Results 11 to 20 of about 83 (79)
Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating
Website ”XYZ” merupakan aplikasi yang mempunyai fungsi dalam layanan pembuatan dokumen kependudukan, layanan pendaftaran akses masuk, dan fitur login. Penilaian kerawanan secara berkala diperlukan untuk menjamin kehandalan dari aplikasi.
Dimas Febriyan Priambodo +2 more
doaj +1 more source
Keamanan sistem informasi sangat penting karena hal ini berkaitan dengan data pribadi, hak akses, integritas, kerahasiaan dan ketersediaan. Sistem informasi saat ini memiliki peranan yang sangat penting baik dalam membantu tercapainya pembelajaran yang ...
Desi Dwi Cahyani +3 more
doaj +1 more source
As the number of web applications and the corresponding number and sophistication of the threats increases, creating new tools that are efficient and accessible becomes essential.
Ferda Ozdemir Sonmez, Banu Gunel Kilic
doaj +1 more source
Analysis of security CMS platforms by vulnerability scanners
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj +1 more source
Algoritma Rivest Shamir Adleman (RSA) dapat diterapkan pada sistem pemungutan suara elektronik untuk mengenkripsi informasi pemilih dan hasil pemilu sehingga hanya orang yang berwenang yang dapat mengaksesnya.
Danis Setiawan +2 more
doaj +1 more source
Application security is one of the key aspects necessary for its proper functioning. Ensuring security consists primarily in conducting regular penetration tests and checking the vulnerability of the application to various types of attacks.
Aleksandra Kondraciuk +2 more
doaj +1 more source
Teler Real-time HTTP Intrusion Detection at Website with Nginx Web Server
Web servers and web-based applications are now widely used, but in this case, the crime rate in cyberspace has also increased. Crime in cyberspace can occur due to the exploitation of how a system works.
Agus Tedyyana, Osman Ghazali
doaj +1 more source
KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration. Because of advancements in containerization technology, a single server can run multiple services and use hardware resources more efficiently.
Chin‐Wei Tien +4 more
wiley +1 more source
Application‐Level Unsupervised Outlier‐Based Intrusion Detection and Prevention
As cyber threats are permanently jeopardizing individuals privacy and organizations’ security, there have been several efforts to empower software applications with built‐in immunity. In this paper, we present our approach to immune applications through application‐level, unsupervised, outlier‐based intrusion detection and prevention.
Omar Iraqi +2 more
wiley +1 more source
Data security on the website is very important to prevent misuse of data or information on the website. Due to the rapid progress in the field of technology and information, there are many people called hackers who misuse it for negative things, such as stealing data.
Muhammad Dimas Abdillah +3 more
openaire +1 more source

