Results 51 to 60 of about 8,266 (204)
The OWASP Logging Project [PDF]
The presentation explained current shortcomings of Security Information Management systems. A new solution and a working prototype were presented.
openaire +1 more source
Survey on AI Ethics: A Socio‐Technical Perspective
Abstract The past decade has observed a significant advancement in AI, with deep learning‐based models being deployed in diverse scenarios, including safety‐critical applications. As these AI systems become deeply embedded in our societal infrastructure, the repercussions of their decisions and actions have significant consequences, making the ethical ...
Dave Mbiazi +5 more
wiley +1 more source
Ciberseguridad en sitios web: auditoría de seguridad de una plataforma en línea
Vivimos en un mundo digital cada vez más dependiente de plataformas en línea donde garantizar la seguridad se ha convertido en una de las grandes dificultades del día a día. Este trabajo muestra los resultados obtenidos de una auditoría de ciberseguridad
Juan Andres Jaramillo Barreiro +2 more
doaj +1 more source
We introduce multi‐class socio‐technical congruence (MC‐STC), an extension of the widely studied socio‐technical congruence framework, to enable the assessment of coordination between contributors with different functional alignments or roles (e.g., development and security).
Roshan Namal Rajapakse, Claudia Szabo
wiley +1 more source
OWASP Top 10 Review of Vulnerability Studies in Web Application Security
In order to ensure information security, it is necessary to find the vulnerabilities and risks that exist in the resources that make up the information system.
Çisem Yaşar +2 more
doaj +1 more source
Vulnerabilidades OWASP TOP 10 - XSS
Esta presentación introduce el proyecto OWASP TOP 10, el cual agrupa las 10 vulnerabilidades web mas comunes en aplicaciones web. Adicionalmente, realiza una explicación detallada de la vulnerabilidad de tipo Injection llamada Cross-site scripting (XSS).
openaire +1 more source
Investigating the tension between cloud-related actors and individual privacy rights [PDF]
Historically, little more than lip service has been paid to the rights of individuals to act to preserve their own privacy. Personal information is frequently exploited for commercial gain, often without the person’s knowledge or permission.
Duncan, Bob +2 more
core
How Can Cryptography Secure Online Assessments Against Academic Dishonesty?
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi +2 more
wiley +1 more source
Website Security Analysis Using Vulnerability Assessment Method
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin +4 more
doaj +1 more source
Fakultas Teknik Universitas Muhammadiyah Ponorogo telah menerapkan Ujian Tengah Semester dan Ujian Akhir Semester menggunakan aplikasi Si Ujo (Sistem Ujian Online) berbasis web.
Mohammad Muhsin, Adi Fajaryanto
doaj +1 more source

