Results 81 to 90 of about 784,907 (192)

Analisis Dan Mitigasi Celah Keamanan Website SIMPKN Informatika Menggunakan Metode Owasp Zed Attack Proxy (ZAP) [PDF]

open access: yes
In today's technological developments, there are a variety of conveniences in processing information data that make it easier for every individual to build a website.
Perdhana, Helmi Indra
core  

Correlation analysis for reducing signature-based WAF false positives rates

open access: yesБезопасность информационных технологий, 2015
This paper addresses the problem of reducing the number of false positives of signature-based WAF. We propose an automatic method for detecting specific signatures which give high FP rates for the given web application using correlation analysis.
Valeriya Grigorjevna Shervarly   +1 more
doaj  

The Application of Web Usage Mining In E-commerce Security

open access: yesInternational Journal of Information Science and Management, 2013
Nowadays, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world.
Prof. Dr. M. E. Mohammadpourzarandi   +1 more
doaj  

Web application security (HTTP security)

open access: yes, 2016
Η Ασφάλεια των ηλεκτρονικών υπολογιστών και των εφαρμογών του Διαδικτύου είναι ένα θέμα που ακούμε όλο και περισσότερο τον τελευταίο καιρό. Η παραπάνω συζήτηση φαντάζει όλο και πιο λογική άμα αναλογιστούμε ότι το ηλεκτρονικό έγκλημα ή όπως συνηθίζεται να λέγεται κυβερνο-έγκλημα έχει σημειώσει τρομακτική έξαρση σε παγκόσμια κλίμακα.
openaire   +1 more source

Web Applications Security: A security model for client-side web applications

open access: yes, 2009
The Web has evolved to support sophisticated web applications. These web applications are exposed to a number of attacks and vulnerabilities. The existing security model is unable to cope with these increasing attacks and there is a need for a new security model that not only provides the required security but also supports recent advances like AJAX ...
openaire   +1 more source

Home - About - Disclaimer - Privacy