Results 141 to 150 of about 8,274 (262)
Security Assessment Aplikasi Mobile Pemerintahan dengan Acuan OWASP Top 10 Mobile Risks
Dimas Febriyan Priambodo+2 more
openalex +2 more sources
Security Analysis of Web-Based Academic Information System using OWASP Framework
A The Academic Information System plays a crucial role in efficiently managing student, faculty, and campus administration data. However, system security needs to be a primary concern as it is vulnerable to cyber attacks.
Muhammad Ihya Aulia Elfatiha+2 more
semanticscholar +1 more source
TPSQLi: Test Prioritization for SQL Injection Vulnerability Detection in Web Applications
The rapid proliferation of network applications has led to a significant increase in network attacks. According to the OWASP Top 10 Projects report released in 2021, injection attacks rank among the top three vulnerabilities in software projects.
Guan-Yan Yang+6 more
doaj +1 more source
Vulnerabilities of the Open Platform Communication Unified Architecture Protocol in Industrial Internet of Things Operation. [PDF]
Shin DH, Kim GY, Euom IC.
europepmc +1 more source
Analisis Keamanan Web Samsat Menggunakan Metode OWASP
Terdapat situs web tempat masyarakat dapat berkomunikasi dan bertukar informasi antara pemerintah dan masyarakat umum. Website adalah suatu jenis media yang berisi informasi yang dapat diakses dari mana saja melalui internet dan dapat diakses dari mana saja di dunia.
Zarifah Aina Zulfan+2 more
openaire +1 more source
Penelitian ini bertujuan untuk menilai risiko keamanan aplikasi web Sistem Informasi Senat Mahasiswa di Perguruan Tinggi XYZ dengan menggunakan metode OWASP (Open Web Application Security Project) dalam kerangka Secure Software Development Life Cycle ...
Hermawan Setiawan+1 more
semanticscholar +1 more source
Research on SQL injection detection technology based on SVM
SQL injection, which has the characteristics of great harm and fast variation, has always ranked the top of the OWASP TOP 10, which has always been a hot spot in the research of web security.
Chen Zhuang, Guo Min, zhou Lin
doaj +1 more source
OWASP Zap scanning report containing all vulnerabilities detected and detailed information for those vulnerabilities.
openaire +1 more source