Results 51 to 60 of about 8,033 (189)

Analisis Celah Keamanan dan Mitigasi Website E-learning Itera Menggunakan Owasp Zed Attack Proxy

open access: yesDinamika Rekayasa, 2023
Website kuliah atau E-Learning ITERA merupakan sistem yang mewadahi proses belajar mengajar antara dosen dan mahasiswa. Keamanan informasi dari sistem ini sangat penting mengingat banyaknya data terkait nilai ataupun materi perkuliahan yang ada pada ...
Ilham Firman Ashari   +3 more
doaj   +1 more source

The OWASP Logging Project [PDF]

open access: yes, 2010
The presentation explained current shortcomings of Security Information Management systems. A new solution and a working prototype were presented.
openaire   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED

open access: yesJurnal Komputer Terapan
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman   +4 more
doaj   +1 more source

Mayall:a framework for desktop JavaScript auditing and post-exploitation analysis [PDF]

open access: yes, 2018
Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications ...
Bellekens, Xavier   +3 more
core   +4 more sources

Building trust: Foundations of security, safety, and transparency in AI

open access: yesAI Magazine, Volume 46, Issue 2, Summer 2025.
Abstract This paper explores the rapidly evolving ecosystem of publicly available AI models and their potential implications on the security and safety landscape. Understanding their potential risks and vulnerabilities is crucial as AI models become increasingly prevalent.
Huzaifa Sidhpurwala   +4 more
wiley   +1 more source

Аналіз вразливостей великих мовних моделей

open access: yesSocial Development & Security
Мета роботи: аналіз вразливостей великих мовних моделей (LLM) на основі класифікації OWASP Top 10 для застосунків LLM, проведення оцінки потенційних загроз та розробка рекомендацій щодо підвищення рівня безпеки цих моделей.
Viktor Kolchenko   +4 more
doaj   +1 more source

Vulnerabilidades OWASP TOP 10 - XSS

open access: yes, 2022
Esta presentación introduce el proyecto OWASP TOP 10, el cual agrupa las 10 vulnerabilidades web mas comunes en aplicaciones web. Adicionalmente, realiza una explicación detallada de la vulnerabilidad de tipo Injection llamada Cross-site scripting (XSS).
openaire   +1 more source

Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 6, June 2025.
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan   +2 more
wiley   +1 more source

Ciberseguridad en sitios web: auditoría de seguridad de una plataforma en línea

open access: yesInformática y Sistemas
Vivimos en un mundo digital cada vez más dependiente de plataformas en línea donde garantizar la seguridad se ha convertido en una de las grandes dificultades del día a día. Este trabajo muestra los resultados obtenidos de una auditoría de ciberseguridad
Juan Andres Jaramillo Barreiro   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy