Results 1 to 10 of about 336 (142)

Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]

open access: yesPeerJ Computer Science
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir   +3 more
doaj   +3 more sources

A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices [PDF]

open access: yesEntropy, 2019
The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been neglected when developing applications.
Francisco José Ramírez-López   +4 more
doaj   +2 more sources

Mobile Security Risks Overview [PDF]

open access: yesInformatică economică, 2021
Engineers give careful consideration to programming configuration so they give us a smooth and advantageous experience. Individuals readily introduce versatile applications and provide individual data, yet infrequently stop to think about the protection ...
Ioan ADASCALITEI
doaj   +1 more source

Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd

open access: yesIndonesian Journal of Information Systems, 2021
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In
Ripto Mukti Wibowo, Aruji Sulaksono
doaj   +1 more source

Analisis Keamanan Website Menggunakan Standar Keamanan Open Web Application Security Project (OWASP) Studi Kasus Website Penerimaan Mahasiswa Baru Universitas Wahid Hasyim Semarang

open access: yesJurnal Informatika dan Rekayasa Perangkat Lunak, 2023
Wahid Hasyim University has a website that contains information and documents that are published and can be accessed by users. One of the most crucial websites is the New Student Admissions (PMB) website.
Ahmad Zaini, Rony Wijanarko
doaj   +1 more source

OWASP Top 10 - Do Startups Care? [PDF]

open access: yes2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2018
OWASP Top 10 - Do Startups Care?
Søhoel, Halldis M   +2 more
openaire   +4 more sources

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners

open access: yesComputers, 2023
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives.
Khaled Abdulghaffar   +2 more
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJournal of Information and Technology, 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj   +1 more source

Home - About - Disclaimer - Privacy