Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "50c31dc4-d5da-449c-acf2-232e7678a362"}, "_deposit": {"id": "4661", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4661"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4661", "sets": ["1597824273898", "user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Nowadays, any kinds of cyber-attacks arefirstly attacked to web site and the site containsinformation about business, government andother organizations. So, the role of web pagesecurity is becoming the essential part of cybersecurity. Most of the web pages are suffered fromattacks such as Advanced Persistent Threat(APT). An APT is an extended campaigntargeted at a specific organization to achieve aclear objective. Most of the web pages havemuch vulnerability due to insecure source codes.In this paper, it will be defined web pagevulnerabilities on PHP source code. It will becollected the attacks from the scenarios. Theresult can be concluded the attack vectors via thesource code. Each level of source code can begenerated by the attributes of source code. Theseattributes can be measured in order to securesource codes and can be evaluated by measuringthe vulnerabilities metrics."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "201642.pdf", "filesize": [{"value": "110 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 110000.0, "url": {"url": "https://meral.edu.mm/record/4661/files/201642.pdf"}, "version_id": "e6d0890d-836e-4aef-a28a-f92ff433b428"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Tun Myat"}, {"subitem_authors_fullname": "Oo, Myo Myint"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/314"}, "item_title": "Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004661", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4661", "relation": {}, "relation_version_is_last": true, "title": ["Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Defensive Analysis on Web-Application Input Validation for Advanced Persistent Threat (APT) Attack `

http://hdl.handle.net/20.500.12678/0000004661
http://hdl.handle.net/20.500.12678/0000004661
fc3f10d5-fda5-471f-adb8-787653c8dd92
50c31dc4-d5da-449c-acf2-232e7678a362
None
Preview
Name / File License Actions
201642.pdf 201642.pdf (110 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:14:48.565996
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL