Information security risks management framework–A step towards mitigating security risks in university network

C Joshi, UK Singh - Journal of Information Security and Applications, 2017 - Elsevier
Abstract Information is one of the most prominent assets for Universities and must be
protected from security breach. This paper analyzed the security threats specifically evolve …

[PDF][PDF] Information Security Risk Management Framework for University Computing Environment.

UK Singh, C Joshi - Int. J. Netw. Secur., 2017 - researchgate.net
Today's universities are on the forefront of technological advancement which makes
University'computing environment vulnerable because of its large open networks. This …

Quantitative information security risk assessment model for university computing environment

C Joshi, UK Singh - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Today's universities are on the forefront of technological advancement which makes
University's computing environment vulnerable because of its large open networks. This …

A report on CSRF security challenges & prevention techniques

P Yadav, CD Parekh - 2017 international conference on …, 2017 - ieeexplore.ieee.org
Now a days, The world wide web is becoming the town square for the global village of today
and we, the netizens of globe are becoming essential part of cyberspace. The use of Internet …

Detecting and Defending CSRF at API-Level

S Wang, C Ni, J Wang, C Nie - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Cross-Site Request Forgery (CSRF) vulnerabilities are severe web vulnerabilities since their
characteristics of extreme concealment and heavy harmfulness. However, they have …

Experimental analyses in search of effective mitigation for login cross-site request forgery

Y Shibuya, K Mwitondi, S Zargari - Cyber Defence in the Age of AI, Smart …, 2020 - Springer
Advancements in web applications and on-line services continue to stimulate business
growth and other applications across the globe. Alongside these developments are the …

A new lateral SiGe-base PNM Schottky collector bipolar transistor on SOI for non-saturating VLSI logic design

MJ Kumar, D Venkateshrao - 16th International Conference on …, 2003 - ieeexplore.ieee.org
A novel bipolar transistor structure, namely, SiGe base lateral PNM Schottky collector bipolar
transistor (SCBT) on silicon-on-insulator (SOI) substrate is explored using two-dimensional …

Preventing CSRF Attacks by Verifying Redirection Request and User Session

P Desai - National Journal of System and Information …, 2019 - search.proquest.com
These days Internet has become handy and most advanced useful technology due to use of
various electronic gadgets. Various online services provided by Internet helps the present …

[PDF][PDF] Preparing Data Sets by Using Horizontal Aggregations in SQL for Data Mining Analysis

K Sentamilselvan, SV Kumar… - i-Manager's Journal on …, 2015 - researchgate.net
Data Mining is one of the emerging fields in Research. Preparing a Data set is one of the
important tasks in data mining. To analyze data efficiently, Data Mining systems are widely …

[PDF][PDF] MODELING OF POST-INCIDENT ROOT CAUSE ANALYSIS FOR CROSS SITE REQUEST FORGERY (CSRF) ATTACK

MNBIN MUSTAFA - 2015 - psasir.upm.edu.my
With the advancement of ICT technology, especially on web technologies, people have
changes their way of doing this. Online transactions have become more popular compared …