메뉴 건너뛰기




Volumn , Issue , 2009, Pages 449-453

A penetration testing method for e-Commerce authentication system security

Author keywords

Authentication system; E Commerce; Penetration testing; Program vulnerability

Indexed keywords

ACTIVE ATTACK; AUTHENTICATION SYSTEMS; E-COMMERCE; E-COMMERCE SYSTEMS; PENETRATION TESTING; SECURITY DETECTION; SECURITY ISSUES; SECURITY OF AUTHENTICATION; VARIOUS ATTACKS; VERIFICATION METHOD; VULNERABILITY ANALYSIS;

EID: 72349095448     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMeCG.2009.111     Document Type: Conference Paper
Times cited : (7)

References (12)
  • 4
    • 33644537355 scopus 로고    scopus 로고
    • Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race
    • March
    • Haiyu Hou, Gerry Dozier, Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race, Proceedings of the 2005 ACM symposium on Applied computing, March 2005.
    • (2005) Proceedings of the 2005 ACM symposium on Applied computing
    • Hou, H.1    Dozier, G.2
  • 7
    • 43249126595 scopus 로고    scopus 로고
    • Azlinah Mohamed, Constraint satisfaction problem using modified branch and bound algorithm, WSEAS Transactions on Computers, 7, Issue 1, pp. 1-7, January, 2008.
    • Azlinah Mohamed, Constraint satisfaction problem using modified branch and bound algorithm, WSEAS Transactions on Computers, Volume 7, Issue 1, pp. 1-7, January, 2008.
  • 8
    • 35048902063 scopus 로고    scopus 로고
    • C-XSC 2.0: A C++ Library for Extended Scientific Computing
    • Numerical Software with Result Verification, Springer-Verlag, Heidelberg, pp
    • Werner Hofschuster, Walter Kramer, "C-XSC 2.0: A C++ Library for Extended Scientific Computing". Numerical Software with Result Verification, Lecture Notes in Computer Science, Volume 2991/2004, Springer-Verlag, Heidelberg, pp. 15-35, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2991 , pp. 15-35
    • Hofschuster, W.1    Kramer, W.2
  • 11
    • 72349086589 scopus 로고    scopus 로고
    • LpSolver,http://lpsolve.sourceforge.net.
    • LpSolver
  • 12
    • 72349093397 scopus 로고    scopus 로고
    • Arjan van de Ven, New Security Enhancements in Red Hat Enterprise Linux v.3, update 3, Red Hat, August 2004.
    • Arjan van de Ven, New Security Enhancements in Red Hat Enterprise Linux v.3, update 3, Red Hat, August 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.