Results 71 to 80 of about 784,907 (192)
Policy-agnostic programming on the client-side [PDF]
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core +1 more source
Search-based Tier Assignment for Optimising Offline Availability in Multi-tier Web Applications
Web programmers are often faced with several challenges in the development process of modern, rich internet applications. Technologies for the different tiers of the application have to be selected: a server-side language, a combination of JavaScript ...
De Koster, Joeri +3 more
core +1 more source
Security Aspects in Modern Web Applications [PDF]
World Wide Webin taustalla olevat tekniikat kehitettiin alun perin helpottamaan tiedon jakamista. Tämä jaettu tieto oli aluksi muuttumatonta tai harvoin muuttuvaa, mutta webin yleistyminen muutti tilanteen.
Miettinen, Jarkko
core
Using Control Frameworks to Map Risks in Web 2.0 Applications [PDF]
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development brings its own threats or new ways to deliver old attacks.
Riaan J. RUDMAN
core
Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak +2 more
doaj +1 more source
General aspects of application it security [PDF]
To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the
Čisar Petar
doaj
SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core +1 more source
Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. Web 3.0 aims to empower users by providing them with ownership and control of their data and digital ...
Bandar Alotaibi
doaj +1 more source
Web application security is one of the mandatory elements in system development, however, the proper level of security measures among beginner level programmers is still an issue. This paper examines how security checklists impact the secure development
Eligijus Andriulionis +2 more
doaj +1 more source
A Framework for Evaluation of SQL Injection Detection and Prevention Tools
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj

