Please use this identifier to cite or link to this item:
http://dspace.azjhpc.org/xmlui/handle/123456789/253
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Asadov, Akpar | - |
dc.date.accessioned | 2023-12-17T12:04:37Z | - |
dc.date.available | 2023-12-17T12:04:37Z | - |
dc.date.issued | 2023-05-11 | - |
dc.identifier.uri | http://dspace.azjhpc.org/xmlui/handle/123456789/253 | - |
dc.description.abstract | The aim of the research is to investigate protocol bypass attacks. Web servers are in high demand worldwide. In recent years, as the use of web servers has increased, so has the number of hacking incidents and data theft from them. In this case, hacking is a method employed by malicious actors to steal data. Web servers are typically well-protected; however, there are still numerous methods of attacking them that persist to this day. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Azərbaycan Dövlət Neft və Sənaye Universiteti | en_US |
dc.subject | Web server | en_US |
dc.subject | web server security | en_US |
dc.subject | protocol bypass | en_US |
dc.title | Directory Traversal Attack | en_US |
dc.type | Book | en_US |
dc.source.journaltitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.booktitle | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY | en_US |
dc.source.volume | 1 | en_US |
dc.source.issue | 1 | en_US |
dc.source.beginpage | 174 | en_US |
dc.source.endpage | 177 | en_US |
dc.source.numberofpages | 4 | en_US |
Appears in Collections: | 1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Industy_4-174-177.pdf | 418.48 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.