Login / Signup
Two-step hierarchical scheme for detecting detoured attacks to the web server.
Byungha Choi
Kyungsan Cho
Published in:
Comput. Sci. Inf. Syst. (2013)
Keyphrases
</>
web server
website
web pages
database server
web browser
web users
web search engines
chosen plaintext
web usage mining
network intrusion detection systems
admission control
end users
expert systems
dynamic content
web crawlers
web applications
open source
database
detecting malicious