Results 71 to 80 of about 1,062,697 (366)

A Metamodel for Web Application Security Evaluation

open access: yes2023 34th Conference of Open Innovations Association (FRUCT), 2023
In the digital era, web applications have become a prevalent tool for businesses. As the number of web applications continues to grow, they become enticing targets for malicious actors seeking to exploit potential security vulnerabilities. Organizations face constant risks associated with vulnerabilities in their web-based software systems, which can ...
Wen, Shao-Fang, Katt, Basel
openaire   +3 more sources

Comparison of the effectiveness of tools for testing the security of web applications

open access: yesJournal of Computer Sciences Institute
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj   +1 more source

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services [PDF]

open access: yesarXiv, 2016
Web services are expected to play significant role for message communications over internet applications. Most of the future work is web security. Online shopping and web services are increasing at rapid rate. In this paper we presented the fundamental concepts related to Network security, web security threats.
arxiv  

Van Der Waals Hybrid Integration of 2D Semimetals for Broadband Photodetection

open access: yesAdvanced Materials, EarlyView.
Advanced broadband photodetector technologies are essential for military and civilian applications. 2D semimetals, with their gapless band structures, high mobility, and topological protection, offer great promise for broadband PDs. This study reviews the latest advancements in broadband PDs utilizing heterostructures that combine 2D semimetals with ...
Xue Li   +9 more
wiley   +1 more source

Detection of the Security Vulnerabilities in Web Applications [PDF]

open access: yesInformatică economică, 2009
The contemporary organizations develop business processes in a very complex environment. The IT&C technologies are used by organizations to improve their competitive advantages. But, the IT&C technologies are not perfect. They are developed in an
doaj  

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

open access: yesIEEE Access, 2020
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal   +6 more
doaj   +1 more source

Towards automated web application logic reconstruction for application level security [PDF]

open access: yesarXiv, 2015
Modern overlay security mechanisms like Web Application Firewalls (WAF) suffer from inability to recognize custom high-level application logic and data objects, which results in low accuracy, high false positives rates, and overhelming manual effort for fine tuning.
arxiv  

Robust Full‐Surface Bonding of Substrate and Electrode for Ultra‐Flexible Sensor Integration

open access: yesAdvanced Materials, EarlyView.
A direct hybrid bonding method that enables both gold and parylene bonding without adhesives is developed. This technique achieves full‐surface direct bonding of electrodes and substrates in flexible electronic connections. The method offers high flexibility, stable mechanical durability, and high‐resolution interconnections, accommodating varying ...
Masahito Takakuwa   +9 more
wiley   +1 more source

A Visual Model for Web Applications Security Monitoring [PDF]

open access: yesarXiv, 2019
This paper proposes a novel visual model for web applications security monitoring. Although an automated intrusion detection system can shield a web application from common attacks, it usually cannot detect more complicated break-ins. So, a human-assisted monitoring system is an indispensable complement, following the "Defense in depth" strategy.
arxiv  

Home - About - Disclaimer - Privacy