Results 11 to 20 of about 8,033 (189)

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports
The exponential growth of the Internet has led to a dramatic rise in the use of web applications, making them integral to businesses, industries, education, financial institutions, and daily life.
Hajira Bashir   +6 more
doaj   +2 more sources

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +3 more sources

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]

open access: yes, 2017
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang   +15 more
core   +2 more sources

The Impact of IPv6 on Penetration Testing [PDF]

open access: yes, 2012
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de   +3 more
core   +4 more sources

Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating

open access: yesTeknika, 2023
Website ”XYZ” merupakan aplikasi yang mempunyai fungsi dalam layanan pembuatan dokumen kependudukan, layanan pendaftaran akses masuk, dan fitur login. Penilaian kerawanan secara berkala diperlukan untuk menjamin kehandalan dari aplikasi.
Dimas Febriyan Priambodo   +2 more
doaj   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

open access: yesApplied Sciences, 2022
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy