• Classification of Internet Security Attacks Khaleel Ahmad 1 , Shikha Verma 2 , Nitesh Kumar
  • Conference Paper




    Download 286.24 Kb.
    Pdf ko'rish
    bet1/7
    Sana01.04.2024
    Hajmi286.24 Kb.
    #184325
      1   2   3   4   5   6   7
    Bog'liq
    MTA Majmua(2021), 1, 4-Karno kartadan foydalanib mantiqiy ifodalarni minimallash, Kalendar reja algoritm, Ishchi dastur(Dasturlash I) 24.11.2021, 1 -amaliyot, 4-Lab, Yurtimiz mustaqillikga erishishidan oldin milliy urf odat, 7-8-mavzuDT larni sertifikatlashtirish, Axborotlarni izlash va ajratib olish fanidan mustaqil ish Mavzu, Abdulla Oripov O\'zbekiston (qasida), 2 lab Yarashov Diyorbek, TATU NF Hemis axborot tizimi, Algo 1-299, prezentatsiya


    See discussions, stats, and author profiles for this publication at: 
    https://www.researchgate.net/publication/262494946
    Classification of Internet Security Attacks
    Conference Paper
    · March 2011
    CITATIONS
    9
    READS
    9,242
    1 author:
    Khaleel Ahmad
    Maulana Azad National Urdu University Hyderabad India
    114
    PUBLICATIONS
    547
    CITATIONS
    SEE PROFILE
    All content following this page was uploaded by 
    Khaleel Ahmad
    on 22 May 2014.
    The user has requested enhancement of the downloaded file.


    Proceedings of the 5
    th
    National Conference; INDIACom-2011 
    Computing For Nation Development, March 10 – 11, 2011 
    Bharati Vidyapeeth’s Institute of Computer Applications and Management, New Delhi
    Copy Right © INDIACom-2011 ISSN 0973-7529 ISBN 978-93-80544-00-7 
    Classification of Internet Security Attacks
    Khaleel Ahmad
    1
    , Shikha Verma
    2
    ,
     
    Nitesh Kumar
    3
     and Jayant Shekhar

    CSE/IT Dept. S.I.T.E., Swami Vivekananda Subharti University Meerut, Uttar Pradesh, India 
    1
    khaleelamna@yahoo.co.in,
    2
    er.shikhaverma@rediffmail.com,
    3
    nitesh24kumar@gmail.com and 
    4
    jayant_shekhar@hotmail.com 
    ABSTRACT 
    In the booming era of interconnected computers, the process of 
    transaction has become a common part of each human’s life. It 
    is therefore essential to impose the internet security in order to 
    achieve the privacy from intruders and malicious users. 
    Security is considered as an integral part of internet browsing. 
    It is one of the most important quality attribute in the field of 
    networking. Due to the gradually increasing number of 
    vulnerabilities, the identification of attack is essential. Internet 
    attacks thus must be defined in order to measure security.

    Download 286.24 Kb.
      1   2   3   4   5   6   7




    Download 286.24 Kb.
    Pdf ko'rish