Results 21 to 30 of about 1,234 (145)

OWASP Framework-based Network Forensics to Analyze the SQLi Attacks on Web Servers [PDF]

open access: yes, 2023
One of dangerous vulnerabilities that attack the web is SQLi. With this vulnerability, someone can obtain user data information, then change and delete that data.
Fadlil, Abdul   +2 more
core   +3 more sources

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Security Support in Continuous Deployment Pipeline [PDF]

open access: yes, 2017
Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production.
Babar, Muhammad Ali   +4 more
core   +2 more sources

Analysis of security CMS platforms by vulnerability scanners

open access: yesJournal of Computer Sciences Institute, 2020
Subject of security the most popular CMS platforms has been undertaken in the following thesis. There were introduced fundamental informations about subject CMS platforms and vulnerability scanners utilised to research.
Patryk Zamościński, Grzegorz Kozieł
doaj   +1 more source

Improving the effectiveness of web application vulnerability scanning [PDF]

open access: yes, 2019
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult.
Esposito, Damiano   +3 more
core   +1 more source

Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results

open access: yesIEEE Access, 2021
As the number of web applications and the corresponding number and sophistication of the threats increases, creating new tools that are efficient and accessible becomes essential.
Ferda Ozdemir Sonmez, Banu Gunel Kilic
doaj   +1 more source

KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches

open access: yesEngineering Reports, Volume 1, Issue 5, December 2019., 2019
Kubernetes, which is the most popular orchestration platform for Docker containers, is used widely for developing microservices and automating Docker instance life cycle administration. Because of advancements in containerization technology, a single server can run multiple services and use hardware resources more efficiently.
Chin‐Wei Tien   +4 more
wiley   +1 more source

Rancang Bangun Website Pengamanan Database E-Voting dengan Menerapkan Algoritma Rivest Shamir Adleman (RSA)

open access: yesJurnal Teknologi Informatika & Komputer, 2023
Algoritma Rivest Shamir Adleman (RSA) dapat diterapkan pada sistem pemungutan suara elektronik untuk mengenkripsi informasi pemilih dan hasil pemilu sehingga hanya orang yang berwenang yang dapat mengaksesnya.
Danis Setiawan   +2 more
doaj   +1 more source

Application‐Level Unsupervised Outlier‐Based Intrusion Detection and Prevention

open access: yesSecurity and Communication Networks, Volume 2019, Issue 1, 2019., 2019
As cyber threats are permanently jeopardizing individuals privacy and organizations’ security, there have been several efforts to empower software applications with built‐in immunity. In this paper, we present our approach to immune applications through application‐level, unsupervised, outlier‐based intrusion detection and prevention.
Omar Iraqi   +2 more
wiley   +1 more source

Analisis Kerentanan Website Mtss Al-Washliyah Bah Gunung Menggunakan Metode Open Web Application Security Project ZAP (OWASP ZAP)

open access: yesJurnal Sains dan Teknologi (JSIT), 2023
Data security on the website is very important to prevent misuse of data or information on the website. Due to the rapid progress in the field of technology and information, there are many people called hackers who misuse it for negative things, such as stealing data.
Muhammad Dimas Abdillah   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy