K Żbikowski, P Antosiuk - Information Processing & Management, 2021 - Elsevier
Predicting the success of a business venture has always been a struggle for both practitioners and researchers. However, thanks to companies that aggregate data about …
Website fingerprinting (WFP) aims to infer information about the content of encrypted and anonymized connections by observing patterns of data flows based on the size and direction …
The study of autonomous agents has a long history in the Multiagent System and the Semantic Web communities, with applications ranging from automating business processes …
Different machine learning and deep learning-based approaches have been proposed for designing defensive mechanisms against various phishing attacks. Recently, researchers …
Modern web applications are an integral part of our digital lives. As we put more trust in web applications, the need for security increases. At the same time, detecting vulnerabilities in …
HTTP Request Smuggling (HRS) is an attack that exploits the HTTP processing discrepancies between two servers deployed in a proxy-origin configuration, allowing …
RT Fielding, RN Taylor, JR Erenkrantz… - Proceedings of the …, 2017 - dl.acm.org
Seventeen years after its initial publication at ICSE 2000, the Representational State Transfer (REST) architectural style continues to hold significance as both a guide for …
Perjuangan University is developing an information system in its campus, but the system is partially built. This has resulted in its own problems, there is no connectivity between …