Results 51 to 60 of about 784,907 (192)

Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System

open access: yesJurnal Sisfokom
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj   +1 more source

Data-flow Analysis of Programs with Associative Arrays

open access: yes, 2014
Dynamic programming languages, such as PHP, JavaScript, and Python, provide built-in data structures including associative arrays and objects with similar semantics-object properties can be created at run-time and accessed via arbitrary expressions ...
Baštecký, Pavel   +2 more
core   +2 more sources

AProSec: an Aspect for Programming Secure Web Applications [PDF]

open access: yes, 2007
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence   +3 more
core   +2 more sources

An efficient deception architecture for cloud-based virtual networks

open access: yesKuwait Journal of Science, 2019
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj  

Application and Web Security [PDF]

open access: yes, 2014
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire   +1 more source

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall

open access: yesJOIV: International Journal on Informatics Visualization, 2018
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson   +2 more
doaj   +1 more source

Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2016
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad   +2 more
doaj   +1 more source

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

open access: yesIEEE Access, 2020
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal   +6 more
doaj   +1 more source

Secure Web Applications?

open access: yes, 2007
Today we live in a society that we call the information society where information has become a resource of great value. Along with this kind of society web applications that provide information through various services have appeared. Web applications have been driven to the point of very high visual appearance and services quality level but the part ...
Konecki, Mario   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy