Results 41 to 50 of about 1,346,069 (376)

Mendeteksi Kerentanan Keamanan Aplikasi Website Menggunakan Metode Owasp (Open Web Application Security Project) Untuk Penilaian Risk Rating

open access: yesCreative Information Technology Journal, 2019
Mendeteksi kerentanan keamanan aplikasi berbasis website adalah hal yang penting, dan dapat memperkirakan resiko yang ada terhadap keberlangsungan suatu bisnis.
Bahrun Ghozali   +2 more
semanticscholar   +1 more source

Detecting web attacks with end-to-end deep learning

open access: yesJournal of Internet Services and Applications, 2019
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected.
Yao Pan   +6 more
doaj   +1 more source

The approaches to quantify web application security scanners quality: a review

open access: yesInternational journal of advanced computing research, 2018
The web application security scanner is a computer program that assessed web application security with penetration testing technique. The benefit of automated web application penetration testing is huge, which web application security scanner not only ...
Lim Kah Seng   +2 more
semanticscholar   +1 more source

09141 Abstracts Collection -- Web Application Security [PDF]

open access: yes, 2010
From 29th March to 3rd April 2009 the Dagstuhl Seminar 09141 Web Application Security was held in Schloss Dagstuhl -- Leibniz Center for Informatics. During the seminar, several participants presented their current research, and ongoing work and open ...
Boneh, Dan   +3 more
core   +1 more source

Classification of logical vulnerability based on group attacking method [PDF]

open access: yes, 2020
New advancement in the field of e-commerce software technology has also brought many benefits, at the same time developing process always face different sort of problems from design phase to implement phase.
Nabi, Faisal   +2 more
core   +2 more sources

Discovery and research of network security vulnerabilities based on Web application

open access: yes网络与信息安全学报, 2016
Web security vulnerabilities can be divided into two categories,including security vulnerabilities Web platform and Web their own application.By analyzing the attack principle and process of Web application network security vulnerabilities,XSS ...
Xiao-shuang ZHANG, Yi-ling XU, Yuan LIU
doaj   +3 more sources

Secure Development - Web Application Security. [PDF]

open access: yesIOSR Journal of Computer Engineering, 2013
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire   +1 more source

Long COVID in People With Multiple Sclerosis and Related Disorders: A Multicenter Cross‐Sectional Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Managing long COVID in people with multiple sclerosis and related disorders (pwMSRD) is complex due to overlapping symptoms. To address evidence gaps, we evaluated long COVID susceptibility in pwMSRD versus controls and its associations with multi‐domain function and disability.
Chen Hu   +15 more
wiley   +1 more source

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Home - About - Disclaimer - Privacy