Results 11 to 20 of about 8,033 (189)
The exponential growth of the Internet has led to a dramatic rise in the use of web applications, making them integral to businesses, industries, education, financial institutions, and daily life.
Hajira Bashir +6 more
doaj +2 more sources
Anomaly Detection for Soft Security in Cloud Based Auditing of Accounting Systems [PDF]
Postprin
Duncan, Bob, Neovius, Mats
core +1 more source
BlackWatch:increasing attack awareness within web applications [PDF]
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie +2 more
core +3 more sources
Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek +8 more
core +2 more sources
Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang +15 more
core +2 more sources
The Impact of IPv6 on Penetration Testing [PDF]
In this paper we discuss the impact the use of IPv6 has on remote penetration testing of servers and web applications. Several modifications to the penetration testing process are proposed to accommodate IPv6.
Boer, Pieter-Tjerk de +3 more
core +4 more sources
Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating
Website ”XYZ” merupakan aplikasi yang mempunyai fungsi dalam layanan pembuatan dokumen kependudukan, layanan pendaftaran akses masuk, dan fitur login. Penilaian kerawanan secara berkala diperlukan untuk menjamin kehandalan dari aplikasi.
Dimas Febriyan Priambodo +2 more
doaj +1 more source
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid +5 more
doaj +1 more source

