Results 201 to 210 of about 8,371 (231)

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

open access: green
Mohammad Fasha   +4 more
openalex   +1 more source

Owasp Zed Attack Proxy

2021
Abstract—Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool.It is kept up to date under the auspices of the Open Web Application Security Project (OWASP). ZAP is a web application testing framework that is both flexible and extendable. ZAP is a so-called "man-in-the-middle proxy" at its core. It runs between the tester's browser and
Karthika Suresh Babu, Jobin T.J
openaire   +1 more source

Secure Web development using OWASP Guidelines

2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021
Website security is a major concern for large organizations as well as individual developers, the rarer the technology used the harder it becomes to come up with secure practices for developing a website. Vulnerabilities that are not fixed during development, and are deployed as such become easy targets for hackers.
Shubham Kumar Lala   +2 more
openaire   +1 more source

OWASP inspired mobile security

2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2015
As mobile users continue to trust their devices with sensitive data, it is important to assess the applications that are responsible for securing it. Healthcare related applications are particularly unique because of their involvement with the storage of healthcare information.
Subrata Acharya   +2 more
openaire   +1 more source

OWASP Attack Prevention

2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), 2022
B. Kiruba   +3 more
openaire   +1 more source

OWASP Security knowledge Framework

2015
We will go trough the aviation industrie to see how they work and how they deal with problems they encounter. Then we show how developers can solve problems using the same methodology. This presentation will show to accomplish the same in the Software Development Life Cycle of your applications in a DevOpS environment where multiple deployments are ...
openaire   +1 more source

Automatic repair of OWASP Top 10 security vulnerabilities

Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, 2020
Current work on automatic program repair has not focused on actually prevalent vulnerabilities in web applications, such as described in the OWASP Top 10 categories, leading to a scarcely explored field, which in turn leads to a gap between industry needs and research efforts. In order to assess the extent of this gap, we have surveyed and analyzed the
Alexander Marchand-Melsom   +1 more
openaire   +1 more source

Hardening Sistem Informasi XYZ Menggunakan Framework OWASP

AUTOMATA, 2022
Abstrak— Aplikasi berbasis web merupakan platform yang telah digunakan secara luas di berbagai bidang. Salah satu implementasi dari aplikasi berbasis web adalah sistem informasi akademik. Namun, dengan banyaknya penggunaan website dalam pengelolaan informasi, terdapat sebagian orang yang memanfaatkan celah keamanan untuk aktivitas ilegal.
Sya'bani, Fadila Ahmad, Rahma, Fayruz
openaire   +1 more source

OWASP za vse, ne samo za razvijalce

OTS 2023 Sodobne informacijske tehnologije in storitve: Zbornik 26. konference, 2023
OWASP (Open Web Worldwide Application Security Project) je mednarodna neprofitna organizacija, ki se ukvarja z izboljšanjem varnosti programske opreme. Projekt je zasnovan kot odprtokodna skupnost, ki omogoča podjetjem, razvijalcem ter posameznikom dostop do varnostnih virov in orodij.
openaire   +1 more source

Ensuring Web security with OWASP methodology

Creating the Society of Consciousness, TELE-2025
Currently, more and more companies, organizations, individuals (entities) operate online in the global virtual cyberspace, storing and processing enormous amounts of sensitive personal data. There are various ways to improve the security of web applications, many of which are proprietary, poorly accessible and difficult to implement.
Tudor Bragaru, Olga Darii
openaire   +1 more source

Home - About - Disclaimer - Privacy