Results 31 to 40 of about 8,371 (231)
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj +1 more source
Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang +15 more
core +2 more sources
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI +3 more
doaj +1 more source
Vulnerable Open Source Dependencies: Counting Those That Matter
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio +4 more
core +1 more source
Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
Peningkatan Sistem Keamanan Website Menggunakan Metode OWASP
Layanan website itu telah menjadi sebuah Cross-Platform yang paling sering digunakan oleh setiap orang mendapatkan informasi yang ada yang dibutuhkan. Website merupakan situs yang di publikasikan di internet dan dapat diakses oleh semua pengguna internet, sehingga sistem keamanan sangat penting untuk menjaga website tetap aman terhadap ancaman ancaman ...
Hermanto Hermanto, Haeruddin Haeruddin
openaire +1 more source
The Rocket Car Wash Semarang application operates using a microservice architecture that handles sensitive information such as user identity data, transaction history, and vehicle details.
Indra Gamayanto +2 more
doaj +1 more source
Continuous Deployment Adoption: Insights From a Public Sector Implementation
ABSTRACT Continuous deployment is a significant trend in software development, yet its adoption and potential benefits within the public sector remain under‐researched. This paper examines a case study of continuous deployment implementation in a public sector project undertaken by Solita, a software development company, for a client utilizing agile ...
Aapo Linjama, Tuomas Granlund
wiley +1 more source
Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos +5 more
doaj +1 more source
Impact assessment for vulnerabilities in open-source software libraries
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik +2 more
core +1 more source

