Results 251 to 260 of about 149,520 (284)
Some of the next articles are maybe not open access.
Evolutionary Scanner of Web Application Vulnerabilities
2016With every passing year, there are more and more websites, which often process sensitive and/or valuable information. Due to models like Continuous Development, manual testing and code review are reduced to minimum, with new features implemented and deployed even on the same day.
Dariusz Palka +2 more
openaire +1 more source
Web Vulnerability Assessment: Outsource dilemmas
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, 2011Vulnerability Assessment (VAS) is a process to search for any potential loopholes contain in a system that lead to compromise it. It is important to do VAS on the system to make sure that it will be safely release and not offer any illegitimate access that can affect availability, confidentiality and integrity of the system[1][12].
Arniyati Ahmad +3 more
openaire +1 more source
Predicting Web Vulnerabilities in Web Applications Based on Machine Learning
2019Building a secure website is time-consuming, expensive and challenging task for web developers. Researchers to identify webpage sinks to address security efforts, as it helps to reduce time and money to secure web application, are introducing different web vulnerabilities prediction models.
Muhammad Noman Khalid +4 more
openaire +1 more source
Vulnerability Report Analysis and Vulnerability Reproduction for Web Applications
2023Weiwei Wang +3 more
openaire +1 more source
Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0
Journal of Discrete Mathematical Sciences and Cryptography, 2021Nazar Abbas Saqib +2 more
exaly
Web applications vulnerabilities analysis
2016From the last twenty five years, the web has evolved into an important part of our lives. There are web applications for every kind of job and activity. In parallel, all this situation is very attractive for attackers who want to manipulate users’ data and other sensitive information.
openaire +1 more source
Code Privacy in Detection of Web Vulnerabilities
Proceedings of the 27th International Conference on Evaluation and Assessment in Software Engineering, 2023Jorge Martins +2 more
openaire +1 more source
Web Application Vulnerabilities and Countermeasures
2014Chapter 3 identified many commonly found vulnerabilities in my real experience as an auditor. This chapter explains how to remediate each vulnerability. For both chapters, the vulnerabilities and their remediations are grouped into classes or variations on a theme of susceptibility. The classes are:
openaire +1 more source
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
Computers and Security, 2021Meera Sridhar, Kevin W Hamlen
exaly

