Results 81 to 90 of about 1,281,108 (372)

Comparison of the effectiveness of tools for testing the security of web applications

open access: yesJournal of Computer Sciences Institute
This article presents a comparative analysis of the effectiveness of three web application security scanners: ZAP, Wapiti, and Skipfish. Automated scanning was conducted on deliberately unsecured applications, followed by an analysis of the detected ...
Izabela Kaźmierak
doaj   +1 more source

APPLYING OF ATTACK TREES FOR ESTIMATION THE PROBABILITY OF A SUCCESSFUL ATTACK OF THE WEB-APPLICATION

open access: yesРадіоелектронні і комп'ютерні системи, 2018
The development of technologies leads to the expansion of the range of services provided on the Internet, the online business is actively developing. As a rule, when creating a new Web resource for business, the main emphasis is on the need to stand out ...
Артём Григорьевич Тецкий
doaj   +1 more source

A Bio‐Inspired Perspective on Materials Sustainability

open access: yesAdvanced Materials, EarlyView.
This perspective discusses natural materials as inspiration for sustainable engineering designs and the processing of materials. First, circularity, longevity, parsimony, and activity are presented as essential material paradigms. The perspective then uses many examples of natural and technical materials to introduce principles such as oligo ...
Wolfgang Wagermaier   +2 more
wiley   +1 more source

Redesigning More Resilent Sahana System For Disaster Information In Indonesia [PDF]

open access: yes, 2011
This application is a disaster information system in Indonesia using Sahana platform that has many unique features of the integration Sahana disaster with some applications that have been built independently in the previous year of mudflow in Sidoarjo ...
Arna, Fariza   +4 more
core  

Web Engineering Security (WES) Methodology [PDF]

open access: yes, 2014
The impact of the World Wide Web on basic operational economical components in global information-rich civilizations is significant. The repercussions force organizations to provide justification for security from a business-case perspective and to focus
Glisson, William Bradley, Welland, Ray
core   +2 more sources

Evaluating the Security Impact of Healthcare Web Applications Through Fuzzy Based Hybrid Approach of Multi-Criteria Decision-Making Analysis

open access: yesIEEE Access, 2020
Continuous data breaches targeting the invaluable medical records have become a nemesis for the healthcare organizations. A secure and effective information security model in healthcare web applications can gain and enhance the respect as well as revenue
Alka Agrawal   +6 more
doaj   +1 more source

State‐of‐the‐Art, Insights, and Perspectives for MOFs‐Nanocomposites and MOF‐Derived (Nano)Materials

open access: yesAdvanced Materials, EarlyView.
Different approaches to MOF‐NP composite formation, such as ship‐in‐a‐bottle, bottle‐around‐the‐ship and in situ one‐step synthesis, are used. Owing to synergistic effects, the advantageous features of the components of the composites are beneficially combined, and their individual drawbacks are mitigated.
Stefanos Mourdikoudis   +6 more
wiley   +1 more source

Van Der Waals Hybrid Integration of 2D Semimetals for Broadband Photodetection

open access: yesAdvanced Materials, EarlyView.
Advanced broadband photodetector technologies are essential for military and civilian applications. 2D semimetals, with their gapless band structures, high mobility, and topological protection, offer great promise for broadband PDs. This study reviews the latest advancements in broadband PDs utilizing heterostructures that combine 2D semimetals with ...
Xue Li   +9 more
wiley   +1 more source

Internet security for mobile computing [PDF]

open access: yes, 2017
Mobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks.
Davis, Vincent Anthony
core   +1 more source

Application of Deep Learning Algorithm for Web Shell Detection in Web Application Security System

open access: yesJurnal Sisfokom
A web shell is a script executed on a web server, often used by hackers to gain control over an infected server. Detecting web shells is challenging due to their complex behavior patterns. This research focuses on using a deep learning approach to detect
Rezky Yuranda, Edi Surya Negara
doaj   +1 more source

Home - About - Disclaimer - Privacy