Results 51 to 60 of about 784,907 (192)
Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj +1 more source
Data-flow Analysis of Programs with Associative Arrays
Dynamic programming languages, such as PHP, JavaScript, and Python, provide built-in data structures including associative arrays and objects with similar semantics-object properties can be created at run-time and accessed via arbitrary expressions ...
Baštecký, Pavel +2 more
core +2 more sources
AProSec: an Aspect for Programming Secure Web Applications [PDF]
International audienceAdding security functions in existing Web application servers is now vital for the IS of companies and organizations. Writing crosscutting functions in complex software should take advantage of the modularity offered by new software
Duchien, Laurence +3 more
core +2 more sources
An efficient deception architecture for cloud-based virtual networks
Emerging deceptive systems present a new promise for the uprising security problems in cloud-based virtual networks, especially those operated by small and medium enterprises. The main goal of deceptive systems is to form a layer of defensive nodes in an
Mohammad Qasem, Hussain M J Almohri
doaj
Application and Web Security [PDF]
As we have explored in earlier chapters, security applies to all the components of the systems including physical infrastructure like building, electricity, cables, and son on; hardware; network; software; tools / utilities; human beings including resources internal to the organization and contractors / suppliers who may be working from within the ...
Umesh Hodeghatta Rao, Umesha Nayak
openaire +1 more source
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj +1 more source
SQL Injection and Cross Site Scripting Prevention using OWASP ModSecurity Web Application Firewall
Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers ...
- Robinson +2 more
doaj +1 more source
Analisis Keamanan pada Aplikasi Her-registrasi Online Mahasiswa Universitas Diponegoro
The security aspect is often forgotten in the application of Information Technology. The attacks were caused by the negligence of the developer causes damage to the system used. SQL Injection attacks, Cross Site Scripting attacks, and no use of encrypted
Hilal Afrih Juhad +2 more
doaj +1 more source
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal +6 more
doaj +1 more source
Today we live in a society that we call the information society where information has become a resource of great value. Along with this kind of society web applications that provide information through various services have appeared. Web applications have been driven to the point of very high visual appearance and services quality level but the part ...
Konecki, Mario +2 more
openaire +1 more source

