Results 151 to 160 of about 8,274 (262)

Building Robust E-learning Software Systems Using Web Technologies [PDF]

open access: yes
Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into ...
Cezar Liviu CERVINSCHI, Diana BUTUCEA
core  

Ampliación del entorno OWASP WebGoat

open access: yes, 2011
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire   +2 more sources

OWASP FOR ARTIFICIAL INTELLIGENCE (AI) AND MACHINE LEARNING (ML)

open access: yes
The rapid adoption of artificial intelligence (AI) and machine learning (ML) technologies across various sectors has brought both unprecedented opportunities and significant security challenges. As these systems increasingly influence critical decisions in healthcare, finance, and autonomous systems, understanding their vulnerabilities becomes ...
М. Myhun, V. Liedniei
openaire   +2 more sources

Dissecting contact tracing apps in the Android platform [PDF]

open access: yesPLoS One, 2021
Kouliaridis V   +4 more
europepmc   +2 more sources

Penerapan Tanda Tangan Digital dan Secure Coding berdasarkan OWASP pada Sistem E-Control Tugas Akhir

open access: yesInfo Kripto
Teknologi sangat penting dalam kehidupan manusia. Dalam bidang pendidikan, teknologi dapat mempermudah proses pendidikan. Salah satu manfaat teknologi dalam pendidikan adalah sistem e-control tugas akhir.
Dhana Arvina Alwan, Nurul Qomariasih
semanticscholar   +1 more source

Developer-oriented Web Security by Integrating Secure SDLC into IDEs

open access: yesSakarya University Journal of Computer and Information Sciences, 2018
Enterprises and organizations have difficulties to protect their web-based services against cyber-attacks. Due to increasing number of cyber-attacks, critical data including customer data, patient data etc.
Emin İslam Tatlı
doaj  

Home - About - Disclaimer - Privacy