Results 41 to 50 of about 8,371 (231)
Security Support in Continuous Deployment Pipeline [PDF]
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali +4 more
core +2 more sources
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire +1 more source
Analisis Keretanan Website Dengan Aplikasi Owasp Zap
Website security is often ignored by developers, including small websites or company profile websites that have data that may be stolen by irresponsible parties. Self-test is needed in order to find out security holes that might be attacked. Therefore, a vulnerability assessment is needed to find security holes.
null Abdul Fattah Hasibuan +2 more
openaire +1 more source
From rights to runtime: Privacy engineering for agentic AI
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley +1 more source
Аналіз вразливостей великих мовних моделей
Мета роботи: аналіз вразливостей великих мовних моделей (LLM) на основі класифікації OWASP Top 10 для застосунків LLM, проведення оцінки потенційних загроз та розробка рекомендацій щодо підвищення рівня безпеки цих моделей.
Viktor Kolchenko +4 more
doaj +1 more source
Survey on AI Ethics: A Socio‐Technical Perspective
Abstract The past decade has observed a significant advancement in AI, with deep learning‐based models being deployed in diverse scenarios, including safety‐critical applications. As these AI systems become deeply embedded in our societal infrastructure, the repercussions of their decisions and actions have significant consequences, making the ethical ...
Dave Mbiazi +5 more
wiley +1 more source
Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran +2 more
doaj +1 more source
Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier +3 more
core +4 more sources

