Results 11 to 20 of about 1,157,333 (342)

A Knowledge-Based Integrated System of Hesitant Fuzzy Set, AHP and TOPSIS for Evaluating Security-Durability of Web Applications

open access: yesIEEE Access, 2020
There has been a phenomenal increase in the use of web applications in every facet of human endeavor. From education, healthcare, banking, business to governance and so much more now depends on secure web applications.
Rajeev Kumar   +5 more
doaj   +3 more sources

Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

open access: yesIEEE Access, 2019
Ensuring sustainable-security of web applications for minimizing security breaches and enhancing users' trust and satisfaction is the foremost priority of all security experts and web developers.
Alka Agrawal   +3 more
doaj   +3 more sources

Fast and Clean: Auditable high-performance assembly via constraint solving

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Handwritten assembly is a widely used tool in the development of highperformance cryptography: By providing full control over instruction selection, instruction scheduling, and register allocation, highest performance can be unlocked.
Amin Abdulrahman   +3 more
doaj   +1 more source

Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks

open access: yesSensors, 2023
New techniques and tactics are being used to gain unauthorized access to the web that harm, steal, and destroy information. Protecting the system from many threats such as DDoS, SQL injection, cross-site scripting, etc., is always a challenging issue ...
Babu R. Dawadi   +2 more
doaj   +1 more source

Utilizing Object Capabilities to Improve Web Application Security [PDF]

open access: yesApplied Cybersecurity & Internet Governance, 2022
Nowadays, more and more applications are built with web technologies, such as HTML, CSS, and JavaScript, which are then executed in browsers. The web is utilized as an operating system independent application platform.
Michael Koppmann   +3 more
doaj   +1 more source

PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning

open access: yesIEEE Access, 2023
Cyber security confronts a tremendous challenge of maintaining the confidentiality and integrity of user’s private information such as password and PIN code.
Muzammil Ahmed   +6 more
doaj   +1 more source

Web development evolution: the assimilation of web engineering security [PDF]

open access: yes, 2002
In today’s e-commerce environment, information is an incredibly valuable asset. Surveys indicate that companies are suffering staggering financial losses due to web security issues.
Bailey, Chris   +3 more
core   +3 more sources

Ensemble Machine Learning Approaches for Detection of SQL Injection Attack

open access: yesTehnički Glasnik, 2021
In the current era, SQL Injection Attack is a serious threat to the security of the ongoing cyber world particularly for many web applications that reside over the internet. Many webpages accept the sensitive information (e.g.
Umar Farooq
doaj   +1 more source

WEB ATTACKS AND DEFENSES [PDF]

open access: yesمجلة التربية والعلم, 2023
Because of the limited data that web applications collect from users, they are subject to information security risks. The most effective way to retain data in the modern era is through online applications.
Ammar A. Alobaidi, Najla B. Al Dabbagh
doaj   +1 more source

Measuring the Security Effectiveness of Machine Learning Methods Used Against Cyber Attacks in Web Applications

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2021
The rapid progress of technological developments in the global world, the people to closely follow these developments and share them have become the focus of cybercriminals.
Mesut TOĞAÇAR
doaj   +1 more source

Home - About - Disclaimer - Privacy