Results 71 to 80 of about 8,266 (204)

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering

open access: yesJournal of Software: Evolution and Process, Volume 37, Issue 2, February 2025.
ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in the past couple of decades, we are looking at a Golden Era of Quantum Computing. We are transitioning into an age of Hybrid Classical‐Quantum Computers, where the quantum computational resources are selectively harnessed for resource‐intensive tasks. On the one hand,
Vita Santa Barletta   +4 more
wiley   +1 more source

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

A Next‐Generation Approach to Airline Reservations: Integrating Cloud Microservices With AI and Blockchain for Enhanced Operational Performance

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley   +1 more source

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

PathFuzzer: Sensitive Information Flow Path‐Guided Fuzzing for Intent Vulnerabilities in Android Applications

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
Intent vulnerabilities pose a significant threat as they allow attackers to exploit unverified intent messages, leading to sensitive data leaks, privilege escalations, or unauthorized actions that compromise user privacy and system security. Fuzzing methods, as traditional Intent vulnerability detection methods, are guided by the edge coverage of the ...
Zhanhui Yuan   +5 more
wiley   +1 more source

Web Application Protection Optimization Through Coraza WAF: Performance Assessment Against OWASP Risks in Reverse Proxy Configurations

open access: yesEngineering Proceedings
This study presents an evaluation of Coraza Web Application Firewall (WAF) performance when integrated with two reverse proxy environments, Caddy and Envoy, which utilize the Open Web Application Security Project (OWASP) Core Rule Set version 4.15.0 ...
Michael Curipallo Martínez   +4 more
doaj   +1 more source

Ampliación del entorno OWASP WebGoat

open access: yes, 2011
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire   +3 more sources

Teaching Security Defense Through Web-Based Hacking at the Undergraduate Level

open access: yes, 2017
The attack surface for hackers and attackers is growing every day. Future cybersecurity professionals must have the knowledge and the skills to defend against these cyber attacks.
Wilson, Brent
core  

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Establishing Performance Baselines for Secure Software Development

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The COVID‐19 pandemic has impacted the world, prompting a shift toward remote work and stay‐at‐home economies, altering routines for individuals and businesses. Organizations have had to swiftly implement digital solutions to enable productive and efficient remote work, a trend that is becoming increasingly common.
Ying-Ti Tsai   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy