Results 11 to 20 of about 784,907 (192)

Web Application Penetration Testing Using SQL Injection Attack

open access: yesJOIV: International Journal on Informatics Visualization, 2021
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda   +4 more
doaj   +1 more source

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

Holistic Web Application Security Visualization for Multi-Project and Multi-Phase Dynamic Application Security Test Results

open access: yesIEEE Access, 2021
As the number of web applications and the corresponding number and sophistication of the threats increases, creating new tools that are efficient and accessible becomes essential.
Ferda Ozdemir Sonmez, Banu Gunel Kilic
doaj   +1 more source

Web Application Security Education Platform Based on OWASP API Security Project

open access: yesEmitter: International Journal of Engineering Technology, 2022
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple ...
Muhammad Idris   +2 more
doaj   +1 more source

A hybrid fuzzy rule-based multi-criteria framework for sustainable-security assessment of web application

open access: yesAin Shams Engineering Journal, 2021
The present day environment of cyber-attacks is a threat to even the most secure systems. With each passing day, the attackers are adapting new technologies to infiltrate systems and exploit even the minutest of the vulnerabilities.
Rajeev Kumar   +5 more
doaj   +1 more source

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

open access: yesIEEE Access, 2019
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal   +3 more
doaj   +1 more source

Designing and executing a security and usability testing plan: IdeaClick Prototype [PDF]

open access: yes, 2013
The purpose of this thesis was to define, analyse and execute usability and security test-ing plans for an application prototype named IdeaClick. IdeaClick is a web application and its main purpose is to share ideas and provide a means to collaborate on ...
GutiĆ©rrez GutiĆ©rrez, Omar Lenin   +1 more
core   +3 more sources

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

open access: yesIEEE Access, 2020
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's ...
Rajeev Kumar   +5 more
doaj   +1 more source

Web Application Security

open access: yes, 2005
As more and more sensitive information is entering web based applications, and thus are available through a web browser, securing these systems is of increasing importance. A software system accessible through the web is continuously exposed to threats, and is accessible to anyone who would like to attempt a break-in. These systems can not rely on only
Foss, Julie-Marie, Ingvaldsen, Nina
openaire   +3 more sources

RASP based Web security detection method

open access: yesDianxin kexue, 2020
At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web ...
Hang YU, Shuai WANG, Huamin JIN
doaj   +2 more sources

Home - About - Disclaimer - Privacy