Results 1 to 10 of about 787,843 (284)

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yesInformatică economică, 2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
Marius POPA
doaj   +2 more sources

Security Risk Assessment of Healthcare Web Application Through Adaptive Neuro-Fuzzy Inference System: A Design Perspective

open access: yesRisk Management and Healthcare Policy, 2020
Jasleen Kaur,1 Asif Irshad Khan,2 Yoosef B Abushark,2 Md Mottahir Alam,3 Suhel Ahmad Khan,4 Alka Agrawal,1 Rajeev Kumar,1 Raees Ahmad Khan1 1Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, UP, India; 2Computer ...
Kaur J   +7 more
doaj  

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

OWASP Top 10 Review of Vulnerability Studies in Web Application Security

open access: yesİstanbul Gelişim Üniversitesi Sosyal Bilimler Dergisi
In order to ensure information security, it is necessary to find the vulnerabilities and risks that exist in the resources that make up the information system.
Çisem Yaşar   +2 more
doaj   +1 more source

SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING

open access: yesInternational Journal of Advances in Signal and Image Sciences
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj   +2 more
doaj   +1 more source

An efficient deception architecture for cloud-based virtual networks

open access: yesKuwait Journal of Science, 2019
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj  

Assessment of the web application security effectiveness against various methods of network attacks

open access: yesJournal of Computer Sciences Institute, 2018
The article discusses the issue of the security of Internet applications. The most popular types of attacks and methods of securing web applications against them are discussed. The study conducted the effectiveness of security of web applications.
Mateusz Erbel, Piotr Kopniak
doaj   +1 more source

Toward discovering and exploiting private server-side Web API

open access: yes网络与信息安全学报, 2016
Most of the interfaces for mobile application and server interaction use the Web API for communication,but the Web API introduced by these mobile applications may introduce new security issues.To facilitate the study of the security of Web API,a system ...
Jia CHEN, Shan-qing1 GUO
doaj   +3 more sources

Comparison of the effectiveness of tools for testing the security of web applications

open access: yesJournal of Computer Sciences Institute
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj   +1 more source

Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System

open access: yesJurnal Sisfokom
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj   +1 more source

Home - About - Disclaimer - Privacy