Results 61 to 70 of about 8,266 (204)
Building trust: Foundations of security, safety, and transparency in AI
Abstract This paper explores the rapidly evolving ecosystem of publicly available AI models and their potential implications on the security and safety landscape. Understanding their potential risks and vulnerabilities is crucial as AI models become increasingly prevalent.
Huzaifa Sidhpurwala +4 more
wiley +1 more source
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman +4 more
doaj +1 more source
Integrating Security Controls in DevSecOps: Challenges, Solutions, and Future Research Directions
In this paper, we conducted a systematic literature review on security controls in DevSecOps. We identified 19 challenges and 18 solutions that are reported in the literature. We also identified research gaps where future research efforts should be directed.
Maysa Sinan +2 more
wiley +1 more source
MODERN TOOLS FOR SECURITY TESTING FROM OWASP
With the development of information technology, humanity is increasingly delving into the world of gadgets, cloud technology, virtual reality, and artificial intelligence. Through web applications, we receive and distribute information, including confidential. During the pandemic, most people switched to online work and study.
L. Uhryn, M.-V. Lyba
openaire +2 more sources
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Cloud computing is significantly reshaping the computing industry built around core concepts such as virtualization, processing power, connectivity and elasticity to store and share IT resources via a broad network.
Ethelbert, Obinna +3 more
core +1 more source
Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley +1 more source
Web application security is a critical aspect of protecting the confidentiality, integrity, and availability of data, where Vulnerability Assessment and Penetration Testing (VAPT) serves as a vital method within the system development lifecycle.
Wendha Alfen Pratama +1 more
doaj +1 more source
Security Risks in the Encryption of Database Connection Strings
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
wiley +1 more source
Impact assessment for vulnerabilities in open-source software libraries
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik +2 more
core +1 more source

