='user' . Thisprogram is vulnerabletoSQLInjection attacks because mysql query uses the input value of username without sanitizingmalicious codes. A malicious code can be a stringthatcontains SQL symbols ork- words.Ifan attacker sendarequest with SQL code ( ˜alice'-') - jected http://example.com/index.php?username=alice'- , the query becomes SELECT* FROM users WHERE username='alice'--' AND usertype='user' .


Digital
Recent Advances in Intrusion Detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings
Authors: --- ---
ISBN: 9783642043420 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
Recent Advances in Intrusion Detection : 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, Proceedings
Authors: --- ---
ISBN: 9783642155123 9783642155116 9783642155130 Year: 2010 Publisher: Berlin, Heidelberg Springer


Book
Recent advances in intrusion detection : 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010 ; proceedings
Authors: --- --- ---
ISBN: 3642155111 9786613566638 364215512X 1280388714 Year: 2010 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Computer security --- Computers --- Access control --- Computer science. --- Computer communication systems. --- Computer programming. --- Data structures (Computer science). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Computer Science. --- Computer Communication Networks. --- Programming Techniques. --- Data Encryption. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Data Structures, Cryptology and Information Theory. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Foundations --- Programming --- Distributed processing --- Computer software. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Software, Computer --- Computer systems


Book
Recent advances in intrusion detection : 12th international symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009 : proceedings
Authors: --- --- ---
ISBN: 3642043410 3642043429 Year: 2009 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 2009, held in Saint-Malo, Brittany, France, in September 2009. The 17 revised full papers presented together with 16 revised poster papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on anomaly and specification-based approaches, malware detection and prevention, network and host intrusion detection and prvention, intrusion detection for mobile devices, and high-performance intrusion detection.

Keywords

Computer security --- Computers --- Computer Science --- Engineering & Applied Sciences --- Access control --- Computer science. --- Computer communication systems. --- Data encryption (Computer science). --- User interfaces (Computer systems). --- Biometrics (Biology). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Management of Computing and Information Systems. --- User Interfaces and Human Computer Interaction. --- Computers and Society. --- Biometrics. --- Data Encryption. --- Computer Communication Networks. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Civilization and computers --- Civilization --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Statistical methods --- Distributed processing --- Information Systems. --- Cryptology.


Book
Recent Advances in Intrusion Detection : 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings
Authors: --- --- ---
ISBN: 9783642043420 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID 2009, held in Saint-Malo, Brittany, France, in September 2009. The 17 revised full papers presented together with 16 revised poster papers were carefully reviewed and selected from 59 submissions. The papers are organized in topical sections on anomaly and specification-based approaches, malware detection and prevention, network and host intrusion detection and prvention, intrusion detection for mobile devices, and high-performance intrusion detection.


Book
Recent Advances in Intrusion Detection
Authors: --- --- ---
ISBN: 9783642155123 9783642155116 9783642155130 Year: 2010 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 13th International Symposium on Recent Advances in Intrusion Detection Systems (RAID 2010), which took place in Ottawa, Ontario, Canada, during September 15-17, 2010. As in the past, the symposium brought together leading researchers and practitioners from academia, government, and industry to discuss intrusion detection research and practice. There were eight technical sessionspresentingfullresearchpapersonnetworkprotection,highperformance, malwaredetectionanddefense(2 sessions),evaluation,forensics,anomalydet- tion and access protection, and Web security. Furthermore, there was a poster session presenting emerging research areas and case studies. The RAID 2010 Program Committee received 102 full-paper submissions from all over the world. All submissions were carefully reviewed by independent reviewers on the basis of technical quality, topic, space, and overallbalance. The ?naldecisiontookplaceataProgramCommitteemeetingheldduringMay19-20 inOakland,California,where24paperswereeventuallyselectedforpresentation at the conference and publication in the proceedings. As a continued feature, the symposium later also accepted 15 poster presentations reporting early-stage research,demonstrationof applications,orcasestudies. The authorsof accepted posters were also o?ered the opportunity to have an extended abstract of their work included in the proceedings.


Book
Proceedings of the 2018 ACM SIGPLAN International Workshop on Formal Methods and Security
Authors: ---
ISBN: 1450358330 Year: 2018 Publisher: New York NY ACM

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 10 of 15 << page
of 2
>>
Sort by