Results 71 to 80 of about 8,266 (204)
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta +4 more
wiley +1 more source
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley +1 more source
Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran +2 more
doaj +1 more source
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the ...
Zhanhui Yuan +5 more
wiley +1 more source
This study presents an evaluation of Coraza Web Application Firewall (WAF) performance when integrated with two reverse proxy environments, Caddy and Envoy, which utilize the Open Web Application Security Project (OWASP) Core Rule Set version 4.15.0 ...
Michael Curipallo Martínez +4 more
doaj +1 more source
Ampliación del entorno OWASP WebGoat
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire +3 more sources
Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core
Towards a Secure Smart Grid Storage Communications Gateway
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core +1 more source
Establishing Performance Baselines for Secure Software Development
The COVID‐19 pandemic has impacted the world, prompting a shift toward remote work and stay‐at‐home economies, altering routines for individuals and businesses. Organizations have had to swiftly implement digital solutions to enable productive and efficient remote work, a trend that is becoming increasingly common.
Ying-Ti Tsai +4 more
wiley +1 more source

