Results 41 to 50 of about 8,266 (204)

Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]

open access: yes, 2017
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang   +15 more
core   +2 more sources

Developing a Secure Cyberphysical System for Altitude Chambers

open access: yesJournal of Computer Networks and Communications, Volume 2026, Issue 1, 2026.
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre   +4 more
wiley   +1 more source

Strengthening critical educational infrastructures: a Red Team approach and advanced vulnerability assessment methodologies

open access: yesRevista Colombiana de Tecnologías de Avanzada
This article delves into strengthening security in critical educational infrastructures using a Red Team approach for thorough vulnerability assessments.
Isabel del Socorro Escobar Martínez   +2 more
doaj   +1 more source

Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools

open access: yesJurnal Sisfokom, 2022
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services.
Ilham Firman Ashari   +3 more
doaj   +1 more source

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core  

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

open access: yes, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun   +32 more
core   +2 more sources

Web engineering security: essential elements [PDF]

open access: yes, 2007
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core   +1 more source

From rights to runtime: Privacy engineering for agentic AI

open access: yesAI Magazine, Volume 46, Issue 4, Winter 2025.
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley   +1 more source

Аналіз вразливостей великих мовних моделей

open access: yesSocial Development & Security
Мета роботи: аналіз вразливостей великих мовних моделей (LLM) на основі класифікації OWASP Top 10 для застосунків LLM, проведення оцінки потенційних загроз та розробка рекомендацій щодо підвищення рівня безпеки цих моделей.
Viktor Kolchenko   +4 more
doaj   +1 more source

Effective Filter for Common Injection Attacks in Online Web Applications

open access: yesIEEE Access, 2021
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy