Results 81 to 90 of about 8,371 (231)

IoT Security in Healthcare: A Recent Trend and Predictive Study of SQL Injection Attacks

open access: yesThe Journal of Engineering, Volume 2025, Issue 1, January/December 2025.
Many patients are hooked on IoT medical devices nowadays. Security gaps in these devices have harmful consequences in the event of an attack, such as security breaches and risks to patient lives. However, this study identified SQL injection attacks as the most common targeting IoT devices.
Mohammed Mohammed Raoof   +2 more
wiley   +1 more source

Ampliación del entorno OWASP WebGoat

open access: yes, 2011
Los fallos de seguridad en aplicaciones software pueden causar funcionamientos erróneos no deseados, que causen daños económicos y jurídicos para los propietarios y usuarias de estas, puesto que gestionan información confidencial crítica que debe ser protegida.
openaire   +3 more sources

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
wiley   +1 more source

Analysis of security CMS platforms by vulnerability scanners

open access: yesJournal of Computer Sciences Institute, 2020
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj   +1 more source

Web Vulnerability Study of Online Pharmacy Sites [PDF]

open access: yes
Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers’ personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The
Kuzma, Joanne
core   +1 more source

Improving WAF Detection Capabilities Through Machine Learning Algorithms in Open‐Source Technologies

open access: yesSecurity and Communication Networks, Volume 2025, Issue 1, 2025.
The number of companies offering their services online has grown enormously in recent years. Customer confidence in these web applications is, therefore, vital. However, the number of attacks on these sites has also multiplied exponentially, requiring the use of new tools to prevent and defend against them.
Javier Otero-Mosquera   +4 more
wiley   +1 more source

Structural Learning of Attack Vectors for Generating Mutated XSS Attacks

open access: yes, 2010
Web applications suffer from cross-site scripting (XSS) attacks that resulting from incomplete or incorrect input sanitization. Learning the structure of attack vectors could enrich the variety of manifestations in generated XSS attacks.
Adam Kieyzun   +32 more
core   +2 more sources

Understanding The Top 10 OWASP Vulnerabilities

open access: yes, 2020
Understanding the common vulnerabilities in web applications help businesses be better prepared in protecting their data against such attacks. With the knowledge gained from research users and developers can be better equipped to deal with the most common attacks and form solutions to prevent future attacks against their web applications ...
openaire   +2 more sources

Capacidades de las metodologías de pruebas de penetración para detectar vulnerabilidades frecuentes en aplicaciones web

open access: yesRevista Cubana de Ciencias Informáticas, 2018
En el estudio se analizan las capacidades para la detección de vulnerabilidades en aplicaciones web que proponen las principales metodologías de pruebas de penetración.
Henry Raúl González Brito   +1 more
doaj  

Home - About - Disclaimer - Privacy