Results 221 to 230 of about 8,274 (262)
Some of the next articles are maybe not open access.
OWASP A03 Injection Vulnerability in Web Application Development
Journal of Advanced Research in Applied Sciences and Engineering TechnologyWeb applications are crucial for businesses and individuals by providing efficient communication, collaboration, and access to services and information via browsers, boosting connectedness, productivity, and creativity in the digital era. Insecure web applications pose risks of data breaches, malware, and unauthorized access which jeopardize user ...
Lim, Phei Chin+3 more
openaire +3 more sources
Secure Web development using OWASP Guidelines
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021Website security is a major concern for large organizations as well as individual developers, the rarer the technology used the harder it becomes to come up with secure practices for developing a website. Vulnerabilities that are not fixed during development, and are deployed as such become easy targets for hackers.
Shubham Kumar Lala+2 more
openaire +2 more sources
Evaluation of Web Vulnerability Scanners Based on OWASP Benchmark [PDF]
The widespread adoption of web vulnerability scanners and their differences in effectiveness make it necessary to benchmark these scanners. Moreover, the literature lacks the comparison of the results of scanners effectiveness from different benchmarks.
Weisheng Si, Balume Mburano
openaire +1 more source
OWASP inspired mobile security
2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), 2015As mobile users continue to trust their devices with sensitive data, it is important to assess the applications that are responsible for securing it. Healthcare related applications are particularly unique because of their involvement with the storage of healthcare information.
James Marciniak+2 more
openaire +2 more sources
Automatic repair of OWASP Top 10 security vulnerabilities [PDF]
Current work on automatic program repair has not focused on actually prevalent vulnerabilities in web applications, such as described in the OWASP Top 10 categories, leading to a scarcely explored field, which in turn leads to a gap between industry needs and research efforts. In order to assess the extent of this gap, we have surveyed and analyzed the
Alexander Marchand-Melsom+1 more
openaire +1 more source
OWASP Enterprise Security API [PDF]
Bei der Entwicklung von Webanwendungen ist es unerlasslich, von Beginn an Sicherheit als eines der zentralen Entwurfsziele zu berucksichtigen. Ohne einen systematischen und ganzheitlichen Ansatz sind Schwachstellen sprichwortlich vorprogrammiert.
openaire +1 more source
2024 FORTEI-International Conference on Electrical Engineering (FORTEI-ICEE)
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto+4 more
semanticscholar +1 more source
The security of a network supports a system so that every device is in a safe condition, with secure communication, and secure access control to every asset in the IoT ecosystem.
S. Budiyanto+4 more
semanticscholar +1 more source
Mitigating the OWASP Top 10 For Large Language Models Applications using Intelligent Agents
International Conference Control and RobotsLarge Language Models (LLMs) have emerged as a transformative and disruptive technology, enabling a wide range of applications in natural language processing, machine translation, and beyond.
Mohammad Fasha+5 more
semanticscholar +1 more source
EDUMATIC: Jurnal Pendidikan Informatika
Universities, as educational institutions, are potential targets of cyber attacks. This is inevitable problem, one of which the University of Papua (UNIPA).
Candra Darmawan+2 more
semanticscholar +1 more source
Universities, as educational institutions, are potential targets of cyber attacks. This is inevitable problem, one of which the University of Papua (UNIPA).
Candra Darmawan+2 more
semanticscholar +1 more source