Results 71 to 80 of about 8,371 (231)

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

PathFuzzer: Sensitive Information Flow Path‐Guided Fuzzing for Intent Vulnerabilities in Android Applications

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the ...
Zhanhui Yuan   +5 more
wiley   +1 more source

Capacidades de detección de las herramientas de análisis de vulnerabilidades en aplicaciones web [PDF]

open access: yes, 2014
Debido al continuo incremento del número de vulnerabilidades en las aplicaciones Web, se han elaborado diversas clasificaciones para mantener organizadas estas vulnerabilidades, y también se han desarrollado herramientas para detectarlas.
García Villalba, Luis Javier   +2 more
core  

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Establishing Performance Baselines for Secure Software Development

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The COVID‐19 pandemic has impacted the world, prompting a shift toward remote work and stay‐at‐home economies, altering routines for individuals and businesses. Organizations have had to swiftly implement digital solutions to enable productive and efficient remote work, a trend that is becoming increasingly common.
Ying-Ti Tsai   +4 more
wiley   +1 more source

Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]

open access: yes
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core  

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core  

On the Resilience of Traditional AI Algorithms Toward Poisoning Attacks for Vulnerability Detection

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The complexity of implementations and the interconnection of assorted systems and devices facilitate the emergence of vulnerabilities. Detection systems are developed to fight against this security issue, being the use of artificial intelligence (AI) a common practice.
Lorena González-Manzano   +2 more
wiley   +1 more source

Web Application Protection Optimization Through Coraza WAF: Performance Assessment Against OWASP Risks in Reverse Proxy Configurations

open access: yesEngineering Proceedings
This study presents an evaluation of Coraza Web Application Firewall (WAF) performance when integrated with two reverse proxy environments, Caddy and Envoy, which utilize the Open Web Application Security Project (OWASP) Core Rule Set version 4.15.0 ...
Michael Curipallo Martínez   +4 more
doaj   +1 more source

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Home - About - Disclaimer - Privacy