|
Reference
[1] Singh, Simon. (2003). The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Association for Computing Machinery. New York, United States.
[2] Kaplan, Andreas. (2019). Siri, Siri, in my hand: Who’s the fairest in the land? On the interpretations, illustrations, and implications of artificial intelligence. Business Horizons. India.
[3] Michael Hogan, Elaine Newton. (2015). Supplemental Information for the Interagency Report on Strategic U.S. Government Engagement in International Standardization to Achieve U.S. Objectives for Cybersecurity. NIST.
[4] Ashlock, Daniel. (2006). Evolutionary Computation for Modeling and Optimization, Springer-Verlag. New York.
[5] Banka, Almaldeen. (2019). The Risks of Cyber Attacks and their Economic Impacts: The Case of the GCC Countries. Egypt.
[6] Ali Dehghantanha, Mauro Conti, Tooska Dargahi. (2018). Cyber Threat Intelligence, George Mason University. USA.
[7] Djeffal, S. (2020). Adaptive Defense Against Adverserial Artificial Intelligence at the Edge of the Cloud using Evolutionary Algorithms, Massachusetts Institute of Technology. USA.
[8] Zeadally, S., Adi, E., Baig, Z. and Khan, I. (2020). Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity, IEEE. USA.
[9] Tekerek, A. and Bay, O. (2019). Design And Implementation Of An Artificial Intelligence-Based Web Application Firewall Model, ResearchGate. Turkey.
[10] Abdul Jawad, N. and Kurdy, M. (2019). Stock Market Price Prediction System Using Neural Networks And Genetic Algorithm, Journal of Theoretical and Applied Information Technology. Syria.
[11] Garcia, D. Lugo, A. Hemberg, E. O’Reilly, U. (2017). Investigating Coevolutionary Archive Based Genetric Algorithms on Cyber Defense Networks, Cambridge University. United Kingdom.
[12] Appelt , Dennis.(2018). A Machine Learning-Driven Evolutionary Approach for Testing Web Application Firewalls, ResearchGate.
[13] Takaesu, Isao.(2017). Automatic Generation of Injection Codes using Genetic Algorithm. MBSD.
[14] Applebaum, Simon.(2021). Signature-based and Machine-Learning-based Web Application Firewalls: A Short Survey. University of Liverpool. United Kingdom.
[15] Nguyen, H.T., Franke, K. and Petrovic, S., (2010) Towards a generic feature-selection measure for intrusion detection. In 2010 20th International Conference on Pattern Recognition (pp. 1529-1532). IEEE.
[16] Appelt, D., Nguyen, C.D., Panichella, A. and Briand, L.C., (2018) A machine-learning-driven evolutionary approach for testing Web Application Firewalls. IEEE Transactions on Reliability, 67(3), pp.733-757.
[17] Appelt, D., Nguyen, C.D. and Briand, L., (2015) Behind an application firewall, are we safe from SQL injection attacks? In 2015 IEEE 8th international conference on software testing, verification and validation (ICST) (pp. 1- 10). IEEE.
[18] Prabhudesai, P., Bhalerao, A.A. and Prabhudesai, R., (2019) Web Application Firewall: Artificial Intelligence Arc. International Research Journal of Engineering and Technology (IRJET).
[19] Torrano-Giménez, C., Perez-Villegas, A. and Alvarez, G., (2009) A self-learning anomaly-based web application firewall. In Computational Intelligence in Security for Information Systems (pp. 85-92). Springer, Berlin, Heidelberg.
[20] Nguyen, H.T., Torrano-Giménez, C., Alvarez, G., Petrović, S. and Franke, K., (2011) Application of the generic feature selection measure in detection of web attacks. In Computational Intelligence in Security for Information Systems (pp. 25-32). Springer, Berlin, Heidelberg.
[21] Folini, C. and Ristić, I., (2018) ModSecurity Handbook. The Complete Guide to the Popular Open-source Web Application Firewall. Second edition. Feisty Duck. London.
[22] Manaseer, Saher.(2018). Centralized Web Application Firewall Security System. Amman, Jordan.
[23] Thang, N.M., 2020. Improving Efficiency of Web Application Firewall to Detect Code Injection Attacks with Random Forest Method and Analysis Attributes HTTP Request. Programming and Computer Software, 46(5), pp.351-361.
[24] Moosa, A., (2010) Artificial neural network-based Web Application Firewall for SQL injection. International Journal of Computer and Information Engineering, 4(4), pp.610-619.
[25] Thomas-Reynolds, Dainya and Butakov, Sergey, (2020) Factors Affecting the Performance of Web Application Firewall. WISP 2020 Proceedings.
[26] Vartouni, A.M., Teshnehlab, M. and Kashi, S.S., (2019) Leveraging deep neural networks for anomaly-based Web Application Firewall. IET Information Security, 13(4), pp.352-361.
[27] Aldweesh, A., Derhab, A., & Emam, A. Z. (2020). Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues. Knowledge-Based Systems, 189, 105124.
[28] Prabhudesai, P., Bhalerao, A.A. and Prabhudesai, R., (2019) Web Application Firewall: Artificial Intelligence Arc. International Research Journal of Engineering and Technology (IRJET).
[29] Raikar, D., et al. (October 2012). Preventing SQL Injection Attacks Using Combinatorial Approach. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 1(8), 46- 52.
[30] Kiseon, Kim. (2020). Genetic convolutional neural network for intrusion detection systems. Researchgate.
[31] The State of Web Application Security (2011), http://www.barracudanetworks.com/ns/downloads/White_Papers/Barracuda_Web_App_Firewall_WP_Cenzic_Exec_Summary.
[32] AQTRONIX, "AQTRONIX WebKnight - Open Source Web Application Firewall (WAF) for IIS,".(2016)[online].Available:https://www.aqtronix.com/?PageID=99.
[33] Trustwave, "ModSecurity: Open Source Web Application Firewall,"(2016). [online]. Available: https://modsecurity.org.
[34] S. Prandl, M. Lazarescu, D. Pham, '"A Study of Web Application Firewall Solutions,".(2015). In: Proceedings of 11th International Conference on Information Systems Security ,Kolkata, India.
[35] I. Ristic, '"ModSecurity Handbook,".(2010). United Kingdom: Feisty Duck.
up
|