Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core
Correlation analysis for reducing signature-based WAF false positives rates
This paper addresses the problem of reducing the number of false positives of signature-based WAF. We propose an automatic method for detecting specific signatures which give high FP rates for the given web application using correlation analysis.
Valeriya Grigorjevna Shervarly +1 more
doaj
The Application of Web Usage Mining In E-commerce Security
Nowadays, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world.
Prof. Dr. M. E. Mohammadpourzarandi +1 more
doaj
Web application security (HTTP security)
Η Ασφάλεια των ηλεκτρονικών υπολογιστών και των εφαρμογών του Διαδικτύου είναι ένα θέμα που ακούμε όλο και περισσότερο τον τελευταίο καιρό. Η παραπάνω συζήτηση φαντάζει όλο και πιο λογική άμα αναλογιστούμε ότι το ηλεκτρονικό έγκλημα ή όπως συνηθίζεται να λέγεται κυβερνο-έγκλημα έχει σημειώσει τρομακτική έξαρση σε παγκόσμια κλίμακα.
openaire +1 more source
An open-source JavaScript clinical neurophysiology library for education and clinical research. [PDF]
Lohi S +3 more
europepmc +1 more source
WiraChain: a blockchain and FHIR-based platform for improving clinical data interoperability in healthcare. [PDF]
Grau L, Urrunaga J, Santisteban J.
europepmc +1 more source
Development and testing of a short message service integrated web-based application for enhancing maternal and newborn health in Jimma Zone, Ethiopia. [PDF]
Bulcha G +6 more
europepmc +1 more source
Web Applications Security: A security model for client-side web applications
The Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX ...
openaire +1 more source
Applying Blockchain in Telemedicine: A Systematic Review. [PDF]
Ehteshami A, Sattari M.
europepmc +1 more source
Driving into the Unknown: Investigating and Addressing Security Breaches in Vehicle Infotainment Systems. [PDF]
Yan M, Crane G, Suillivan D, Shan H.
europepmc +1 more source

