Virtual Machine based Autonomous Web Server
Enterprises are turning to Internet technology to circulate information, interact with potential customers and establish an e-commerce business presence. These activities are depending highly on Web server and maintaining good server security has been a requirement for avoiding any malicious at...
| Main Authors: | Mas’ud, M. Z., Abdollah, M. F., Yaacub, A. H., Ahmad, N. M., Abdul Hamid, E. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/123/ http://eprints.utem.edu.my/id/eprint/123/1/357.pdf |
Similar Items
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006)
by: Mas'ud, M. Zaki, et al.
Published: (2006)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Embedded web server
by: Ahmad, Muhammad Shukri
Published: (2004)
by: Ahmad, Muhammad Shukri
Published: (2004)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Web-Based Remote Monitoring And Controlling System Using Embedded Web Server
by: Shafie@Musa, Siti Mariam
Published: (2002)
by: Shafie@Musa, Siti Mariam
Published: (2002)
High reliability replication technique for web-server cluster systems
by: Deris, Mustafa Mat, et al.
Published: (2005)
by: Deris, Mustafa Mat, et al.
Published: (2005)
Autonomous Virtual Agent Navigation in Virtual Environments
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
Cloud web server for IoT smart laboratory system
by: Lee, Yi Ming
Published: (2022)
by: Lee, Yi Ming
Published: (2022)
Implementation of embedded web server for mobile robot system
by: Ahmad Salleh, Noor Azurati, et al.
Published: (2007)
by: Ahmad Salleh, Noor Azurati, et al.
Published: (2007)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Framework architecture on High Data Availability Server Virtualization for Disaster Recovery
by: Kassim, Murizah, et al.
Published: (2018)
by: Kassim, Murizah, et al.
Published: (2018)
Architecture for high data availibility using server virtualization for disaster recovery
by: Mohd Sahalan @ Salam, Maznifah
Published: (2015)
by: Mohd Sahalan @ Salam, Maznifah
Published: (2015)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Embedded Ethernet Web Server for a Robot Arm Control
by: Zaw, Toe Oo
Published: (2002)
by: Zaw, Toe Oo
Published: (2002)
Dempster-Shafer's Approach for Autonomous Virtual Agent Navigation in Virtual Environments.
by: Jaafar, J., et al.
Published: (2010)
by: Jaafar, J., et al.
Published: (2010)
A comparison of ontology servers
by: Ahmad, M. Nazir, et al.
Published: (2006)
by: Ahmad, M. Nazir, et al.
Published: (2006)
Performance analysis of server-side spam control strategies based on layer-3 classification
by: Marsono, M. N., et al.
Published: (2007)
by: Marsono, M. N., et al.
Published: (2007)
Overview of ontology server research
by: Ahmad, Mohamad Nazir, et al.
Published: (2007)
by: Ahmad, Mohamad Nazir, et al.
Published: (2007)
Web-based journals in the classroom: motivation and autonomous learning
by: Pollard, Andrew
Published: (2015)
by: Pollard, Andrew
Published: (2015)
Log visualization of intrusion and prevention reverse proxy server against web attacks
by: Mantoro, Teddy, et al.
Published: (2013)
by: Mantoro, Teddy, et al.
Published: (2013)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Adaptive System State Based Load Balancing For Web
Application Server Cluster Of Heterogeneous Performance Nodes
by: Lu, Chin Mei
Published: (2013)
by: Lu, Chin Mei
Published: (2013)
Adapting Traceability in Digital Forensic Investigation Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Hexapod robot for autonomous machining
by: Saleh, Tanveer, et al.
Published: (2019)
by: Saleh, Tanveer, et al.
Published: (2019)
Performance analysis of cloud-based cve communication architecture in comparison with the traditional client server, p2p and hybrid models
by: Gital, Abdulsam Ya'u, et al.
Published: (2014)
by: Gital, Abdulsam Ya'u, et al.
Published: (2014)
Performance optimization of Java virtual machine on Dual-Core Technology for web services - A Study.
by: Chong, K.M., et al.
Published: (2007)
by: Chong, K.M., et al.
Published: (2007)
An open source, server-side framework for analytical web mapping andits application to health
by: Moncrieff, Simon, et al.
Published: (2014)
by: Moncrieff, Simon, et al.
Published: (2014)
Similar Items
-
Network performance testing on VM based autonomous web server
by: Mas'ud, M. Zaki, et al.
Published: (2006) -
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010) -
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010) -
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)