Web Security Investigation through Penetration Tests: A Case study of an Educational Institution Portal [PDF]
Web security has become an important subject; many companies and organizations are becoming more security conscious as they build web applications to render online services and increase web presence. Unfortunately, many of these web applications are still susceptible to threats as they lack strong immunity to malicious attacks.
arxiv
Symbolic security analysis of ruby-on-rails web applications [PDF]
Avik Chaudhuri, Jeffrey S. Foster
openalex +1 more source
Increasing sedentary time, minimum dietary energy requirements, and food security assessment
Abstract We compute corrections for sedentary behavior in physical activity levels (PALs) and incorporate them along with corrections for over estimation of basal metabolic rates (BMRs) into threshold caloric intakes, known as minimum dietary energy requirements (MDERs).
Jacob Michels+2 more
wiley +1 more source
Encoding a Taxonomy of Web Attacks with Different-Length Vectors [PDF]
Web attacks, i.e. attacks exclusively using the HTTP protocol, are rapidly becoming one of the fundamental threats for information systems connected to the Internet. When the attacks suffered by web servers through the years are analyzed, it is observed that most of them are very similar, using a reduced number of attacking techniques.
arxiv
A closer look at Intrusion Detection System for web applications [PDF]
Intrusion Detection System (IDS) is one of the security measures being used as an additional defence mechanism to prevent the security breaches on web. It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application.
arxiv
Automated verification of role-based access control security models recovered from dynamic web applications [PDF]
Manar H. Alalfi+2 more
openalex +1 more source
Website Security Analysis Using Vulnerability Assessment Method
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin+4 more
doaj +1 more source
A Holistic Approach to Securing Web Applications [PDF]
Protection of Web applications is an activity that requires constant monitoring of security threats as well as looking for solutions in this field. Since protection has moved from the lower layers of OSI models to the application layer and having in mind the fact that 75% of all the attacks are performed at the application layer, special attention ...
arxiv
Inlined monitors for security policy enforcement in web applications [PDF]
Fotios Rafailidis+3 more
openalex +1 more source
WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads [PDF]
Web application firewall (WAF) examines malicious traffic to and from a web application via a set of security rules. It plays a significant role in securing Web applications against web attacks. However, as web attacks grow in sophistication, it is becoming increasingly difficult for WAFs to block the mutated malicious payloads designed to bypass their
arxiv