Results 31 to 40 of about 6,814 (243)

ZaligVinder: A generic test framework for string solvers

open access: yesJournal of Software: Evolution and Process, Volume 35, Issue 4, April 2023., 2023
The increased interest in string solving in the recent years has made it very hard to identify the right tool to address a particular user's purpose. Generally, it lacks of comparisons between the existing tools on an equal set of benchmarks, especially as a common framework to compare solvers seems to be missing.
Mitja Kulczynski   +3 more
wiley   +1 more source

Analisis Kerentanan XSS dan Rate Limiting Pada Website SMAN 8 Denpasar Menggunakan Framework OWASP ZAP

open access: yesJurnal informatika UPGRIS, 2022
Pada era digital sekarang hampir semua orang mengakses internet, Website merupakan salah satu situs yang ada di internet yang dapat menyimpan dan menyebarkan segala informasi.
Gede Angga Septiawan   +3 more
doaj   +1 more source

Smart grid security: Attacks and defence techniques

open access: yesIET Smart Grid, Volume 6, Issue 2, Page 103-123, April 2023., 2023
This study investigates cyber security threats in the smart grid and countermeasures against them and suggests future research direction for improved smart grid security. Abstract The smart grid (SG) consists of three main components, that is, Information Technology (IT), Operational Technology (OT), and Advanced Metring Infrastructure (AMI).
Yoonjib Kim, Saqib Hakak, Ali Ghorbani
wiley   +1 more source

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

open access: yesApplied Sciences, 2022
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid   +5 more
doaj   +1 more source

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐from‐home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device.
Daniela Pöhn   +2 more
wiley   +1 more source

Towards Supercomputing Categorizing the Maliciousness upon Cybersecurity Blacklists with Concept Drift

open access: yesComputational and Mathematical Methods, Volume 2023, Issue 1, 2023., 2023
In this article, we have carried out a case study to optimize the classification of the maliciousness of cybersecurity events by IP addresses using machine learning techniques. The optimization is studied focusing on time complexity. Firstly, we have used the extreme gradient boosting model, and secondly, we have parallelized the machine learning ...
M. V. Carriegos   +3 more
wiley   +1 more source

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners

open access: yesIEEE Access, 2022
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj   +1 more source

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +2 more sources

Automatic generation of threat paths in internet of things‐based systems

open access: yesIET Communications, Volume 16, Issue 20, Page 2394-2405, December 2022., 2022
Abstract Today, ‘security challenge’ is considered a commonly‐used catchword when it comes to emerging technologies such as the internet of things (IoT). Turning a blind eye to this challenge can sometimes lead to irreparable human and financial damage in everyday life.
Mohammad Ali Ramazanzadeh   +2 more
wiley   +1 more source

WAF ЗАХИСТУ ВНУТРІШНІХ СЕРВІСІВ У СТРУКТУРІ ZERO TRUST

open access: yesКібербезпека: освіта, наука, техніка, 2021
Сучасний світ висуває високі вимоги до IT-інфраструктури та комп’ютерних мереж підприємств, що обумовлює складність їх структур. Чим складніша структура і кількість ланок, що входять до неї, тим вища імовірність появи вразливих місць.
Valerii Lakhno   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy