Results 291 to 300 of about 1,062,697 (366)
Development of an e-Health Software for Speech and Swallowing Rehabilitation Following Laryngectomy. [PDF]
Gugatschka M+6 more
europepmc +1 more source
Analysis of Machine Learning Security Blockchain Based IoT Enabled Web Platform Applications
S Deepthi
openalex +1 more source
Biodepot Launcher: an app to install, manage and launch bioinformatics workflows. [PDF]
Hung LH+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Implementation and analysis of Web application security measures using OWASP Guidelines
2022 International Conference on Recent Trends in Microelectronics, Automation, Computing and Communications Systems (ICMACC), 2022Web application security is the most important area when it comes to developing a web application. Many web applications having vulnerabilities due to poor implementation of security measures.
S. A. Kumar, Y. U. Rani
semanticscholar +1 more source
Analysis of Web Security Using Open Web Application Security Project 10
2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020Open Web Application Security Project 10 is a web application security testing framework method that focuses on web application security to find weaknesses in a website.
Muhamad Agreindra Helmiawan+5 more
semanticscholar +1 more source
International Workshop on Big Data and Information Security, 2020
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks.
Rizki Agung Muzaki+3 more
semanticscholar +1 more source
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks.
Rizki Agung Muzaki+3 more
semanticscholar +1 more source
Web Application Security [PDF]
Security is a contentious issue for Web applications, with developers and administrators sharing overall responsibility, while still focusing on their specialist abilities. As a developer, you need to consider tasks such as user authentication, authorization, and impersonation; you also need to produce a model that the administrators can use when the ...
Rob Macdonald, Steve Harris
openaire +1 more source