A Methodological Approach for the Security Analysis of FIWARE Technology
This paper presents the results of a security assessment of FIWARE technology. We adopted an offensive perspective to identify vulnerabilities in deploying FIWARE components in specific architecture configurations.
Juan Pablo Perata, Gustavo Betarte
doaj +1 more source
Security Testing of XYZ Website Application Using ISSAF and OWASP WSTG v4.2 Methods
The research focuses on improving the security of information systems in ABC City, specifically on the XYZ website application developed by the Communication and Informatics Office ABC to assist in governmental administration and manage various critical
Muhammad Firdaus Yusuf +3 more
doaj +1 more source
Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation. [PDF]
Shin DH, Kim GY, Euom IC.
europepmc +1 more source
Recognizing the Known Unknowns; the Interaction Between Reflective Thinking and Optimism for Uncertainty Among Software Developer's Security Perceptions. [PDF]
Ivory M +4 more
europepmc +1 more source
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
Dynamic token encryption for preventing permission leakage in serverless architectures. [PDF]
Liu Y, Li F, Sun C.
europepmc +1 more source
Dissecting contact tracing apps in the Android platform [PDF]
Kouliaridis V +4 more
europepmc +2 more sources
An Internet of Medical Things Cyber Security Assessment Model (IoMT-CySAM). [PDF]
Jaidi F, Ksibi S, Bouhoula A.
europepmc +1 more source
A lightweight framework for cyber risk management in Western Balkan higher education institutions. [PDF]
Kepuska K, Tomasevic M.
europepmc +1 more source

