Results 1 to 10 of about 4,673,218 (333)
Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting [PDF]
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Samaneh Tajalizadehkhoob +7 more
semanticscholar +3 more sources
Integration biometrics in web application: Security for web apps [PDF]
To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by ...
Wulandari Kusuma Herdanu +2 more
doaj +2 more sources
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications.
Rajeev Kumar +5 more
doaj +2 more sources
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal +3 more
doaj +2 more sources
Fast and Clean: Auditable high-performance assembly via constraint solving
Handwritten assembly is a widely used tool in the development of highperformance cryptography: By providing full control over instruction selection, instruction scheduling, and register allocation, highest performance can be unlocked.
Amin Abdulrahman +3 more
doaj +1 more source
Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi +2 more
doaj +1 more source
Utilizing Object Capabilities to Improve Web Application Security [PDF]
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann +3 more
doaj +1 more source
Usability, Accessibility and Web Security Assessment of E-government Websites in Tanzania [PDF]
In spite of the fact that e-government agency (ega) in Tanzania emphasize on the use of ICT within public institutions in Tanzania, accessibility, usability and web security vulnerabilities are still not considered by the majority of web developers.
Noe Elisa
semanticscholar +1 more source
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
Cyber security confronts a tremendous challenge of maintaining the confidentiality and integrity of user’s private information such as password and PIN code.
Muzammil Ahmed +6 more
doaj +1 more source
The rapid progress of technological developments in the global world, the people to closely follow these developments and share them have become the focus of cybercriminals.
Mesut TOĞAÇAR
doaj +1 more source

