Results 81 to 90 of about 8,033 (189)

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering, Volume 2025, Issue 1, January/December 2025.
Many patients are hooked on IoT medical devices nowadays. Security gaps in these devices have harmful consequences in the event of an attack, such as security breaches and risks to patient lives. However, this study identified SQL injection attacks as the most common targeting IoT devices.
Mohammed Mohammed Raoof   +2 more
wiley   +1 more source

Analysis of security CMS platforms by vulnerability scanners

open access: yesJournal of Computer Sciences Institute, 2020
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj   +1 more source

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
wiley   +1 more source

So ein Saftladen: IT-Sicherheit in handlungsorientierten Fallbeispielen

open access: yesInformatische Bildung in Schulen
IT-Sicherheit ist ein Thema, das  immer dann in den öffentlichen Diskurs kommt, wenn Systeme gehackt oder anderweitig gestört werden. Auch in den schulischen Lehrplänen gewinnt es zunehmend an Bedeutung.
Reinhild Kokula   +6 more
doaj   +1 more source

Understanding The Top 10 OWASP Vulnerabilities

open access: yes, 2020
Understanding the common vulnerabilities in web applications help businesses be better prepared in protecting their data against such attacks. With the knowledge gained from research users and developers can be better equipped to deal with the most common attacks and form solutions to prevent future attacks against their web applications ...
openaire   +2 more sources

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Capacidades de las metodologías de pruebas de penetración para detectar vulnerabilidades frecuentes en aplicaciones web

open access: yesRevista Cubana de Ciencias Informáticas, 2018
En el estudio se analizan las capacidades para la detección de vulnerabilidades en aplicaciones web que proponen las principales metodologías de pruebas de penetración.
Henry Raúl González Brito   +1 more
doaj  

Evaluation Framework for False Positives in Open-Source WAFs Based on OWASP CRS Paranoia Levels: A Systematic Approach for Comparative Measurement

open access: yesEngineering Proceedings
This work presents a systematic and modular framework to evaluate the detection of false positives (FPs) in open-source Web Application Firewalls (WAFs), implementing the OWASP Core Rule Set (CRS) and considering four different paranoia levels (PL1–PL4).
Aldrin Reyes Narváez   +5 more
doaj   +1 more source

Mapping the OWASP Top Ten to Blockchain

open access: yesProcedia Computer Science, 2020
Abstract The OWASP Top Ten List is a widely-recognized tool for identifying vulnerabilities in web applications. Since blockchain-specific security guidance is currently lacking, mapping existing frameworks, such as OWASP, to the blockchain can help in the identification of potential vulnerabilities in blockchain systems.
openaire   +1 more source

Metodología de validación de herramientas para la seguridad en dispositivos móviles

open access: yesMaskana, 2017
Los usuarios de dispositivos de telefonía móvil celular requieren información actualizada en tiempo real y aplicaciones para satisfacer distintas necesidades.
Daysi Erreyes, Diego Ponce
doaj  

Home - About - Disclaimer - Privacy