Results 131 to 140 of about 1,062,697 (366)

Web Security Investigation through Penetration Tests: A Case study of an Educational Institution Portal [PDF]

open access: yesarXiv, 2018
Web security has become an important subject; many companies and organizations are becoming more security conscious as they build web applications to render online services and increase web presence. Unfortunately, many of these web applications are still susceptible to threats as they lack strong immunity to malicious attacks.
arxiv  

Increasing sedentary time, minimum dietary energy requirements, and food security assessment

open access: yesApplied Economic Perspectives and Policy, EarlyView.
Abstract We compute corrections for sedentary behavior in physical activity levels (PALs) and incorporate them along with corrections for over estimation of basal metabolic rates (BMRs) into threshold caloric intakes, known as minimum dietary energy requirements (MDERs).
Jacob Michels   +2 more
wiley   +1 more source

Encoding a Taxonomy of Web Attacks with Different-Length Vectors [PDF]

open access: yesComputers and Security 22, 435-449, 2003, 2002
Web attacks, i.e. attacks exclusively using the HTTP protocol, are rapidly becoming one of the fundamental threats for information systems connected to the Internet. When the attacks suffered by web servers through the years are analyzed, it is observed that most of them are very similar, using a reduced number of attacking techniques.
arxiv  

A closer look at Intrusion Detection System for web applications [PDF]

open access: yesarXiv, 2018
Intrusion Detection System (IDS) is one of the security measures being used as an additional defence mechanism to prevent the security breaches on web. It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application.
arxiv  

Website Security Analysis Using Vulnerability Assessment Method

open access: yesJournal of Innovation Information Technology and Application
In today’s digital era, ensuring website security is crucial, especially in the education sector which is frequently targeted by cyber attacks. This  research aims to test security of the Universitas Internasional Batam (UIB) website using OWASP ZAP and ...
Haeruddin   +4 more
doaj   +1 more source

A Holistic Approach to Securing Web Applications [PDF]

open access: yesJournal of Computing, Vol. 2, Issue 1, January 2010, 2010
Protection of Web applications is an activity that requires constant monitoring of security threats as well as looking for solutions in this field. Since protection has moved from the lower layers of OSI models to the application layer and having in mind the fact that 75% of all the attacks are performed at the application layer, special attention ...
arxiv  

Inlined monitors for security policy enforcement in web applications [PDF]

open access: green, 2013
Fotios Rafailidis   +3 more
openalex   +1 more source

WAFBOOSTER: Automatic Boosting of WAF Security Against Mutated Malicious Payloads [PDF]

open access: yesarXiv
Web application firewall (WAF) examines malicious traffic to and from a web application via a set of security rules. It plays a significant role in securing Web applications against web attacks. However, as web attacks grow in sophistication, it is becoming increasingly difficult for WAFs to block the mutated malicious payloads designed to bypass their
arxiv  

Home - About - Disclaimer - Privacy