Please use this identifier to cite or link to this item: http://dspace.azjhpc.org/xmlui/handle/123456789/253
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAsadov, Akpar-
dc.date.accessioned2023-12-17T12:04:37Z-
dc.date.available2023-12-17T12:04:37Z-
dc.date.issued2023-05-11-
dc.identifier.urihttp://dspace.azjhpc.org/xmlui/handle/123456789/253-
dc.description.abstractThe aim of the research is to investigate protocol bypass attacks. Web servers are in high demand worldwide. In recent years, as the use of web servers has increased, so has the number of hacking incidents and data theft from them. In this case, hacking is a method employed by malicious actors to steal data. Web servers are typically well-protected; however, there are still numerous methods of attacking them that persist to this day.en_US
dc.language.isoenen_US
dc.publisherAzərbaycan Dövlət Neft və Sənaye Universitetien_US
dc.subjectWeb serveren_US
dc.subjectweb server securityen_US
dc.subjectprotocol bypassen_US
dc.titleDirectory Traversal Attacken_US
dc.typeBooken_US
dc.source.journaltitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.booktitle1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGYen_US
dc.source.volume1en_US
dc.source.issue1en_US
dc.source.beginpage174en_US
dc.source.endpage177en_US
dc.source.numberofpages4en_US
Appears in Collections:1st INTERNATIONAL CONFERENCE ON THE 4th INDUSTRIAL REVOLUTION AND INFORMATION TECHNOLOGY

Files in This Item:
File Description SizeFormat 
Industy_4-174-177.pdf418.48 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.