Yayın: Web application attack detection and forensics: A survey
| dc.contributor.author | Babiker, Mohammed | |
| dc.contributor.author | Hoşcan, Yaşar | |
| dc.contributor.author | Yaşar Hoşcan | |
| dc.contributor.orcid | 0000-0002-3595-8783 | |
| dc.contributor.orcid | 0000-0003-0789-6025 | |
| dc.date.accessioned | 2025-11-13T10:05:57Z | |
| dc.date.issued | 2018-03-01 | |
| dc.identifier.doi | https://doi.org/10.1109/isdfs.2018.8355378 | |
| dc.identifier.openalex | W2800005718 | |
| dc.identifier.uri | https://hdl.handle.net/11421/3115 | |
| dc.identifier.uri | https://doi.org/10.1109/isdfs.2018.8355378 | |
| dc.language.iso | en | |
| dc.rights | restrictedAccess | |
| dc.subject | Honeypot | |
| dc.subject | Computer science | |
| dc.subject | Network forensics | |
| dc.subject | Digital forensics | |
| dc.subject | Computer security | |
| dc.subject | Intrusion detection system | |
| dc.subject | Web application | |
| dc.subject | Web application security | |
| dc.subject | Anomaly detection | |
| dc.subject | Computer forensics | |
| dc.subject | World Wide Web | |
| dc.subject | The Internet | |
| dc.subject | Web development | |
| dc.subject | Data mining | |
| dc.title | Web application attack detection and forensics: A survey | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5051050124 | |
| local.authorid.openalex | A5057137622 |
