Results 291 to 300 of about 4,673,218 (333)
Some of the next articles are maybe not open access.
Analysis of Web Security Using Open Web Application Security Project 10
2020 8th International Conference on Cyber and IT Service Management (CITSM), 2020Open Web Application Security Project 10 is a web application security testing framework method that focuses on web application security to find weaknesses in a website.
Muhamad Agreindra Helmiawan +5 more
semanticscholar +1 more source
SecureOnt: A Security Ontology for Establishing Data Provenance in Semantic Web
Journal of Web Engineering, 2022Security becomes a primary concern during sharing of information over the web. To overcome this problem, many security ontologies have been developed so far. The available security ontologies help to track data provenance and contain different aspects of
Archana Patel, N. Debnath, P. Shukla
semanticscholar +1 more source
Benchmarking Static Analysis Tools for Web Security
IEEE Transactions on Reliability, 2018Static analysis tools are recurrently used by developers to search for vulnerabilities in the source code of web applications. However, distinct tools provide different results depending on factors such as the complexity of the code under analysis and ...
P. Nunes +5 more
semanticscholar +1 more source
Evaluation of the IPO-Family algorithms for test case generation in web security testing
International Conference on Software Testing, Verification and Validation Workshops, 2015Security testing of web applications remains a major problem of software engineering. In order to reveal vulnerabilities, testing approaches use different strategies for detection of certain kinds of inputs that might lead to a security breach.
Josip Bozic +3 more
semanticscholar +1 more source
WASP: Benchmarking Web Agent Security Against Prompt Injection Attacks
arXiv.orgAutonomous UI agents powered by AI have tremendous potential to boost human productivity by automating routine tasks such as filing taxes and paying bills.
Ivan Evtimov +4 more
semanticscholar +1 more source
Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection
IEEE Transactions on Dependable and Secure Computing, 2014In this paper we propose a methodology and a prototype tool to evaluate web application security mechanisms. The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used ...
J. Fonseca, M. Vieira, H. Madeira
semanticscholar +1 more source
International Workshop on Big Data and Information Security, 2020
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks.
Rizki Agung Muzaki +3 more
semanticscholar +1 more source
The use of web applications has been undergoing rapid increase. Many individuals, groups, organizations or governments use web applications as a means to exchange information or support business-related tasks.
Rizki Agung Muzaki +3 more
semanticscholar +1 more source
BlackWidow: Monitoring the Dark Web for Cyber Security Information
International Conference on Cyber Conflict, 2019The Dark Web, a conglomerate of services hidden from search engines and regular users, is used by cyber criminals to offer all kinds of illegal services and goods.
Matthias Schäfer +5 more
semanticscholar +1 more source
Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application
2019 4th International Conference on Information Systems and Computer Networks (ISCON), 2019In the present scenario, the usage of internet is enormous and is escalating day by day. Internet facilities are employed in almost every field of work and people are becoming depending on it, with the increasing dependency on the internet, concern ...
Arvind Goutam, V. Tiwari
semanticscholar +1 more source
A Novel Method to Detect and Prevent SQLIA Using Ontology to Cloud Web Security
Wireless personal communications, 2020K. N. Durai, R. Subha, A. Haldorai
semanticscholar +1 more source

