Results 221 to 230 of about 8,274 (262)
Some of the next articles are maybe not open access.

OWASP A03 Injection Vulnerability in Web Application Development

Journal of Advanced Research in Applied Sciences and Engineering Technology
Web applications are crucial for businesses and individuals by providing efficient communication, collaboration, and access to services and information via browsers, boosting connectedness, productivity, and creativity in the digital era. Insecure web applications pose risks of data breaches, malware, and unauthorized access which jeopardize user ...
Lim, Phei Chin   +3 more
openaire   +3 more sources

Secure Web development using OWASP Guidelines

2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021
Website security is a major concern for large organizations as well as individual developers, the rarer the technology used the harder it becomes to come up with secure practices for developing a website. Vulnerabilities that are not fixed during development, and are deployed as such become easy targets for hackers.
Shubham Kumar Lala   +2 more
openaire   +2 more sources

Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark [PDF]

open access: possible2018 26th International Conference on Systems Engineering (ICSEng), 2018
The widespread adoption of web vulnerability scanners and their differences in effectiveness make it necessary to benchmark these scanners. Moreover, the literature lacks the comparison of the results of scanners effectiveness from different benchmarks.
Weisheng Si, Balume Mburano
openaire   +1 more source

OWASP inspired mobile security

2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2015
As mobile users continue to trust their devices with sensitive data, it is important to assess the applications that are responsible for securing it. Healthcare related applications are particularly unique because of their involvement with the storage of healthcare information.
James Marciniak   +2 more
openaire   +2 more sources

Automatic repair of OWASP Top 10 security vulnerabilities [PDF]

open access: possibleProceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, 2020
Current work on automatic program repair has not focused on actually prevalent vulnerabilities in web applications, such as described in the OWASP Top 10 categories, leading to a scarcely explored field, which in turn leads to a gap between industry needs and research efforts. In order to assess the extent of this gap, we have surveyed and analyzed the
Alexander Marchand-Melsom   +1 more
openaire   +1 more source

OWASP Enterprise Security API [PDF]

open access: possibleDatenschutz und Datensicherheit - DuD, 2012
Bei der Entwicklung von Webanwendungen ist es unerlasslich, von Beginn an Sicherheit als eines der zentralen Entwurfsziele zu berucksichtigen. Ohne einen systematischen und ganzheitlichen Ansatz sind Schwachstellen sprichwortlich vorprogrammiert.
openaire   +1 more source

Vulnerability Analysis on Internet of Things (IoT) Networks using Raspberry Pi and Open Web Application Security Project (OWASP)

2024 FORTEI-International Conference on Electrical Engineering (FORTEI-ICEE)
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto   +4 more
semanticscholar   +1 more source

Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents

International Conference Control and Robots
Large Language Models (LLMs) have emerged as a transformative and disruptive technology, enabling a wide range of applications in natural language processing, machine translation, and beyond.
Mohammad Fasha   +5 more
semanticscholar   +1 more source

Penerapan Metode Vulnerability Assessment untuk Identifikasi Keamanan Website berdasarkan OWASP ID Tahun 2021

EDUMATIC: Jurnal Pendidikan Informatika
Universities, as educational institutions, are potential targets of cyber attacks. This is inevitable problem, one of which  the University of Papua (UNIPA).
Candra Darmawan   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy