2020
DOI: 10.32362/2500-316x-2020-8-6-9-33
|View full text |Cite
|
Sign up to set email alerts
|

Models and scenarios of implementation of threats for internet resources

Abstract: To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attack… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…, where p = {g 1 , ..., g n−m+1 } q(n−m+1) . Therefore, from (20)-( 24) and ( 26)- (30) it follows, that Y is a smashly G m -graded B-bimodule. This construction supplies X with the smashly G m -graded B-bimodule structure.…”
Section: Tensor Products Of Complexes For Nonassociative Algebras Wit...mentioning
confidence: 88%
See 2 more Smart Citations
“…, where p = {g 1 , ..., g n−m+1 } q(n−m+1) . Therefore, from (20)-( 24) and ( 26)- (30) it follows, that Y is a smashly G m -graded B-bimodule. This construction supplies X with the smashly G m -graded B-bimodule structure.…”
Section: Tensor Products Of Complexes For Nonassociative Algebras Wit...mentioning
confidence: 88%
“…The obtained results will be useful for further studies of cohomology theory of nonassociative algebras and noncommutative manifolds with metagroup relations, structure of nonassociative algebras, operator theory, spectral theory over Cayley-Dickson algebras, PDEs, noncommutative analysis, solutions of PDEs with boundary conditions, noncommutative geometry, mathematical physics, and their applications in the sciences. Then there are possible applications in mathematical coding theory, informatics, security of internet resources [29][30][31], because coding frequently uses algebras. This is caused by the fact that conditions imposed on metagroups are weaker than for groups.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation