Results 1 to 10 of about 8,266 (204)
Comparative evaluation of approaches & tools for effective security testing of Web applications [PDF]
It is generally accepted that adopting both static application security testing (SAST) and dynamic application security testing (DAST) approaches is vital for thorough and effective security testing.
Sana Qadir +3 more
doaj +3 more sources
A Framework to Secure the Development and Auditing of SSL Pinning in Mobile Applications: The Case of Android Devices [PDF]
The use of mobile devices has undergone rapid growth in recent years. However, on some occasions, security has been neglected when developing applications.
Francisco José Ramírez-López +4 more
doaj +2 more sources
Mapping the OWASP Top Ten to Blockchain
Abstract The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilities in blockchain systems.
exaly +2 more sources
Mobile Security Risks Overview [PDF]
Engineers give careful consideration to programming configuration so they give us a smooth and advantageous experience. Individuals readily introduce versatile applications and provide individual data, yet infrequently stop to think about the protection ...
Ioan ADASCALITEI
doaj +1 more source
Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd
Web applications are needed as a solution to the use of internet technology that can be accessed globally, capable of displaying information that is rich in content, cost effective, easy to use and can also be accessed by anyone, anytime and anywhere. In
Ripto Mukti Wibowo, Aruji Sulaksono
doaj +1 more source
Wahid Hasyim University has a website that contains information and documents that are published and can be accessed by users. One of the most crucial websites is the New Student Admissions (PMB) website.
Ahmad Zaini, Rony Wijanarko
doaj +1 more source
OWASP Top 10 - Do Startups Care? [PDF]
OWASP Top 10 - Do Startups Care?
Søhoel, Halldis M +2 more
openaire +4 more sources
BlackWatch:increasing attack awareness within web applications [PDF]
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie +2 more
core +3 more sources
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
Anomaly Detection for Soft Security in Cloud Based Auditing of Accounting Systems [PDF]
Postprin
Duncan, Bob, Neovius, Mats
core +1 more source

