Results 81 to 90 of about 8,371 (231)
IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks
Many patients are hooked on IoT medical devices nowadays. Security gaps in these devices have harmful consequences in the event of an attack, such as security breaches and risks to patient lives. However, this study identified SQL injection attacks as the most common targeting IoT devices.
Mohammed Mohammed Raoof +2 more
wiley +1 more source
Ampliación del entorno OWASP WebGoat
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire +3 more sources
Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego +3 more
wiley +1 more source
Analysis of security CMS platforms by vulnerability scanners
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj +1 more source
Web Vulnerability Study of Online Pharmacy Sites [PDF]
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core +1 more source
Improving WAF Detection Capabilities Through Machine Learning Algorithms in Open‐Source Technologies
The number of companies offering their services online has grown enormously in recent years. Customer confidence in these web applications is, therefore, vital. However, the number of attacks on these sites has also multiplied exponentially, requiring the use of new tools to prevent and defend against them.
Javier Otero-Mosquera +4 more
wiley +1 more source
Structural Learning of Attack Vectors for Generating Mutated XSS Attacks
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun +32 more
core +2 more sources
Penerapan Keamanan Owasp Terhadap Aplikasi GTFW Pada Website Universitas Battuta
Baginda Harahap
openalex +2 more sources
Understanding The Top 10 OWASP Vulnerabilities
Understanding the common vulnerabilities in web applications help businesses be better prepared in protecting their data against such attacks. With the knowledge gained from research users and developers can be better equipped to deal with the most common attacks and form solutions to prevent future attacks against their web applications ...
openaire +2 more sources
En el estudio se analizan las capacidades para la detección de vulnerabilidades en aplicaciones web que proponen las principales metodologías de pruebas de penetración.
Henry Raúl González Brito +1 more
doaj

