Future trends in security issues in internet and web applications
The massive proliferation of Web applications is observed in recent years as the web is embraced by millions of businesses and government sectors as an inexpensive channel to communicate and exchange information with prospects and transactions with customers. Web applications are usually used from a...
| Main Authors: | Pathan, Al-Sakib Khan, Monowar, Muhammad Mostafa |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Inderscience Publishers, Switzerland
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/25388/ http://irep.iium.edu.my/25388/4/00_PATHAN.pdf |
Similar Items
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Computer science and IT today: research issues and publication tips
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Editorial
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Securing WSN with lightweight resource-efficient schemes
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Information integrity in smart grid systems
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
by: Pathan, Al-Sakib Khan, et al.
Published: (2015)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Using routers and honeypots in combination for collecting Internet worm attacks
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2014)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Processing skyline queries in incomplete database: issues,
challenges and future trends
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
The need-to-know issues for publishing books and book chapters
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
by: Mall, Dieynaba, et al.
Published: (2015)
by: Mall, Dieynaba, et al.
Published: (2015)
Security in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
A web-based approach for the KICT evaluation system
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
by: Pathan, Al-Sakib Khan, et al.
Published: (2011)
Traffic Utilization on Internet Application: Trends and Impact in Student Wireless Network
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
by: Noraniah, Abdul Aziz, et al.
Published: (2014)
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
Usability improvements for touch-screen mobile flight booking application: a case study
by: Gündüz, Feyza, et al.
Published: (2012)
by: Gündüz, Feyza, et al.
Published: (2012)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
The future of GIS on the WEB
by: Daman, Daut, et al.
Published: (2000)
by: Daman, Daut, et al.
Published: (2000)
Advancements in distributed computing and Internet technologies: trends and issues
Published: (2011)
Published: (2011)
Similar Items
-
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013) -
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012) -
Guest editorial: Special issue on integration of IoT with future Internet
by: Pathan, Al-Sakib Khan, et al.
Published: (2014) -
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013) -
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)