Results 11 to 20 of about 4,673,218 (333)
The Web SSO Standard OpenID Connect: In-depth Formal Security Analysis and Security Guidelines [PDF]
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal are based on the OpenID Connect protocol. This protocol enables so-called relying parties to delegate user authentication to so-called identity providers.
Daniel Fett, Ralf Küsters, G. Schmitz
semanticscholar +3 more sources
Web development evolution: the assimilation of web engineering security [PDF]
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Glisson, W.B., Welland, R.
core +3 more sources
Research on link detection technology based on dynamic browser fingerprint
With the emergence of user privacy leakage and online fraud, traditional detection mechanisms can no longer stop the intensified attacks and new methods are needed to assist in web security detection.As a bridge between users and network data, browsers ...
Fan GAO, Jian WANG, Jiqiang LIU
doaj +1 more source
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and
Sibel Kapan, Efnan Sora Gunal
doaj +1 more source
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications.
Jahanzeb Shahid +5 more
semanticscholar +1 more source
Ensemble Machine Learning Approaches for Detection of SQL Injection Attack
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj +1 more source
The Internet: Where Did IT All Go Wrong?
It is hard to imagine life today without the Internet, and all of the benefits that it brings to our business and personal lives: convenient, cheap and instant communication across time zones and national boundaries; online shopping and banking; document
Robert Schifreen
doaj +1 more source
Web engineering security: essential elements [PDF]
Security is an elusive target in today’s high-speed and extremely complex, Web enabled, information rich business environment. This paper presents the idea that there are essential, basic organizational elements that need to be identified, defined and ...
Glisson, W.B., Welland, R.
core +1 more source
Malicious URL Detection Based on Associative Classification
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim’s computer remotely. The purpose of most malware is to gain access
Sandra Kumi, ChaeHo Lim, Sang-Gon Lee
doaj +1 more source
Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing.
Hengfu Yang, Jianping Yin, Ying Yang
doaj +1 more source

