Results 201 to 210 of about 8,371 (231)
Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents
Mohammad Fasha +4 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
2021
Abstract—Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool.It is kept up to date under the auspices of the Open Web Application Security Project (OWASP). ZAP is a web application testing framework that is both flexible and extendable. ZAP is a so-called "man-in-the-middle proxy" at its core. It runs between the tester's browser and
Karthika Suresh Babu, Jobin T.J
openaire +1 more source
Abstract—Zed Attack Proxy (ZAP) is a free, open-source penetration testing tool.It is kept up to date under the auspices of the Open Web Application Security Project (OWASP). ZAP is a web application testing framework that is both flexible and extendable. ZAP is a so-called "man-in-the-middle proxy" at its core. It runs between the tester's browser and
Karthika Suresh Babu, Jobin T.J
openaire +1 more source
Secure Web development using OWASP Guidelines
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021Website security is a major concern for large organizations as well as individual developers, the rarer the technology used the harder it becomes to come up with secure practices for developing a website. Vulnerabilities that are not fixed during development, and are deployed as such become easy targets for hackers.
Shubham Kumar Lala +2 more
openaire +1 more source
OWASP inspired mobile security
2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2015As mobile users continue to trust their devices with sensitive data, it is important to assess the applications that are responsible for securing it. Healthcare related applications are particularly unique because of their involvement with the storage of healthcare information.
Subrata Acharya +2 more
openaire +1 more source
2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), 2022
B. Kiruba +3 more
openaire +1 more source
B. Kiruba +3 more
openaire +1 more source
OWASP Security knowledge Framework
2015We will go trough the aviation industrie to see how they work and how they deal with problems they encounter. Then we show how developers can solve problems using the same methodology. This presentation will show to accomplish the same in the Software Development Life Cycle of your applications in a DevOpS environment where multiple deployments are ...
openaire +1 more source
Automatic repair of OWASP Top 10 security vulnerabilities
Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, 2020Current work on automatic program repair has not focused on actually prevalent vulnerabilities in web applications, such as described in the OWASP Top 10 categories, leading to a scarcely explored field, which in turn leads to a gap between industry needs and research efforts. In order to assess the extent of this gap, we have surveyed and analyzed the
Alexander Marchand-Melsom +1 more
openaire +1 more source
Hardening Sistem Informasi XYZ Menggunakan Framework OWASP
AUTOMATA, 2022Abstrak— Aplikasi berbasis web merupakan platform yang telah digunakan secara luas di berbagai bidang. Salah satu implementasi dari aplikasi berbasis web adalah sistem informasi akademik. Namun, dengan banyaknya penggunaan website dalam pengelolaan informasi, terdapat sebagian orang yang memanfaatkan celah keamanan untuk aktivitas ilegal.
Sya'bani, Fadila Ahmad, Rahma, Fayruz
openaire +1 more source
OWASP za vse, ne samo za razvijalce
OTS 2023 Sodobne informacijske tehnologije in storitve: Zbornik 26. konference, 2023OWASP (Open Web Worldwide Application Security Project) je mednarodna neprofitna organizacija, ki se ukvarja z izboljšanjem varnosti programske opreme. Projekt je zasnovan kot odprtokodna skupnost, ki omogoča podjetjem, razvijalcem ter posameznikom dostop do varnostnih virov in orodij.
openaire +1 more source
Ensuring Web security with OWASP methodology
Creating the Society of Consciousness, TELE-2025Currently, more and more companies, organizations, individuals (entities) operate online in the global virtual cyberspace, storing and processing enormous amounts of sensitive personal data. There are various ways to improve the security of web applications, many of which are proprietary, poorly accessible and difficult to implement.
Tudor Bragaru, Olga Darii
openaire +1 more source

