Results 81 to 90 of about 6,814 (243)

POINTER:a GDPR-compliant framework for human pentesting (for SMEs) [PDF]

open access: yes, 2018
Penetration tests have become a valuable tool in any organisation’s arsenal, in terms of detecting vulnerabilities in their technical defences. Many organisations now also “penetration test” their employees, assessing their resilience and ability to ...
Archibald, Jacqueline, Renaud, K.
core  

Developing a Secure Web Application Using OWASP Guidelines

open access: yesComputer and Information Science, 2009
Developing a secure Web application is very difficult task. Therefore developers need a guideline to help them to develop a secure Web application. Guideline can be used as a checklist for developer to achieve minimum standard of secure Web application.
Sedek, Khairul Anwar   +3 more
openaire   +3 more sources

Towards Secure Open Banking Architecture: An Evaluation with OWASP [PDF]

open access: yes, 2019
The European Union passed the PSD2 regulation in 2015, which gives ownership of bank accounts to the private person owning it. As a result, the term Open Banking, allowing third party providers and developers access to bank APIs, has emerged, welcoming a myriad of innovative solutions for the financial sector.
Deina Kellezi   +2 more
openaire   +2 more sources

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
wiley   +1 more source

Abnormal network packets identification using header information collected from Honeywall architecture

open access: yesJournal of Information and Telecommunication, 2023
Most devices are now connected through the Internet, so cybersecurity issues have raised concerns. This study proposes network services in a virtual environment to collect, analyze and identify network attacks with various techniques.
Kha Van Nguyen   +3 more
doaj   +1 more source

Vulnerable Open Source Dependencies: Counting Those That Matter

open access: yes, 2018
BACKGROUND: Vulnerable dependencies are a known problem in today's open-source software ecosystems because OSS libraries are highly interconnected and developers do not always update their dependencies.
Massacci, Fabio   +4 more
core   +1 more source

Security Support in Continuous Deployment Pipeline [PDF]

open access: yes, 2017
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali   +4 more
core   +2 more sources

Evolution of secure development lifecycles and maturity models in the context of hosted solutions

open access: yesJournal of Software: Evolution and Process, Volume 36, Issue 12, December 2024.
This paper analyzes how well historic and current secure development lifecycles and security maturity models support hosted solutions, by creating a comparison framework base on the MS‐SDL, Touchpoints, SAMM2, DSOMM, CSDL, and SDL2 and performing an activity relevance analysis and case study.
Felix Lange, Immanuel Kunz
wiley   +1 more source

Impact assessment for vulnerabilities in open-source software libraries

open access: yes, 2015
Software applications integrate more and more open-source software (OSS) to benefit from code reuse. As a drawback, each vulnerability discovered in bundled OSS potentially affects the application.
Plate, Henrik   +2 more
core   +1 more source

Security Analysis of the OWASP Benchmark with Julia [PDF]

open access: yes, 2017
Among the various facets of cybersecurity, software security plays a crucial role. This requires the assessment of the security of programs and web applications exposed to the external world and consequently potential targets of attacks like SQL-injections, crosssite scripting, boundary violations, and command injections.
Ferrara, Pietro   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy