Results 31 to 40 of about 8,371 (231)

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners

open access: yesIEEE Access, 2022
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj   +1 more source

Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]

open access: yes, 2017
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang   +15 more
core   +2 more sources

Penerapan Multiple Attribute Decision Making dengan Metode Simple Additive Weighting untuk Pemeringkatan Kerentanan Keamanan Website

open access: yesJurnal Elkomika, 2018
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI   +3 more
doaj   +1 more source

Vulnerable Open Source Dependencies: Counting Those That Matter

open access: yes, 2018
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio   +4 more
core   +1 more source

Web engineering security: essential elements [PDF]

open access: yes, 2007
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core   +1 more source

Peningkatan Sistem Keamanan Website Menggunakan Metode OWASP

open access: yesJurnal Ilmu Komputer dan Bisnis, 2022
Layanan website itu telah menjadi sebuah Cross-Platform yang paling sering digunakan oleh setiap orang mendapatkan informasi yang ada yang dibutuhkan. Website merupakan situs yang di publikasikan di internet dan dapat diakses oleh semua pengguna internet, sehingga sistem keamanan sangat penting untuk menjaga website tetap aman terhadap ancaman ancaman ...
Hermanto Hermanto, Haeruddin Haeruddin
openaire   +1 more source

Security Evaluation of Keycloak-Based Role-Based Access Control in Microservice Architectures Using the OWASP ASVS Framework

open access: yesJournal of Applied Informatics and Computing
The Rocket Car Wash Semarang application operates using a microservice architecture that handles sensitive information such as user identity data, transaction history, and vehicle details.
Indra Gamayanto   +2 more
doaj   +1 more source

Continuous Deployment Adoption: Insights From a Public Sector Implementation

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT Continuous deployment is a significant trend in software development, yet its adoption and potential benefits within the public sector remain under‐researched. This paper examines a case study of continuous deployment implementation in a public sector project undertaken by Solita, a software development company, for a client utilizing agile ...
Aapo Linjama, Tuomas Granlund
wiley   +1 more source

Effective Filter for Common Injection Attacks in Online Web Applications

open access: yesIEEE Access, 2021
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos   +5 more
doaj   +1 more source

Impact assessment for vulnerabilities in open-source software libraries

open access: yes, 2015
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy