2021
DOI: 10.32604/cmc.2021.016099
|View full text |Cite
|
Sign up to set email alerts
|

Web Attack Detection Using the Input Validation Method: DPDA Theory

Abstract: to identify all anomalies and delivers better execution in contrast with the current program.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

3
7

Authors

Journals

citations
Cited by 27 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…The goal of this review was not only to review the features of blockchain technology but also to highlight the benefits and limitations of blockchain technology in the food supply chain. In [16] suggested the wayout to deveop some commercial web applications based on intelligence. In [17] the authors have presented a blockchain based framework for the automotive insurance sector which is capable of regulating the insurance claims for automobiles and automate the process of payments of claims.…”
Section: Related Workmentioning
confidence: 99%
“…The goal of this review was not only to review the features of blockchain technology but also to highlight the benefits and limitations of blockchain technology in the food supply chain. In [16] suggested the wayout to deveop some commercial web applications based on intelligence. In [17] the authors have presented a blockchain based framework for the automotive insurance sector which is capable of regulating the insurance claims for automobiles and automate the process of payments of claims.…”
Section: Related Workmentioning
confidence: 99%
“…The CH is chosen according to the threshold value with specific energy-dependent characteristics, but in the original LEACH protocol, the CH is selected randomly without energy usage. Therefore, to achieve minimal energy consumption, it is crucial to select the optimal cluster and cluster head [21].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…• Secure coding practices for IoT devices and applications: Following secure coding guidelines and best practices is essential to minimize the introduction of vulnerabilities during the development process. It includes practices such as input validation [79], output encoding [80], and proper handling of user input to prevent common attack vectors such as injection attacks or cross-site scripting [81]. [83] to identify weaknesses and potential entry points for attackers.…”
Section: B Secure Software Developmentmentioning
confidence: 99%