BlackWatch: Increasing Attack Awareness within Web Applications [PDF]
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Calum C. Hall+2 more
doaj +4 more sources
A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications [PDF]
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications.
Rajeev Kumar+5 more
doaj +2 more sources
Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS [PDF]
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal+3 more
doaj +2 more sources
Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results [PDF]
As the number of web applications and the corresponding number and sophistication of the threats increases, creating new tools that are efficient and accessible becomes essential.
Ferda Ozdemir Sonmez, Banu Gunel Kilic
doaj +2 more sources
Web Application Security Education Platform Based on OWASP API Security Project
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple ...
Muhammad Idris+2 more
doaj +3 more sources
A Survey on Web Application Security
Web application security has become real concern due to increase in attacks and data breaches. As Application becomes critical, complex and connected, the difficulty of achieving application security increases exponentially. Also there are tools and techniques to detect such attacks, threat and vulnerabilities that exist in application which developer ...
Danish Mairaj Inamdar, Shyam Gupta Prof.
openaire +3 more sources
A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Silvia TRIF, Adrian VISOIU
doaj +4 more sources
The Study on Assessment of Security Web Applications
Nowadays, technology has an important role of our life, including smart devices, social media due to the importance of security and web for interaction so it has become targeted it by cybercriminal. The growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision ...
Hammoudeh, Mohammad Ali A+3 more
openaire +5 more sources
Detection of the Security Vulnerabilities in Web Applications [PDF]
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
Marius POPA
doaj +2 more sources
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review [PDF]
Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. Web 3.0 aims to empower users by providing them with ownership and control of their data and digital ...
Bandar Alotaibi
doaj +2 more sources