Results 31 to 40 of about 1,062,697 (366)
HTTPI Based Web Service Security over SOAP [PDF]
Now a days, a new family of web applications open applications, are emerging (e.g., Social Networking, News and Blogging). Generally, these open applications are non-confidential. The security needs of these applications are only client/server authentication and data integrity. For securing these open applications, effectively and efficiently, HTTPI, a
arxiv +1 more source
Mendeteksi kerentanan keamanan aplikasi berbasis website adalah hal yang penting, dan dapat memperkirakan resiko yang ada terhadap keberlangsungan suatu bisnis.
Bahrun Ghozali+2 more
semanticscholar +1 more source
Evaluation of Static Analysis on Web Applications [PDF]
Web services are becoming business-critical components, often deployed with critical software bugs that can be maliciously explored. Web vulnerability scanners allow the detection of security vulnerabilities in web services by stressing the service from the point of view of an attacker.
arxiv
WAIT: Protecting the Integrity of Web Applications with Binary-Equivalent Transparency [PDF]
Modern single page web applications require client-side executions of application logic, including critical functionality such as client-side cryptography. Existing mechanisms such as TLS and Subresource Integrity secure the communication and provide external resource integrity.
arxiv +1 more source
The approaches to quantify web application security scanners quality: a review
The web application security scanner is a computer program that assessed web application security with penetration testing technique. The benefit of automated web application penetration testing is huge, which web application security scanner not only ...
Lim Kah Seng+2 more
semanticscholar +1 more source
Discovery and research of network security vulnerabilities based on Web application
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj +3 more sources
Detecting web attacks with end-to-end deep learning
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected.
Yao Pan+6 more
doaj +1 more source
Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST) [PDF]
The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage ...
Jinfeng Li
semanticscholar +1 more source
In Yellowstone Lake, Wyoming, lake trout carcasses are used to suppress invasive lake trout embryos in an effort to conserve native Yellowstone cutthroat trout. Using a field experiment, we determined that carcass treatment had limited, non‐target effects on benthic invertebrates.
Michelle A. Briggs+6 more
wiley +1 more source
Interactive soybean variable‐rate seeding simulator for farmers
Abstract Seed expense is a critical component affecting soybean (Glycine max L.) production cost. Achieving potential benefits of adjusting seeding rates by yield environment requires translation from theory to practice through decision support tools.
Adrian Correndo+5 more
wiley +1 more source