Please use this identifier to cite or link to this item: https://scholarhub.balamand.edu.lb/handle/uob/2233
DC FieldValueLanguage
dc.contributor.authorDaba, Jihad S.en_US
dc.contributor.authorJreije, Philipen_US
dc.date.accessioned2020-12-23T09:09:07Z-
dc.date.available2020-12-23T09:09:07Z-
dc.date.issued2008-
dc.identifier.urihttps://scholarhub.balamand.edu.lb/handle/uob/2233-
dc.description.abstractInternet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems- browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this paper, various types of internet security attack mechanisms are explored and it is pointed out that when different types of attacks are combined together, network security can suffer disastrous consequences.en_US
dc.format.extent2 p.en_US
dc.language.isoengen_US
dc.subjectDoS,en_US
dc.subjectInternet attacksen_US
dc.subjectRouter attacken_US
dc.subjectTrojanen_US
dc.subjectWormen_US
dc.subjectXSSen_US
dc.subject.lcshSecurityen_US
dc.subject.lcshVirusesen_US
dc.titleMechanisms of Internet Security Attacksen_US
dc.typeJournal Articleen_US
dc.contributor.affiliationDepartment of Electrical Engineeringen_US
dc.description.volume2en_US
dc.description.issue8en_US
dc.description.startpage854en_US
dc.description.endpage856en_US
dc.date.catalogued2017-11-13-
dc.description.statusPublisheden_US
dc.identifier.OlibID174916-
dc.identifier.openURLhttps://docs.google.com/viewerng/viewer?url=http://waset.org/publications/221/pdfen_US
dc.relation.ispartoftextJourmal of world academy of science engineering and technologyen_US
dc.provenance.recordsourceOliben_US
crisitem.author.parentorgFaculty of Engineering-
Appears in Collections:Department of Electrical Engineering
Show simple item record

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.