Results 41 to 50 of about 8,371 (231)

Security Support in Continuous Deployment Pipeline [PDF]

open access: yes, 2017
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali   +4 more
core   +2 more sources

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

OWASP TOP 10 2009 [PDF]

open access: yes, 2010
The primary aim of the OWASP Top 10 is to educate developers, designers, architects and organizations about the consequences of the most important web application security weaknesses. The Top 10 provides basic methods to protect against these high risk problem areas –and provides guidance on where to go from here.
openaire   +1 more source

Analisis Keretanan Website Dengan Aplikasi Owasp Zap

open access: yesJurnal Ilmu Komputer dan Sistem Informasi, 2023
Website security is often ignored by developers, including small websites or company profile websites that have data that may be stolen by irresponsible parties. Self-test is needed in order to find out security holes that might be attacked. Therefore, a vulnerability assessment is needed to find security holes.
null Abdul Fattah Hasibuan   +2 more
openaire   +1 more source

From rights to runtime: Privacy engineering for agentic AI

open access: yesAI Magazine, Volume 46, Issue 4, Winter 2025.
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley   +1 more source

Аналіз вразливостей великих мовних моделей

open access: yesSocial Development & Security
Мета роботи: аналіз вразливостей великих мовних моделей (LLM) на основі класифікації OWASP Top 10 для застосунків LLM, проведення оцінки потенційних загроз та розробка рекомендацій щодо підвищення рівня безпеки цих моделей.
Viktor Kolchenko   +4 more
doaj   +1 more source

Survey on AI Ethics: A Socio‐Technical Perspective

open access: yesComputational Intelligence, Volume 41, Issue 6, December 2025.
Abstract The past decade has observed a significant advancement in AI, with deep learning‐based models being deployed in diverse scenarios, including safety‐critical applications. As these AI systems become deeply embedded in our societal infrastructure, the repercussions of their decisions and actions have significant consequences, making the ethical ...
Dave Mbiazi   +5 more
wiley   +1 more source

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]

open access: yes, 2018
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier   +3 more
core   +4 more sources

Home - About - Disclaimer - Privacy