-
1by Eslahi M.; Hashim H.; Tahir N.M.“… the standard HTTP protocol to impersonate normal web traffic and bypass the current network security systems…”
Published in IEEE Symposium on Computers and Informatics, ISCI 2013 (2013)
Get full text
Conference paper -
2by Ismail N.N.S.; Warip M.N.M.; Elias S.J.; Ahmad R.B.“…. Generally, session hijacking is the attack occurs to impersonate the real resource to serve the pretended…”
Published in International Journal of Engineering and Technology(UAE) (2018)
Get full text
Article