Academic literature on the topic 'ILLEGITIMATE SERVER'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ILLEGITIMATE SERVER.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "ILLEGITIMATE SERVER"
Jan, Saeed Ullah, and Fawad Qayum. "A Robust Authentication Scheme for Client-Server Architecture With Provable Security Analysis." Network and Communication Technologies 3, no. 1 (April 26, 2018): 6. http://dx.doi.org/10.5539/nct.v3n1p6.
Full textRazaque, Abdul, and Khaled Elleithy. "Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment." Journal of Communications and Computer Engineering 3, no. 1 (October 13, 2012): 15. http://dx.doi.org/10.20454/jcce.2013.426.
Full textBrindha, K., and N. Jeyanthi. "Secured Document Sharing Using Visual Cryptography in Cloud Data Storage." Cybernetics and Information Technologies 15, no. 4 (November 1, 2015): 111–23. http://dx.doi.org/10.1515/cait-2015-0058.
Full textChao, Han-Chieh, Hsin-Te Wu, and Fan-Hsun Tseng. "AIS Meets IoT: A Network Security Mechanism of Sustainable Marine Resource Based on Edge Computing." Sustainability 13, no. 6 (March 10, 2021): 3048. http://dx.doi.org/10.3390/su13063048.
Full textHaruna, Saibu Aliyu, Raphael Olufemi Akinyede, and Boyinbode Olutayo Kehinde. "NEURO-FUZZY DATA MINING SYSTEM FOR IDENTIFYING E-COMMERCE RELATED THREATS." MALAYSIAN JOURNAL OF COMPUTING 5, no. 2 (September 9, 2020): 537. http://dx.doi.org/10.24191/mjoc.v5i2.8642.
Full textPeriyasamy, A. R. Pon. "Security Issues of Firewall." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (July 30, 2017): 455. http://dx.doi.org/10.23956/ijarcsse/v7i4/0208.
Full textRazaque, Abdul, Nazerke Shaldanbayeva, Bandar Alotaibi, Munif Alotaibi, Akhmetov Murat, and Aziz Alotaibi. "Big Data Handling Approach for Unauthorized Cloud Computing Access." Electronics 11, no. 1 (January 3, 2022): 137. http://dx.doi.org/10.3390/electronics11010137.
Full textPurwoleksono, Didik Endro. "THE APPLICABILITY OF ARTICLE 4 OF ANTI-CORRUPTION LAW AND THE THEORY OF TORT." Yuridika 34, no. 1 (January 1, 2019): 21. http://dx.doi.org/10.20473/ydk.v34i1.7552.
Full textLewin, Linda. "Natural and Spurious Children in Brazilian Inheritance Law From Colony to Empire: A Methodological Essay." Americas 48, no. 3 (January 1992): 351–96. http://dx.doi.org/10.2307/1007241.
Full textBoulton, S. J., and S. P. Jackson. "Saccharomyces cerevisiae Ku70 potentiates illegitimate DNA double-strand break repair and serves as a barrier to error-prone DNA repair pathways." EMBO Journal 15, no. 18 (September 1996): 5093–103. http://dx.doi.org/10.1002/j.1460-2075.1996.tb00890.x.
Full textDissertations / Theses on the topic "ILLEGITIMATE SERVER"
DHAMA, VIKRANT. "ANALYZING SECURITY BREACH AND DATA LEAKAGE IN MOBILE APPLICATIONS USING ILLEGITIMATE SERVER CONNECTIONS." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15024.
Full textBooks on the topic "ILLEGITIMATE SERVER"
Bernhardt, Elizabeth Louise. Genevra Sforza and the Bentivoglio. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2023. http://dx.doi.org/10.5117/9789463726849.
Full textAndrade, Nathanael. Civil War. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190638818.003.0009.
Full textVarol, Ozan O. The Enemy Within. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190626013.003.0012.
Full textOkeke, Edward Chukwuemeke. Conclusion. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190611231.003.0011.
Full textBergeron, David M. The Duke of Lennox, 1574-1624. Edinburgh University Press, 2022. http://dx.doi.org/10.3366/edinburgh/9781399500449.001.0001.
Full textDelmas, Candice. Justice and Democracy. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190872199.003.0004.
Full textGleave, Robert, and István Kristó-Nagy, eds. Violence in Islamic Thought from the Qur'an to the Mongols. Edinburgh University Press, 2015. http://dx.doi.org/10.3366/edinburgh/9780748694235.001.0001.
Full textZola, Émile. The Fortune of the Rougons. Translated by Brian Nelson. Oxford University Press, 2012. http://dx.doi.org/10.1093/owc/9780199560998.001.0001.
Full textCollins, Wilkie. The Dead Secret. Edited by Ira B. Nadel. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536719.001.0001.
Full textBook chapters on the topic "ILLEGITIMATE SERVER"
Dalai, Asish Kumar, and Sanjay Kumar Jena. "Online Identification of Illegitimate Web Server Requests." In Communications in Computer and Information Science, 123–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_15.
Full textSwami, Rochak, Mayank Dave, and Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN." In Research Anthology on Combating Denial-of-Service Attacks, 248–64. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch013.
Full textSwami, Rochak, Mayank Dave, and Virender Ranga. "DDoS Attacks and Defense Mechanisms Using Machine Learning Techniques for SDN." In Security and Privacy Issues in Sensor Networks and IoT, 193–214. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0373-7.ch008.
Full textDaci, Genti, and Rezarta Jaupi. "IP Layer Client Puzzles." In Enterprise Business Modeling, Optimization Techniques, and Flexible Information Systems, 14–25. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-3946-1.ch002.
Full textMac Amhlaigh, Cormac S. "What’s Wrong with Constitutionalism? Between Cacophony and Coercion." In New Constitutional Horizons, 134—C6.N117. Oxford University PressOxford, 2022. http://dx.doi.org/10.1093/oso/9780198852339.003.0006.
Full textLenowitz, Jeffrey A. "Ratification beyond (and before) Constitutions." In Constitutional Ratification without Reason, 40–63. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780198852346.003.0002.
Full textSowjanya, K. K., K. P. B. Madavi, and G. Thahniyath. "Preserving the Privacy of Wearable IoT Device Data Using Blockchain." In Blockchain Applications in Cybersecurity Solutions, 97–116. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815080599123010009.
Full textRai, Mridu. "Kashmiris in the Hindu Rashtra." In Majoritarian State, 259–80. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190078171.003.0015.
Full textJackson, Emily. "9. Genetic Information." In Medical Law, 470–505. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198825845.003.0009.
Full textGrant, Ruth W. "Ethical and Not So Ethical Incentives." In Strings Attached. Princeton University Press, 2011. http://dx.doi.org/10.23943/princeton/9780691151601.003.0004.
Full textConference papers on the topic "ILLEGITIMATE SERVER"
Gill, Grandon. "The Predatory Journal: Victimizer or Victim?" In InSITE 2021: Informing Science + IT Education Conferences. Informing Science Institute, 2021. http://dx.doi.org/10.28945/4780.
Full textLauc, Zvonimir, and Marijana Majnarić. "EU LEGAL SYSTEM AND CLAUSULA REBUS SIC STANTIBUS." In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18352.
Full text