Results 111 to 120 of about 8,371 (231)

Data Monetization Service Development Using Iterative Lifecycle Framework, Quality Assurance, and Open Web Application Security Project: A Case Study of a Utility Company in Indonesia

open access: yesCommIT Journal
The research aims to provide Data Monetization (DM) services for an Indonesian utility company as a pilot to generate additional revenue beyond the primary operation.
Wahyu Haris Kusuma Atmaja   +3 more
doaj   +1 more source

A Methodological Approach for the Security Analysis of FIWARE Technology

open access: yesCLEI Electronic Journal
This paper presents the results of a security assessment of FIWARE technology. We adopted an offensive perspective to identify vulnerabilities in deploying FIWARE components in specific architecture configurations.
Juan Pablo Perata, Gustavo Betarte
doaj   +1 more source

Security Testing of XYZ Website Application Using ISSAF and OWASP WSTG v4.2 Methods

open access: yesTeknika
The research focuses on improving the security of information systems in ABC City, specifically on the XYZ website application developed by the Communication and Informatics Office ABC to assist in governmental administration and manage various critical
Muhammad Firdaus Yusuf   +3 more
doaj   +1 more source

Securitatea aplicatiilor web dupa modelul OWASP

open access: yes, 2017
Aplicațiile web au devenit o nbsp;vulnerabilitate primară pentru afacerile moderne. Astăzi, activitățile nbsp;fiecărei întreprinderi depinde de tehnologiile web și Cloud. Potrivit Gartner, 80% din atacuri vizează aplicațiile web. nbsp;Adesea, aceste atacuri exploatează vulnerabilitățile atenuate în nbsp;codul aplicației.
Bulai, R., Ziaev, A.
openaire   +1 more source

HTML5 Web application security with OWASP

open access: yes, 2013
HTML5 has gained a lot of interest the last couple of years from web developers. HTML5 is the new upcoming standard for HTML set to be released in the end of 2014 (W3C). In this report HTML5 is reviewed in order to determine if it has made web applications more secure. This is done with information study and the use of experimental test cases.
Nilsson, Daniel, Åberg, Hampus
openaire   +1 more source

Pendeteksian Keamanan Website SMA Greenschool Menggunakan Metode Owasp dengan Pengujian XSS [PDF]

open access: diamond, 2022
Putri Charly   +3 more
openalex   +1 more source

LLM-Driven, Self-Improving Framework for Security Test Automation: Leveraging Karate DSL for Augmented API Resilience

open access: yesIEEE Access
Modern software architectures heavily rely on APIs, yet face significant security challenges, particularly with Broken Object Level Authorization (BOLA) vulnerabilities, which remain the most critical API security risk according to OWASP.
Emil Marian Pasca   +3 more
doaj   +1 more source

Developing a Secure Web Application Using OWASP Guidelines

open access: hybrid, 2009
Khairul Anwar Sedek   +3 more
openalex   +2 more sources

Home - About - Disclaimer - Privacy