Results 21 to 30 of about 1,281,108 (372)

Analisis Metode Open Web Application Security Project (OWASP) Menggunakan Penetration Testing pada Keamanan Website Absensi

open access: yesJurnal Informasi dan Teknologi, 2022
Penggunaan teknologi dalam berbagai bidang meningkatkan mobilitas, salah satunya dengan pembuatan website untuk berbagi dan mengelola informasi. Keamanan sistem informasi yang tidak baik dapat mengganggu infrastruktur suatu organisasi atau perusahaan ...
Ichsan Octama Riandhanu
semanticscholar   +1 more source

Hybrid Computational Modeling for Web Application Security Assessment

open access: yesComputers Materials & Continua, 2022
: Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era. This has led to digital revolution, and in this context, the hardwired technologies in the software industry play a ...
Adil Hussain Seh   +6 more
semanticscholar   +1 more source

A Novel Data Augmentation Technique and Deep Learning Model for Web Application Security

open access: yesIEEE Access, 2021
Web applications are often exposed to attacks because of the critical information and valuable assets they host. In this study, Bi-LSTM based web application security models were developed in order to detect web attacks and classify them into binary or ...
H. Karacan, Mehmet Sevri
semanticscholar   +1 more source

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall [PDF]

open access: yes, 2021
The application of a security system on the web needs to be done considering that the web itself can be accessed through a public network. In this study, a Web Application Firewall (WAF)-based security system will be implemented using modsecurity, in ...
Alamsyah, Hendri, Riska, Riska
core   +2 more sources

Security in migratory interactive web applications [PDF]

open access: yesProceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia, 2012
In ubiquitous environments migratory interactive applications allow users to perform their tasks continuously across various devices. Users can push and pull migratory Web applications from one device to another for various reasons. However, the flexibility of such pervasive applications raises various security issues, such as the risk of theft of ...
Ghiani G., Isoni L., Paterno' F.
openaire   +4 more sources

Application and Web Security [PDF]

open access: yes, 2014
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire   +2 more sources

Analisis Keamanan Sistem Informasi Berbasis Website Dengan Metode Open Web Application Security Project (OWASP) Versi 4: Systematic Review

open access: yes, 2020
--  OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications.
Anggi Elanda, Robby Lintang Buana
semanticscholar   +1 more source

A Survey on Web Application Penetration Testing

open access: yesElectronics, 2023
Websites are becoming increasingly effective communication tools. Nevertheless, web applications are vulnerable to attack and can give attackers access to sensitive information or unauthorized access to accounts.
Esra Altulaihan   +2 more
semanticscholar   +1 more source

An Integrated Approach of Fuzzy Logic, AHP and TOPSIS for Estimating Usable-Security of Web Applications

open access: yesIEEE Access, 2020
Security and usability are often thought of as being contradictive in nature. One affects the other negatively. The relation and trade-offs between usability and security must be detected during developing web application to satisfy the user's ...
Rajeev Kumar   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy