Results 171 to 180 of about 8,266 (204)
Some of the next articles are maybe not open access.
Cloud computing security based on OWASP
2022 5th International Conference on Computing and Informatics (ICCI), 2022AbdulAzeez R. Alobaidi, Zinah N. Nuimi
openaire +1 more source
OWASP Top 10 -listan riittävyys kyberturvallisessa verkkosovelluskehityksessä
2023unknown ...
openaire +1 more source
Modeling the OWASP Most Critical WEB Attacks
2018The tremendous growth of the web-based applications has increased information security vulnerabilities over the Internet. The threat landscape of applications security is constantly evolving (see CVE 1. published reports 2.). The key factors in this evolution are the progress made by the attackers, the emergence of new technologies with new weaknesses,
Yassine Ayachi +3 more
openaire +1 more source
OWASP Anleitungen und Tools für Secure SDLC
Datenschutz und Datensicherheit - DuD, 2012Heutzutage ist es ist eine verstandene Wahrheit, dass Sicherheit als Prozess betrachtet werden soll und die erforderlichen Sicherheitsaktivitaten in allen Phasen von Entwicklung integriert werden sollen. In diesem Artikel werden die relevante Anleitungen und Tools, die von OWASP fur Secure SDLC-Prozesse zur Verfugung gestellt werden, in Details ...
openaire +1 more source
Prioritizing CWE/SANS and OWASP Vulnerabilities: A Network-Based Model
International Journal of Computing and Digital Systems, 2021Basim Mahmood
exaly
OWASP VULNERABILITIES SCANNING OF A PRIVATEUNIVERSITY WEBSITES
Suleyman Demirel University Bulletin Natural and Technical SciencesThe web keeps expanding and attacks continue to go upagainst the web. This paper draws on scanning the private university websitesfor The Open Web Application Security Project (OWASP) and web attackmitigation solutions. Methods for vulnerability scanning as well as mechanismsfor developing web protection will be studied.
N Abdinurova, M Galiyev, A Aitkulov
openaire +1 more source
Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)
Annals of Emerging Technologies in Computing, 2020Jinfeng Li
exaly
Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities
2023Suliman
exaly

