Results 131 to 140 of about 784,907 (192)
A generative AI cybersecurity risks mitigation model for code generation: using ANN-ISM hybrid approach. [PDF]
Al-Hashimi HA.
europepmc +1 more source
MQTT_UAD: MQTT Under Attack Dataset. A public dataset for the detection of attacks in IoT networks using MQTT protocol. [PDF]
Aveleira-Mata J +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
South Florida Journal of Development, 2022
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum.
Buket Erşahin, Mustafa Erşahin
openaire +1 more source
This study aims to show how security flaws of web applications can threat information security. Web Application Security is a branch of Information Security which focuses on web application level security flaws and their solutions. Evolution of Web continues with a big momentum.
Buket Erşahin, Mustafa Erşahin
openaire +1 more source
2022
Web-based services are common targets for hackers, and the need for ensuring their security keeps on rising. Attackers often take advantage of the vulnerabilities of different web applications using several mechanisms and thus steal and manipulate valuable information.
Siva Prasad Reddy Katamreddy +1 more
openaire +2 more sources
Web-based services are common targets for hackers, and the need for ensuring their security keeps on rising. Attackers often take advantage of the vulnerabilities of different web applications using several mechanisms and thus steal and manipulate valuable information.
Siva Prasad Reddy Katamreddy +1 more
openaire +2 more sources
The International Conference on Security, Fault Tolerance, Intelligence, 2023
In der heutigen Zeit spielt die Absicherung von modernen IT-Systemen eine wichtige Rolle und stellt gleichzeitig eine Herausforderung für viele Unternehmen dar. Bei den Versuchen, strikte Richtlinien umzusetzen und die eigenen Daten zu schützen, stoßen einige davon an ihre Grenzen.
openaire +3 more sources
In der heutigen Zeit spielt die Absicherung von modernen IT-Systemen eine wichtige Rolle und stellt gleichzeitig eine Herausforderung für viele Unternehmen dar. Bei den Versuchen, strikte Richtlinien umzusetzen und die eigenen Daten zu schützen, stoßen einige davon an ihre Grenzen.
openaire +3 more sources
2011
This chapter covers web applications and their associated security mechanisms. You will audit web applications and identify vulnerabilities from a user’s (or adversary’s), a maintainer’s and a developer’s perspective. You will exploit the vulnerabilities and see their consequences.
David Basin +2 more
openaire +2 more sources
This chapter covers web applications and their associated security mechanisms. You will audit web applications and identify vulnerabilities from a user’s (or adversary’s), a maintainer’s and a developer’s perspective. You will exploit the vulnerabilities and see their consequences.
David Basin +2 more
openaire +2 more sources

