Results 71 to 80 of about 6,814 (243)
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj +1 more source
Evaluating Adversarial Attacks Against Artificial Intelligence Systems in Application Deployments
This article evaluates the effectiveness and real‐world implications of adversarial attacks on AI systems in application deployments, highlighting practical vulnerabilities and proposing strategies for improved robustness and defense. ABSTRACT Businesses have invested billions into artificial intelligence (AI) applications, leading to a sharp rise in ...
Lera Leonteva
wiley +1 more source
Security Risks in the Encryption of Database Connection Strings
ABSTRACT Background There exists an important and open problem with the encrypting of database connection strings in that related connection strings start with well known identical initial sub‐strings. When these initial sub‐strings are longer than the encrypting algorithm's block size, the resulting encrypted text for related database connection ...
Ross Rannells, James H. Hill
wiley +1 more source
Indonesia yang sudah memasuki era digitalisasi membuat sektor pendidikan diharapkan mampu beradaptasi. Learning Daring kini menjadi salah satu metode pembelajaran di Indonesia.
Bagus Indra Dewangkara+3 more
doaj +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACT This article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni+2 more
wiley +1 more source
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
Fighting Against XSS Attacks. A Usability Evaluation of OWASP ESAPI Output Encoding [PDF]
Cross Site Scripting (XSS) is one of the most critical vulnerabilities exist in web applications. XSS can be prevented by encoding untrusted data that are loaded into browser content of web applications. Security Application Programming Interfaces (APIs) such as OWASP ESAPI provide output encoding functionalities for programmers to use to protect their
Wijayarathna, Chamila+2 more
openaire +4 more sources
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta+4 more
wiley +1 more source
Web Applications Vulnerability Management using a Quantitative Stochastic Risk Modeling Method [PDF]
The aim of this research is to propose a quantitative risk modeling method that reduces the guess work and uncertainty from the vulnerability and risk assessment activities of web based applications while providing users the flexibility to assess risk ...
Sergiu SECHEL
doaj +1 more source
At this time in the rapid development of technology, there must be advantages and disadvantages of a system or technology that was created. Within the scope of the website, there are also many security holes that irresponsible parties can enter.
Ditya Putri Anggraeni+2 more
doaj +1 more source