Results 131 to 140 of about 8,274 (262)

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

HTML5 Web application security with OWASP

open access: yes, 2013
HTML5 has gained a lot of interest the last couple of years from web developers. HTML5 is the new upcoming standard for HTML set to be released in the end of 2014 (W3C). In this report HTML5 is reviewed in order to determine if it has made web applications more secure. This is done with information study and the use of experimental test cases.
Nilsson, Daniel, Åberg, Hampus
openaire   +1 more source

Analisa Risiko Pengelolaan Data, Keamanan Sistem, Dan Pengelolaan Vendor TI Di PT. X [PDF]

open access: yes, 2015
Procurement Department in PT. X is a department from a manufacturing company based in Surabaya, it provides needs of all departments in PT. X. Information Technology in Procurement is completely utilized to support the company\u27s business activities ...
Gunawan, I. (Ibnu)   +2 more
core  

Analisis Kerentanan Aplikasi Web E-commerce Berdasarkan Standar OWASP Top 10: Studi Kasus pada Situs Kopi Lampung Nusantara

open access: yesEXPERT Jurnal Manajemen Sistem Informasi dan Teknologi
– This study aims to analyze security vulnerabilities within the Kopi Lampung Nusantara e-commerce web application by employing the Open Web Application Security Project (OWASP) standards as the primary reference framework.
Agiska Ria Supriyatna   +3 more
semanticscholar   +1 more source

LLM-Driven, Self-Improving Framework for Security Test Automation: Leveraging Karate DSL for Augmented API Resilience

open access: yesIEEE Access
Modern software architectures heavily rely on APIs, yet face significant security challenges, particularly with Broken Object Level Authorization (BOLA) vulnerabilities, which remain the most critical API security risk according to OWASP.
Emil Marian Pasca   +3 more
doaj   +1 more source

ANALISIS KERENTANAN KEAMANAN WEB MENGGUNAKAN METODE OWASP DAN PTES DI WEB PEMERINTAHAN DESA XYZ

open access: hybridPower Elektronik Jurnal Orang Elektro
Attacks on web applications can result in many losses, such as theft of sensitive data and damage to an organization's reputation. Moreover, web-based applications are applications that are often used in agencies today. One of them is the XYZ village web
Rifki Muhammad Fauzi   +3 more
openalex   +3 more sources

Análisis de seguridad en redes LPWAN para dispositivos IoT

open access: yesRevista Vínculos, 2019
Este documento muestra el análisis realizado sobre la seguridad en las tecnologías LPWAN, centrando el estudio en las vulnerabilidades presentes en la tecnología Sigfox.
Cristian Arley González González   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy