Results 131 to 140 of about 8,371 (231)
Dynamic token encryption for preventing permission leakage in serverless architectures. [PDF]
Liu Y, Li F, Sun C.
europepmc +1 more source
An Internet of Medical Things Cyber Security Assessment Model (IoMT-CySAM). [PDF]
Jaidi F, Ksibi S, Bouhoula A.
europepmc +1 more source
Website Security Testing Using PTES Method and OWASP Top 10 Approach
Mochammad Yoga Firnanda +2 more
openalex +1 more source
Guia de Testes de Segurança para Iniciantes - OWASP
Teixeira de Oliveira, Michele Caroline
openalex +2 more sources
Security-oriented agile approach with AgileSafe and OWASP ASVS [PDF]
Katarzyna Łukasiewicz, Sara Cygańska
doaj +1 more source
Dissecting contact tracing apps in the Android platform [PDF]
Kouliaridis V +4 more
europepmc +2 more sources
A lightweight framework for cyber risk management in Western Balkan higher education institutions. [PDF]
Kepuska K, Tomasevic M.
europepmc +1 more source
Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology [PDF]
Bonnet, J. +15 more
core
Mobile Application Security Penetration Testing Based on OWASP [PDF]
Aide Alanda +3 more
openalex +1 more source

