Results 111 to 120 of about 8,274 (262)

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard [PDF]

open access: green, 2021
Sarah Elder   +5 more
openalex   +1 more source

Deep Learning in Cybersecurity: A Hybrid BERT–LSTM Network for SQL Injection Attack Detection

open access: yesIET Information Security, Volume 2024, Issue 1, 2024.
In the past decade, cybersecurity has become increasingly significant, driven largely by the increase in cybersecurity threats. Among these threats, SQL injection attacks stand out as a particularly common method of cyber attack. Traditional methods for detecting these attacks mainly rely on manually defined features, making these detection outcomes ...
Yixian Liu, Yupeng Dai, Taimur Bakhshi
wiley   +1 more source

Cyber security and protection of computer systems [PDF]

open access: yesBezbednosni Dijalozi, 2017
The work presents the methods for raising awareness regarding the safety of the Internet, i.e. the safety related to the production and maintenance of the web applications in order to preserve the reputation and to prevent loss of money as well as a ...
Emilija SPASOVA KAMCEVA, Nikolco SPASOV
doaj   +1 more source

Securing Microservices‐Based IoT Networks: Real‐Time Anomaly Detection Using Machine Learning

open access: yesJournal of Computer Networks and Communications, Volume 2024, Issue 1, 2024.
Increased attention is being given to Internet of things (IoT) network security due to attempts to exploit vulnerabilities. Security techniques protecting availability, confidentiality, and information integrity have intensified as IoT devices are viewed as gateways to larger networks by malicious actors.
Maria Katherine Plazas Olaya   +3 more
wiley   +1 more source

So ein Saftladen: IT-Sicherheit in handlungsorientierten Fallbeispielen

open access: yesInformatische Bildung in Schulen
IT-Sicherheit ist ein Thema, das  immer dann in den öffentlichen Diskurs kommt, wenn Systeme gehackt oder anderweitig gestört werden. Auch in den schulischen Lehrplänen gewinnt es zunehmend an Bedeutung.
Reinhild Kokula   +6 more
doaj   +1 more source

Investigating the tension between cloud-related actors and individual privacy rights [PDF]

open access: yes, 2019
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob   +2 more
core  

An Efficient Framework for Security of Internet‐of‐Things Devices against Malicious Software Updates

open access: yesJournal of Computer Networks and Communications, Volume 2024, Issue 1, 2024.
The advent of smart cities has revolutionized urban living by providing innovative solutions, such as smart homes, smart hospitals, and smart parking. These smart applications have made life easier for people by improving infrastructure and accessibility. However, the development of smart cities also poses significant challenges for cybersecurity.
Anam Qureshi   +3 more
wiley   +1 more source

SQL Injection Detection for Web Applications Based on Elastic-Pooling CNN

open access: yesIEEE Access, 2019
An enterprise's data can be one of its most important assets and often critical to the firm's development and survival. SQL injection attack is ranked first in the top ten risks to network applications by the Open Web Application Security Project (OWASP).
Xin Xie   +4 more
doaj   +1 more source

Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP

open access: yesJISKA (Jurnal Informatika Sunan Kalijaga), 2020
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (
Imam Riadi, Rusydi Umar, Tri Lestari
doaj   +1 more source

Preventing SQL Injection through Automatic Query Sanitization with ASSIST

open access: yes, 2010
Web applications are becoming an essential part of our everyday lives. Many of our activities are dependent on the functionality and security of these applications. As the scale of these applications grows, injection vulnerabilities such as SQL injection
Gwen Salaün   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy