Results 71 to 80 of about 784,907 (192)

Policy-agnostic programming on the client-side [PDF]

open access: yes, 2017
Browser security has become a major concern especially due to web pages becoming more complex. These web applications handle a lot of information, including sensitive data that may be vulnerable to attacks like data exfiltration, cross-site scripting ...
Palesha, Kushal
core   +1 more source

Search-based Tier Assignment for Optimising Offline Availability in Multi-tier Web Applications

open access: yes, 2017
Web programmers are often faced with several challenges in the development process of modern, rich internet applications. Technologies for the different tiers of the application have to be selected: a server-side language, a combination of JavaScript ...
De Koster, Joeri   +3 more
core   +1 more source

Security Aspects in Modern Web Applications [PDF]

open access: yes, 2009
World Wide Webin taustalla olevat tekniikat kehitettiin alun perin helpottamaan tiedon jakamista. Tämä jaettu tieto oli aluksi muuttumatonta tai harvoin muuttuvaa, mutta webin yleistyminen muutti tilanteen.
Miettinen, Jarkko
core  

Using Control Frameworks to Map Risks in Web 2.0 Applications [PDF]

open access: yes
Web 2.0 applications are continuously moving into the corporate mainstream. Each new development brings its own threats or new ways to deliver old attacks.
Riaan J. RUDMAN
core  

Real-Time Threat Detection with JavaScript: Monitoring and Response Mechanisms

open access: yesТехнічна інженерія
Web apps are essential to contemporary life but are also vulnerable to many security concerns. This article examines real-time threat detection, monitoring, and response techniques at the confluence of JavaScript and security.
A.I. Orynchak   +2 more
doaj   +1 more source

General aspects of application it security [PDF]

open access: yesNBP: Nauka, bezbednost, policija, 2017
To achieve a satisfactory level of security of an information system, different system and application methods are applied. The paper has a focus on general aspects of application IT security, thereby giving an overview of security methods applied to the
Čisar Petar
doaj  

SQL Injection Detection Using Machine Learning Techniques and Multiple Data Sources [PDF]

open access: yes, 2018
SQL Injection continues to be one of the most damaging security exploits in terms of personal information exposure as well as monetary loss. Injection attacks are the number one vulnerability in the most recent OWASP Top 10 report, and the number of ...
Ross, Kevin
core   +1 more source

Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review

open access: yesSensors
Web 3.0 marks the beginning of a new era for the internet, characterized by distributed technology that prioritizes data ownership and value expression. Web 3.0 aims to empower users by providing them with ownership and control of their data and digital ...
Bandar Alotaibi
doaj   +1 more source

Assessing Vulnerability of Students’ Programming Projects: Application of Testing Tools and Estimation of Checklist Effect on Code Quality

open access: yesJaunųjų Mokslininkų Darbai
Web application security is one of the mandatory elements in system development, however, the proper level of security measures among beginner level programmers is still an issue. This paper examines how security checklists impact the secure development
Eligijus Andriulionis   +2 more
doaj   +1 more source

A Framework for Evaluation of SQL Injection Detection and Prevention Tools

open access: yesInternational Journal of Information and Communication Technology Research, 2013
SQLIA is a hacking technique by which the attacker adds Structured Query Language code (SQL statements) through a web application's input fields or hidden parameters to access the resources.
Atefeh Tajpour, Suhaimi I brahim
doaj  

Home - About - Disclaimer - Privacy