Results 41 to 50 of about 8,266 (204)
Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang +15 more
core +2 more sources
Developing a Secure Cyberphysical System for Altitude Chambers
Altitude chambers are used to train crews of the military and civil aviation by creating a high‐altitude environment in which the vital signs of the people in the chamber are monitored to assess their health and identify symptoms that indicate there may be a physical condition that needs to be managed. Human observers monitor the process and react when
Jennifer Aguirre +4 more
wiley +1 more source
This article delves into strengthening security in critical educational infrastructures using a Red Team approach for thorough vulnerability assessments.
Isabel del Socorro Escobar Martínez +2 more
doaj +1 more source
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services.
Ilham Firman Ashari +3 more
doaj +1 more source
POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun +32 more
core +2 more sources
Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
From rights to runtime: Privacy engineering for agentic AI
Abstract Agentic AI shifts stacks from request‐response to plan‐execute. Systems no longer just answer; they act—planning tasks, calling tools, keeping memory, and changing external state. That shift moves privacy from policy docs into the runtime.
Keivan Navaie
wiley +1 more source
Аналіз вразливостей великих мовних моделей
Мета роботи: аналіз вразливостей великих мовних моделей (LLM) на основі класифікації OWASP Top 10 для застосунків LLM, проведення оцінки потенційних загроз та розробка рекомендацій щодо підвищення рівня безпеки цих моделей.
Viktor Kolchenko +4 more
doaj +1 more source
Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos +5 more
doaj +1 more source

