Results 1 to 10 of about 1,281,108 (372)

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yesFuture Internet, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +4 more sources

A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions

open access: yesApplied Sciences, 2022
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid   +5 more
doaj   +2 more sources

A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications [PDF]

open access: goldIEEE Access, 2020
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications.
Rajeev Kumar   +5 more
doaj   +2 more sources

Security Scanner For Web Applications Case Study: Learning Management System [PDF]

open access: yesJOIN: Jurnal Online Informatika, 2020
In software engineering, web applications are software that are accessed using a web browser through a network such as the Internet or intranet. Web applications are applications that can be relied on by users to do many useful activities.
Andrian, Rian, Fauzi, Ahmad
core   +4 more sources

Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review. [PDF]

open access: yesSensors (Basel)
Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. Web 3.0 aims to empower users by providing them with ownership and control of their data and digital ...
Alotaibi B.
europepmc   +2 more sources

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]

open access: yesInformatică economică, 2011
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Adrian VISOIU, Silvia TRIF
core   +2 more sources

Utilizing Object Capabilities to Improve Web Application Security [PDF]

open access: yesApplied Cybersecurity & Internet Governance, 2022
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann   +3 more
doaj   +1 more source

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2005
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core   +3 more sources

Secure Input for Web Applications [PDF]

open access: yesTwenty-Third Annual Computer Security Applications Conference (ACSAC 2007), 2007
The Web is an indispensable part of our lives. Every day, millions of users purchase items, transfer money, retrieve information and communicate over the Web. Although the Web is convenient for many users because it provides any time, anywhere access to information and services, at the same time, it has also become a prime target for miscreants who ...
Martin Szydlowski   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy