Mitigating Cross-Site Request Forgery (CSRF) Attacks Using Reinforcement Learning and Predictive Analytics
S Agrawal - Applied Research in Artificial Intelligence and Cloud …, 2023 - researchberg.com
Abstract Cross-Site Request Forgery (CSRF) attacks pose a significant threat to web
application security, allowing attackers to perform unauthorized actions on behalf of …
application security, allowing attackers to perform unauthorized actions on behalf of …
[图书][B] Cyber resilience
S Petrenko - 2022 - taylorfrancis.com
Modern cyber systems acquire more emergent system properties, as far as their complexity
increases: cyber resilience, controllability, self-organization, proactive cyber security and …
increases: cyber resilience, controllability, self-organization, proactive cyber security and …
Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environment
MI Tariq, S Tayyaba, N Ali Mian… - Journal of Intelligent …, 2020 - content.iospress.com
The organizations utilizing the cloud computing services are required to select suitable
Information Security Controls (ISCs) to maintain data security and privacy. Many …
Information Security Controls (ISCs) to maintain data security and privacy. Many …
КИБЕРУСТОЙЧИВОСТЬ ИНДУСТРИИ 4.0
СА Петренко - 2020 - elibrary.ru
Киберустойчивость (англ.–Сyber Resilience) является важнейшим свойством любой
киберсистемы, особенно в условиях перехода на шестой технологический уклад и …
киберсистемы, особенно в условиях перехода на шестой технологический уклад и …
[PDF][PDF] Bio-inspired approach to self-regulation for industrial dynamic network infrastructure
D Lavrova, E Zaitceva, P Zegzhda - CEUR Workshop Proc., 2019 - ceur-ws.org
A bio-inspired approach for self-regulation of modern industrial network infrastructure is
proposed. The approach is based on the analogy between the target function of an industrial …
proposed. The approach is based on the analogy between the target function of an industrial …
Biological Metaphor for Cyber Immunity
NM Grigorieva, SA Petrenko - 2023 XXVI International …, 2023 - ieeexplore.ieee.org
The human immune system consists of specific layers for organism protection, whose
essential feature is to recognize all input entities as self versus non-self and to kill or destroy …
essential feature is to recognize all input entities as self versus non-self and to kill or destroy …
[PDF][PDF] Recommended practices for the analysis of web application vulnerabilities
VV Varenitca, AS Markov, VV Savchenko - … International Scientific and …, 2019 - ceur-ws.org
The paper is dedicated to information security of web applications. It discusses main classes
of web application vulnerabilities and topic-related regulatory documents. An original …
of web application vulnerabilities and topic-related regulatory documents. An original …
Json web token penetration testing on cookie storage with csrf techniques
I Darmawan, APA Karim, A Rahmatulloh… - … in Data Science, E …, 2021 - ieeexplore.ieee.org
An authentication process is an act of proving the identity of a user when entering a system.
Token-based authentication is a type of authentication that is stateless. This means that …
Token-based authentication is a type of authentication that is stateless. This means that …
Information support for safety insurance of road transport of dangerous goods
V Tatarinov, A Kirsanov - IOP Conference Series: Materials …, 2019 - iopscience.iop.org
In this article, the methods of system analysis are used to establish the presence of two open
systems, one of which is intended for the carriage of dangerous goods by road and the other …
systems, one of which is intended for the carriage of dangerous goods by road and the other …
[图书][B] Developing an Enterprise Continuity Program
S Petrenko - 2022 - taylorfrancis.com
The book discusses the activities involved in developing an Enterprise Continuity Program
(ECP) that will cover both Business Continuity Management (BCM) as well as Disaster …
(ECP) that will cover both Business Continuity Management (BCM) as well as Disaster …