Results 11 to 20 of about 8,266 (204)

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports
The exponential growth of the Internet has led to a dramatic rise in the use of web applications, making them integral to businesses, industries, education, financial institutions, and daily life.
Hajira Bashir   +6 more
doaj   +2 more sources

Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners

open access: yesComputers, 2023
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives.
Khaled Abdulghaffar   +2 more
doaj   +1 more source

Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web

open access: yesJournal of Information and Technology, 2023
Dalam era digital yang semakin kompleks, situs web menjadi sasaran utama serangan oleh pihak yang tidak bertanggung jawab. Oleh karena itu, diperlukan sistem yang dapat memantau, menganalisis, dan memberikan peringatan dini terhadap aktivitas ...
Daniel Rudiaman Sijabat, Stevanus Evo
doaj   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj   +1 more source

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

Service Level Agreement-based GDPR Compliance and Security assurance in (multi)Cloud-based systems [PDF]

open access: yes, 2019
Compliance with the new European General Data Protection Regulation (Regulation (EU) 2016/679) and security assurance are currently two major challenges of Cloud-based systems.
Dominiak, Jacek   +8 more
core   +2 more sources

Security and Privacy Issues of Big Data [PDF]

open access: yes, 2015
This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy.
Moura, Jose, Serrao, Carlos
core   +2 more sources

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]

open access: yes, 2018
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core   +2 more sources

Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating

open access: yesTeknika, 2023
Website ”XYZ” merupakan aplikasi yang mempunyai fungsi dalam layanan pembuatan dokumen kependudukan, layanan pendaftaran akses masuk, dan fitur login. Penilaian kerawanan secara berkala diperlukan untuk menjamin kehandalan dari aplikasi.
Dimas Febriyan Priambodo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy