Models and scenarios of implementation of threats for internet resources
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixin...
Saved in:
Main Author: | S. A. Lesko |
---|---|
Format: | Article |
Language: | Russian |
Published: |
MIREA - Russian Technological University
2020-12-01
|
Series: | Российский технологический журнал |
Subjects: | |
Online Access: | https://www.rtj-mirea.ru/jour/article/view/255 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
SOLUTIONS FOR AUTO-TESTING AND AUTO-WARNING WEBSITE ERRORS BASED ON THE RESULTS OF THE WEBSITE ERROR SCANNING TOOLS
by: Phạm Duy Lộc, et al.
Published: (2016-06-01) -
Is low‐rate distributed denial of service a great threat to the Internet?
by: Ming Chen, et al.
Published: (2021-09-01) -
Internet of Things (IoT) technologies: features, development prospects and potential threats
by: Daria Margaza, et al.
Published: (2024-11-01) -
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
by: Rrezearta Thaqi, et al.
Published: (2025-01-01) -
SQL Injection Detection Based on Lightweight Multi-Head Self-Attention
by: Rui-Teng Lo, et al.
Published: (2025-01-01)