Overview of cross site request forgery and client-side protection
As long as internet and web application are a part of our lives to let us to live as easy as we moved like: online market, online bank, online shop and many more, it take attention of malicious to take an advantage of our easy life. Lately there are many types of attacks on web application but...
| Main Authors: | Yaakob, Razali, Joozdani, Mohsen, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Technopark Publications
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30572/ http://psasir.upm.edu.my/id/eprint/30572/1/Overview%20of%20cross%20site%20request%20forgery%20and%20client.pdf |
Similar Items
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Comparison of edge detection algorithms for texture analysis on copy-move forgery detection images
by: Idris, Bashir, et al.
Published: (2022)
by: Idris, Bashir, et al.
Published: (2022)
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
Forgery detection using Krawtchouk moments
by: Alenezi, Ahmad M., et al.
Published: (2019)
by: Alenezi, Ahmad M., et al.
Published: (2019)
The role of organizational culture in moderating the relationship between ethical reasoning and auditors’ acceding to clients’ request / Abdolreza Shafiei
by: Abdolreza, Shafiei
Published: (2017)
by: Abdolreza, Shafiei
Published: (2017)
Anti-Forgery Document Detection System (FDDS)
by: Rassem, Taha H., et al.
Published: (2018)
by: Rassem, Taha H., et al.
Published: (2018)
A sociopragmatic study of linguistic politeness in Iranian requests and apologies / Mohsen Shahrokhi
by: Shahrokhi, Mohsen
Published: (2011)
by: Shahrokhi, Mohsen
Published: (2011)
A cross-cultural study of request speech act: Iraqi and Malay students
by: Abdul Sattar, Hiba Qusay, et al.
Published: (2014)
by: Abdul Sattar, Hiba Qusay, et al.
Published: (2014)
Request strategies in Korean
by: Rue, Yong Ju, et al.
Published: (2007)
by: Rue, Yong Ju, et al.
Published: (2007)
Passive video forgery detection techniques: a survey
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
by: Abdul Wahab, Ainuddin Wahid, et al.
Published: (2014)
Halal Barcode Scanner Prototype in Android using Client Side Processing with Json Technology
by: Noor Munirah, Marzuki, et al.
Published: (2014)
by: Noor Munirah, Marzuki, et al.
Published: (2014)
Image orientation based watermarking technique in copyright protection
by: Jasim, Hend Muslim, et al.
Published: (2017)
by: Jasim, Hend Muslim, et al.
Published: (2017)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
"On a Malay world request"
by: New Straits Times
Published: (2017)
by: New Straits Times
Published: (2017)
The effects of fraud/forgery on a letter of
credit: an international perspective
by: Roslinda Mohamed Fadzil,
Published: (2000)
by: Roslinda Mohamed Fadzil,
Published: (2000)
Image splicing forgery approachs: A review and future direction
by: Ernawati, Muji, et al.
Published: (2022)
by: Ernawati, Muji, et al.
Published: (2022)
Overview of the project Cross-jurisdictional management of feral camels to protect NRM and cultural values
by: Edwards, Glenn, et al.
Published: (2008)
by: Edwards, Glenn, et al.
Published: (2008)
A model for client recommendation to a desktop grid server
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
by: Shafazand, Mohammad Yaser, et al.
Published: (2013)
Prevention and protection in land transaction: cases of forgery in relation to transfer / Amira Saryati Ridzuan, Norazreen Ab. Rahman and Nur Shaniza Shuhaimin
by: Ridzuan, Amira Saryati, et al.
Published: (2008)
by: Ridzuan, Amira Saryati, et al.
Published: (2008)
Signature Verification And Forgery Detection Including Recognition Of Courtesy Amount In Cheques
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
by: Mohd Yusof, Mohd Hafizuddin
Published: (2005)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
A study on request strategies practiced by Malaysian credit officers.
by: Wan Abdullah, Wan Narmi Aziana
Published: (2012)
by: Wan Abdullah, Wan Narmi Aziana
Published: (2012)
An overview of GIS based analysis in school siting in Malaysia
by: Abdullah, Alias, et al.
Published: (2011)
by: Abdullah, Alias, et al.
Published: (2011)
The speech act of request in the ESL classroom
by: Phanithira Thuruvan,, et al.
Published: (2017)
by: Phanithira Thuruvan,, et al.
Published: (2017)
Protection of registered proprietor in Malaysia: with special reference to fraud and forgery cases on land title registration / Ag. Danam @ Ag. Adnan Pg Bakar
by: Pg Bakar, Ag. Danam @ Ag. Adnan
Published: (2017)
by: Pg Bakar, Ag. Danam @ Ag. Adnan
Published: (2017)
A framework of classifying maintenance requests based on learning techniques
by: Mahmoodian, Naghmeh, et al.
Published: (2010)
by: Mahmoodian, Naghmeh, et al.
Published: (2010)
Text-based classification incoming maintenance requests to maintenance type
by: Mahmoodian, Naghmeh, et al.
Published: (2010)
by: Mahmoodian, Naghmeh, et al.
Published: (2010)
Portable anti forgery recognition for attendance system using fingerprint based biometric
by: Zainal, Nur Izzati, et al.
Published: (2016)
by: Zainal, Nur Izzati, et al.
Published: (2016)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Satellite image forgery detection and localization using GAN and One-Class classifier
by: Yarlagadda, S., et al.
Published: (2018)
by: Yarlagadda, S., et al.
Published: (2018)
Forgery detection in medical images using Complex Valued Neural Network (CVNN)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
CMF-iteMS: An automatic threshold selection for detection of copy-move forgery
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
by: Nor Bakiah, Abd. Warif, et al.
Published: (2019)
Protecting elderly people in Bangladesh: an overview
by: Ferdousi, Nahid
Published: (2019)
by: Ferdousi, Nahid
Published: (2019)
An epidemic based model for the predictions of OOFI in an IoT platform
by: Ibrahim, Mohammed, et al.
Published: (2020)
by: Ibrahim, Mohammed, et al.
Published: (2020)
Politeness in requests to supervisors in emails / Ali Hallajian
by: Hallajian, Ali
Published: (2014)
by: Hallajian, Ali
Published: (2014)
Collaborative caching priority for processing requests in MANETs
by: Elfaki, Mohamed Ahmed, et al.
Published: (2014)
by: Elfaki, Mohamed Ahmed, et al.
Published: (2014)
Request speech act in Malaysian Chinese Mandarin
by: Pang, Ming, et al.
Published: (2024)
by: Pang, Ming, et al.
Published: (2024)
Contribution of sell-side equity analyst reports to client’s return and stock price
efficiency: Indonesia stock market evidence
by: Ekaputra, Irwan Adi, et al.
Published: (2013)
by: Ekaputra, Irwan Adi, et al.
Published: (2013)
Splicing image forgery identification based on artificial neural network approach and texture features
by: Mohd Omar, Nur Fareha Amira
Published: (2019)
by: Mohd Omar, Nur Fareha Amira
Published: (2019)
Similar Items
-
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015) -
Comparison of edge detection algorithms for texture analysis on copy-move forgery detection images
by: Idris, Bashir, et al.
Published: (2022) -
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023) -
Forgery detection using Krawtchouk moments
by: Alenezi, Ahmad M., et al.
Published: (2019) -
The role of organizational culture in moderating the relationship between ethical reasoning and auditors’ acceding to clients’ request / Abdolreza Shafiei
by: Abdolreza, Shafiei
Published: (2017)