Results 101 to 110 of about 8,371 (231)
The exponential growth of the Internet has led to a dramatic rise in the use of web applications, making them integral to businesses, industries, education, financial institutions, and daily life.
Hajira Bashir +6 more
doaj +1 more source
Deploying Secure Web Applications with OWASP Resources [PDF]
Secure applications do not just happen – they are the result of an organization deciding that they will produce secure applications. OWASP’s does not wish to force a particular approach or require an organization to pick up compliance with laws that do not affect them as every organization is different.
openaire +1 more source
Web application security is a critical aspect of modern cybersecurity, necessitating efficient and reliable vulnerability detection mechanisms. This study presents a quantitative analysis of unique web application vulnerabilities detected by four ...
Zogaj Gani +3 more
doaj +1 more source
We present a real-world dataset capturing thirty consecutive days of malicious HTTP traffic filtered and blocked by the OWASP ModSecurity Web Application Firewall (WAF) on a live production server.
Geza Lucz, Bertalan Forstner
doaj +1 more source
The Final Project Information System (SITASI) website plays a critical role in supporting academic administrative processes at the Faculty of Science and Technology, UIN Sultan Syarif Kasim Riau.
Rengga Renaldi +3 more
doaj +1 more source
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection. [PDF]
Kim J, Park J.
europepmc +1 more source
Comparative Analysis of Open-Source Tools for Conducting Static Code Analysis. [PDF]
Kuszczyński K, Walkowski M.
europepmc +1 more source
Secure Scrum: Development of Secure Software with Scrum
Nowadays, the use of agile software development methods like Scrum is common in industry and academia. Considering the current attacking landscape, it is clear that developing secure software should be a main concern in all software development projects.
Hof, Hans-Joachim, Pohl, Christoph
core
Analysis of Open Website Security Using OWASP and ISSAF Methods
Rahmad Ashar
openalex +2 more sources
Higher Education has been using web-based academic information system, for all academic administration process in this academic system such as study plan, academic transcipt, lecturers and Curriculum and student data. So that required maintenance in database and system management whith well-maintained and scheduled.
Subana, Bambang +2 more
openaire +1 more source

