Results 31 to 40 of about 1,234 (145)

Teler Real-time HTTP Intrusion Detection at Website with Nginx Web Server

open access: yesJOIV: International Journal on Informatics Visualization, 2021
Web servers and web-based applications are now widely used, but in this case, the crime rate in cyberspace has also increased. Crime in cyberspace can occur due to the exploitation of how a system works.
Agus Tedyyana, Osman Ghazali
doaj   +1 more source

ANALISIS KEAMANAN SEBUAH DOMAIN MENGGUNAKAN OPEN WEB APPLICATION SECURITY PROJECT (OWASP) Zap

open access: yesJURNAL TEKNOLOGI TECHNOSCIENTIA, 2023
Along with the development of information technology among the wider community, information systems make it easier for people to access and search for information in the form of websites. The problem of security risk is one of the important aspects of an information system. But, security risks are somehow less priority to be considered.
Nuniek Herawati   +2 more
openaire   +1 more source

Analisis Keamanan Sistem Informasi Menggunakan Sudomy dan OWASP ZAP di Universitas Duta Bangsa Surakarta

open access: yesJurnal Komtika (Komputasi dan Informatika), 2021
Peretas saat ini tidak hanya menyerang instansi pemerintah seperti pada tahun 2019 melainkan sudah melakukan serangan ke instansi pendidikan. Hal ini sesuai dengan pantauan dan identifikasi Badan Siber dan Sandi Negara bahwa instansi pendidikan telah diserang sebanyak 38% pada tahun 2020.
Faulinda Ely Nastiti, Dedy Hariyadi
openaire   +2 more sources

ANALISIS IMPLEMENTASI NUCKLEI VULNERABILITY DAN OWASP-ZAP SCANNER UNTUK DETEKSI KERENTANAN KEAMANAN (SECURE SYSTEM) PADA PLATFORM WEB BASED

open access: yesJurnal Komputer Terapan
Web-based platform security is an important aspect that developers must consider. However, numerous developer still exhibit insufficient attention to enhancing the security level of their websites, thereby increasing the likelihood of these platforms ...
Aulia Rahman   +4 more
doaj   +1 more source

Comparative Analysis of Accuracy and Performance between Zed Attack Proxy and Burp Suite Community on Website XYZ

open access: yesSistemasi: Jurnal Sistem Informasi
Web application security is a critical aspect of protecting the confidentiality, integrity, and availability of data, where Vulnerability Assessment and Penetration Testing (VAPT) serves as a vital method within the system development lifecycle.
Wendha Alfen Pratama   +1 more
doaj   +1 more source

How Can Cryptography Secure Online Assessments Against Academic Dishonesty?

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT Popular learning platforms like Canvas LMS (Learning Management System), Moodle, and Google Forms have become widespread among university students. This research focuses on these platforms because of their significant role in modern online education.
Aarav Ashish Mehrishi   +2 more
wiley   +1 more source

Enhancing Web Application Security with Open-AppSec WAF on CDN Infrastructure

open access: yesJournal of Information Systems and Informatics
The increasing number of cyberattacks targeting web applications has made security a critical concern, with vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), Broken Authentication, and Cross-Site Request Forgery (CSRF) remaining ...
Andi Yusdar Al Imran   +2 more
doaj   +1 more source

A Next‐Generation Approach to Airline Reservations: Integrating Cloud Microservices With AI and Blockchain for Enhanced Operational Performance

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research presents a next‐generation airline reservation system that integrates cloud microservices, distributed Artificial intelligence (AI) modules, and blockchain technology to improve system efficiency, security, and customer satisfaction. The proposed architecture enhances scalability, transaction speed, and fraud prevention, while increasing ...
Biman Barua, M. Shamim Kaiser
wiley   +1 more source

Automated Vulnerability Scanning of Web Applications [PDF]

open access: yes, 2023
Cílem této práce je vytvořit nástroj či plugin, který rozšíří možnosti skenování zranitelností webových aplikací. K dosažení tohoto cíle byla provedena analýza nejpopulárnějších open-source nástrojů k automatické detekci zranitelností typu SQL injekce a ...
Oliver Šmakal
core  

СИСТЕМАТИЗАЦІЯ ТА ПОРІВНЯЛЬНИЙ АНАЛІЗ ІНСТРУМЕНТІВ АВТОМАТИЗОВАНОГО ТЕСТУВАННЯ НА ПРОНИКНЕННЯ ВЕБ-ДОДАТКІВ

open access: yesКібербезпека: освіта, наука, техніка
У статті досліджено сучасні підходи до автоматизації процесу тестування на проникнення веб-додатків. Зростання кількості та складності веб-загроз, обмеженість ресурсів на ручне тестування зумовлюють критичну потребу в ефективному використанні ...
Володимир Хома   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy