Results 11 to 20 of about 1,346,069 (376)

BlackWatch: Increasing Attack Awareness within Web Applications [PDF]

open access: yesFuture Internet, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Calum C. Hall   +2 more
doaj   +5 more sources

Web application firewall based on machine learning models [PDF]

open access: yesPeerJ Computer Science
The increasing reliance on web applications for storing sensitive data and financial transactions has elevated the importance of web application security.
Muhammed Ersin Durmuşkaya   +1 more
doaj   +3 more sources

A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications [PDF]

open access: yesInformatică economică, 2011
This paper present and implement a Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Application. In the developing process is used a Windows Phone 7 application that interact with a WCF Web Service and a database.
Silvia TRIF, Adrian VISOIU
doaj   +2 more sources

SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING

open access: diamondInternational Journal of Advances in Signal and Image Sciences
The powerful Open Web Application Security Project (OWASP)-Zed Attack Proxy (ZAP) tool secures web applications with extensive security testing. Its main goal is to find and fix web application vulnerabilities before they can be exploited. The goal is to
S. P. Maniraj   +2 more
doaj   +2 more sources

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yesInformatică economică, 2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
Marius POPA
doaj   +2 more sources

Integration biometrics in web application: Security for web apps [PDF]

open access: yesInternational Research Journal of Science, Technology, Education, and Management, 2023
To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by ...
Wulandari Kusuma Herdanu   +2 more
doaj   +1 more source

Analisis Metode Open Web Application Security Project (OWASP) Menggunakan Penetration Testing pada Keamanan Website Absensi

open access: yesJurnal Informasi dan Teknologi, 2022
Penggunaan teknologi dalam berbagai bidang meningkatkan mobilitas, salah satunya dengan pembuatan website untuk berbagi dan mengelola informasi. Keamanan sistem informasi yang tidak baik dapat mengganggu infrastruktur suatu organisasi atau perusahaan ...
Ichsan Octama Riandhanu
semanticscholar   +1 more source

From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application? [PDF]

open access: yesarXiv.org, 2023
Large Language Models (LLMs) have found widespread applications in various domains, including web applications, where they facilitate human interaction via chatbots with natural language interfaces. Internally, aided by an LLM-integration middleware such
Rodrigo Pedro   +3 more
semanticscholar   +1 more source

Hybrid Computational Modeling for Web Application Security Assessment

open access: yesComputers Materials & Continua, 2022
: Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a ...
Adil Hussain Seh   +6 more
semanticscholar   +1 more source

A Novel Data Augmentation Technique and Deep Learning Model for Web Application Security

open access: yesIEEE Access, 2021
Web applications are often exposed to attacks because of the critical information and valuable assets they host. In this study, Bi-LSTM based web application security models were developed in order to detect web attacks and classify them into binary or ...
H. Karacan, Mehmet Sevri
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy