Results 61 to 70 of about 8,266 (204)

Building trust: Foundations of security, safety, and transparency in AI

open access: yesAI Magazine, Volume 46, Issue 2, Summer 2025.
Abstract This paper explores the rapidly evolving ecosystem of publicly available AI models and their potential implications on the security and safety landscape. Understanding their potential risks and vulnerabilities is crucial as AI models become increasingly prevalent.
Huzaifa Sidhpurwala   +4 more
wiley   +1 more source

ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED

open access: yesJurnal Komputer Terapan
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman   +4 more
doaj   +1 more source

Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 6, June 2025.
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan   +2 more
wiley   +1 more source

MODERN TOOLS FOR SECURITY TESTING FROM OWASP

open access: yesBulletin of Lviv State University of Life Safety, 2020
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study.
L. Uhryn, M.-V. Lyba
openaire   +2 more sources

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

open access: yes, 2017
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna   +3 more
core   +1 more source

Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments

open access: yesApplied AI Letters, Volume 6, Issue 2, April 2025.
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley   +1 more source

Comparative Analysis of Accuracy and Performance between Zed Attack Proxy and Burp Suite Community on Website XYZ

open access: yesSistemasi: Jurnal Sistem Informasi
Web application security is a critical aspect of protecting the confidentiality, integrity, and availability of data, where Vulnerability Assessment and Penetration Testing (VAPT) serves as a vital method within the system development lifecycle.
Wendha Alfen Pratama   +1 more
doaj   +1 more source

Security Risks in the Encryption of Database Connection Strings

open access: yesSoftware: Practice and Experience, Volume 55, Issue 4, Page 672-682, April 2025.
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
wiley   +1 more source

Impact assessment for vulnerabilities in open-source software libraries

open access: yes, 2015
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy