Results 61 to 70 of about 8,033 (189)
Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley +1 more source
Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran +2 more
doaj +1 more source
Security Risks in the Encryption of Database Connection Strings
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley +1 more source
OWASP Top 10 Review of Vulnerability Studies in Web Application Security
In order to ensure information security, it is necessary to find the vulnerabilities and risks that exist in the resources that make up the information system.
Çisem Yaşar +2 more
doaj +1 more source
MODERN TOOLS FOR SECURITY TESTING FROM OWASP
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study.
L. Uhryn, M.-V. Lyba
openaire +2 more sources
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta +4 more
wiley +1 more source
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley +1 more source
POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun +32 more
core +2 more sources

