Results 21 to 30 of about 1,234 (145)
OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers [PDF]
One of dangerous vulnerabilities that attack the web is SQLi. With this vulnerability, someone can obtain user data information, then change and delete that data.
Fadlil, Abdul +2 more
core +3 more sources
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar +13 more
core +2 more sources
Security Support in Continuous Deployment Pipeline [PDF]
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali +4 more
core +2 more sources
Analysis of security CMS platforms by vulnerability scanners
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj +1 more source
Improving the effectiveness of web application vulnerability scanning [PDF]
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult.
Esposito, Damiano +3 more
core +1 more source
As the number of web applications and the corresponding number and sophistication of the threats increases, creating new tools that are efficient and accessible becomes essential.
Ferda Ozdemir Sonmez, Banu Gunel Kilic
doaj +1 more source
KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration. Because of advancements in containerization technology, a single server can run multiple services and use hardware resources more efficiently.
Chin‐Wei Tien +4 more
wiley +1 more source
Algoritma Rivest Shamir Adleman (RSA) dapat diterapkan pada sistem pemungutan suara elektronik untuk mengenkripsi informasi pemilih dan hasil pemilu sehingga hanya orang yang berwenang yang dapat mengaksesnya.
Danis Setiawan +2 more
doaj +1 more source
Application‐Level Unsupervised Outlier‐Based Intrusion Detection and Prevention
As cyber threats are permanently jeopardizing individuals privacy and organizations’ security, there have been several efforts to empower software applications with built‐in immunity. In this paper, we present our approach to immune applications through application‐level, unsupervised, outlier‐based intrusion detection and prevention.
Omar Iraqi +2 more
wiley +1 more source
Data security on the website is very important to prevent misuse of data or information on the website. Due to the rapid progress in the field of technology and information, there are many people called hackers who misuse it for negative things, such as stealing data.
Muhammad Dimas Abdillah +3 more
openaire +1 more source

