Results 21 to 30 of about 1,899 (129)

Analysis of Mozambican websites : how do they protect their users? [PDF]

open access: yes, 2017
Web security is an important approach for most institutions, organizations and individuals which use or provide their services through websites. In this study, a systematic and methodical evaluation of the exposure of web servers and HTTP security ...
Spillner, Josef   +2 more
core   +1 more source

Cybersecurity, an approach via Pentesting; Ciberseguretat, una aproximació via Pentesting [PDF]

open access: yes, 2022
This work is an approach to pentesting, an area of cybersecurity that consists of attacking computer environments to discover and exploit vulnerabilities, with the ultimate goal of documenting the attack and being able to gather information about the ...
Chamero De La Rosa, Ivan
core   +2 more sources

A cybersecurity risk analysis framework for systems with artificial intelligence components

open access: yesInternational Transactions in Operational Research, Volume 33, Issue 2, Page 798-825, March 2026.
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho   +3 more
wiley   +1 more source

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

Bangkolo: Aplikasi Vulnerability Identification Berbasis Hybrid Apps [PDF]

open access: yes, 2020
Keamanan merupakan hal penting dalam sistem maupun jaringan dalam melindungi data informasi. Tingginya tingkat laporang celah keamanan dari Edgescan menunjukkan masih minimnya pengembang sistem dan jaringan dalam hal menutamakan keamanan.
Fazlurrahman, Fazlurrahman   +2 more
core   +2 more sources

Bug-Bounty, ¿el futuro del Pentesting?

open access: yesCiencia e Ingeniería Neogranadina
En el presente estudio se analiza el proceso de acorazamiento (blindaje) que se presenta en el río La Miel (Colombia), un importante río tropical regulado y fuertemente modificado en sus regímenes hidrológi- cos, hidráulicos y sedimentológicos.
Jaime Andrés Restrepo-Gómez   +1 more
doaj   +1 more source

Artificial Intelligence Web Application Firewall for advanced detection of web injection attacks

open access: yesExpert Systems, Volume 42, Issue 1, January 2025.
Abstract Currently, web services‐based applications have an important presence in public and private organizations. The vulnerabilities that these types of applications may have pose an inherent potential risk to the business model of these organizations.
Jesús‐Ángel Román‐Gallego   +3 more
wiley   +1 more source

Pruebas de penetración en aplicaciones web usando hackeo ético [PDF]

open access: yes, 2017
En este artículo se lleva a cabo un análisis de las principales pruebas de intrusión en aplicaciones web, con un breve preámbulo de lo que es el significado de Pentesting, así como de los principales ataques que puedan sufrir las aplicaciones web.
López de Jiménez, Rina Elizabeth
core  

PENTESTING VOIP PARA DETERMINAR LAS VULNERABILIDADES DEL SERVIDOR DE COMUNICACION DEL AREA DE SOPORTE DE LA EMPRESA CHAPACUETE DE LA CIUDAD DE HUÁNUCO PERIODO 2019 [PDF]

open access: yes, 2019
La investigación se enfocó que en análisis de las vulnerabilidades del servidor VOIP de la empresa Chapacuete de la ciudad de Huánuco. El proceso de pentesting consistió en la aplicación de una serie de herramientas bajo software libre para la ...
Martel Ramos, Ivan Cruz
core  

Improving the effectiveness of web application vulnerability scanning [PDF]

open access: yes, 2019
Using web application vulnerability scanners is very appealing as they promise to detect vulnerabilities with minimal configuration effort. However, using them effectively in practice is often difficult.
Esposito, Damiano   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy