Results 61 to 70 of about 8,371 (231)

Vulnerabilidades OWASP TOP 10 - XSS

open access: yes, 2022
Esta presentación introduce el proyecto OWASP TOP 10, el cual agrupa las 10 vulnerabilidades web mas comunes en aplicaciones web. Adicionalmente, realiza una explicación detallada de la vulnerabilidad de tipo Injection llamada Cross-site scripting (XSS).
openaire   +1 more source

Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments

open access: yesApplied AI Letters, Volume 6, Issue 2, April 2025.
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley   +1 more source

Strengthening critical educational infrastructures: a Red Team approach and advanced vulnerability assessment methodologies

open access: yesRevista Colombiana de Tecnologías de Avanzada
This article delves into strengthening security in critical educational infrastructures using a Red Team approach for thorough vulnerability assessments.
Isabel del Socorro Escobar Martínez   +2 more
doaj   +1 more source

Security Risks in the Encryption of Database Connection Strings

open access: yesSoftware: Practice and Experience, Volume 55, Issue 4, Page 672-682, April 2025.
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley   +1 more source

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED

open access: yesJurnal Komputer Terapan
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman   +4 more
doaj   +1 more source

MODERN TOOLS FOR SECURITY TESTING FROM OWASP

open access: yesBulletin of Lviv State University of Life Safety, 2020
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study.
L. Uhryn, M.-V. Lyba
openaire   +2 more sources

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

A Next‐Generation Approach to Airline Reservations: Integrating Cloud Microservices With AI and Blockchain for Enhanced Operational Performance

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley   +1 more source

Home - About - Disclaimer - Privacy