Results 1 to 10 of about 1,157,333 (342)

The Internet: Where Did IT All Go Wrong?

open access: yesSCRIPTed: A Journal of Law, Technology & Society, 2008
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj   +1 more source

Improved Phishing Attack Detection with Machine Learning: A Comprehensive Evaluation of Classifiers and Features

open access: yesApplied Sciences, 2023
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and
Sibel Kapan, Efnan Sora Gunal
doaj   +1 more source

Integration biometrics in web application: Security for web apps [PDF]

open access: yesInternational Research Journal of Science, Technology, Education, and Management, 2023
To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by ...
Wulandari Kusuma Herdanu   +2 more
doaj   +1 more source

Web engineering security: essential elements [PDF]

open access: yes, 2007
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core   +1 more source

Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP

open access: yesIEEE Access, 2019
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing.
Hengfu Yang, Jianping Yin, Ying Yang
doaj   +1 more source

BlackWatch:increasing attack awareness within web applications [PDF]

open access: yes, 2019
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents.
Coull, Natalie   +2 more
core   +3 more sources

A Survey of Exploitation and Detection Methods of XSS Vulnerabilities

open access: yesIEEE Access, 2019
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu   +3 more
doaj   +1 more source

Learning DOM Trees of Web Pages by Subpath Kernel and Detecting Fake e-Commerce Sites

open access: yesMachine Learning and Knowledge Extraction, 2021
The subpath kernel is a class of positive definite kernels defined over trees, which has the following advantages for the purposes of classification, regression and clustering: it can be incorporated into a variety of powerful kernel machines including ...
Kilho Shin   +3 more
doaj   +1 more source

Toward Exposing Timing-Based Probing Attacks in Web Applications

open access: yesSensors, 2017
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao   +4 more
doaj   +1 more source

Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites

open access: yesIEEE Access, 2022
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users’ resources without their consent, despite the anticipated positive effect of browser-based cryptomining.
Hyunji Hong   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy