Results 41 to 50 of about 1,281,108 (372)

Designing and executing a security and usability testing plan: IdeaClick Prototype [PDF]

open access: yes, 2013
The purpose of this thesis was to define, analyse and execute usability and security test-ing plans for an application prototype named IdeaClick. IdeaClick is a web application and its main purpose is to share ideas and provide a means to collaborate on ...
Bacso, Manuel   +1 more
core   +3 more sources

SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]

open access: yes, 2011
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri   +15 more
core   +6 more sources

Detecting web attacks with end-to-end deep learning

open access: yesJournal of Internet Services and Applications, 2019
Web applications are popular targets for cyber-attacks because they are network-accessible and often contain vulnerabilities. An intrusion detection system monitors web applications and issues alerts when an attack attempt is detected.
Yao Pan   +6 more
doaj   +1 more source

Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST) [PDF]

open access: yesAnnals of Emerging Technologies in Computing, 2020
The delivery of a framework in place for secure application development is of real value for application development teams to integrate security into their development life cycle, especially when a mobile or web application moves past the scanning stage ...
Jinfeng Li
semanticscholar   +1 more source

Threat Modelling for Active Directory [PDF]

open access: yes, 2004
This paper analyses the security threats that can arise against an Active Directory server when it is included in a Web application. The approach is based on the STRIDE classification methodology.
Chadwick, David
core   +2 more sources

Secure Development - Web Application Security. [PDF]

open access: yesIOSR Journal of Computer Engineering, 2013
In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to ...
openaire   +1 more source

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Scalable Manufacturing of Radiation‐Tolerant Potentiometric Electrodes: A Systematic Transition from Laboratory to Semiautomated Fabrication

open access: yesAdvanced Engineering Materials, EarlyView.
Laboratory protocols for producing thin‐film pH electrodes for sterilized single‐use technologies have been successfully developed into a semiautomated workflow, with higher throughput and precision of membrane thickness. Accuracies are within 0.05 pH units versus ground truth, and uncertainty analysis reveals the largest sources of error to be derived
Bingyuan Zhao   +4 more
wiley   +1 more source

Building in web application security at the requirements stage : a tool for visualizing and evaluating security trade-offs : a thesis presented in partial fulfilment of the requirements for the degree of Master of Information Science in Information Systems at Massey University, Albany, New Zealand [PDF]

open access: yes, 2007
One dimension of Internet security is web application security. The purpose of this Design-science study was to design, build and evaluate a computer-based tool to support security vulnerability and risk assessment in the early stages of web application ...
Nehring, Natalia Alekseevna
core  

A Formal Approach to Exploiting Multi-Stage Attacks based on File-System Vulnerabilities of Web Applications (Extended Version)

open access: yes, 2017
Web applications require access to the file-system for many different tasks. When analyzing the security of a web application, secu- rity analysts should thus consider the impact that file-system operations have on the security of the whole application ...
A Armando   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy