Results 31 to 40 of about 8,266 (204)

Security Support in Continuous Deployment Pipeline [PDF]

open access: yes, 2017
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali   +4 more
core   +2 more sources

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners

open access: yesIEEE Access, 2022
Web applications have been a significant target for successful security breaches in the last few years. They are currently secured, as a primary method, by searching for their vulnerabilities with specialized tools referred to as Web Application ...
Suliman Alazmi, Daniel Conte De Leon
doaj   +1 more source

Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]

open access: yes, 2018
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier   +3 more
core   +4 more sources

Empowering Software Engineers to Design More Secure Web Applications: Guidelines and Potential of Using LLMs as a Recommender Tool

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 2, February 2026.
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner   +5 more
wiley   +1 more source

OWASP TOP 10 2009 [PDF]

open access: yes, 2010
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire   +1 more source

Analisis Keretanan Website Dengan Aplikasi Owasp Zap

open access: yesJurnal Ilmu Komputer dan Sistem Informasi, 2023
Website security is often ignored by developers, including small websites or company profile websites that have data that may be stolen by irresponsible parties. Self-test is needed in order to find out security holes that might be attacked. Therefore, a vulnerability assessment is needed to find security holes.
null Abdul Fattah Hasibuan   +2 more
openaire   +1 more source

Vulnerable Open Source Dependencies: Counting Those That Matter

open access: yes, 2018
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio   +4 more
core   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Continuous Deployment Adoption: Insights From a Public Sector Implementation

open access: yesJournal of Software: Evolution and Process, Volume 38, Issue 1, January 2026.
ABSTRACT Continuous deployment is a significant trend in software development, yet its adoption and potential benefits within the public sector remain under‐researched. This paper examines a case study of continuous deployment implementation in a public sector project undertaken by Solita, a software development company, for a client utilizing agile ...
Aapo Linjama, Tuomas Granlund
wiley   +1 more source

Home - About - Disclaimer - Privacy