Results 21 to 30 of about 783,488 (290)

RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2021
Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and low delay, but it also brings challenges in data security and privacy.
Tao Luo   +4 more
doaj   +1 more source

PENGARUH E-SERVICE QUALITY TERHADAP KEPUASAN PENGGUNA APLIKASI GRAB DI KOTA KUPANG

open access: yesJournal of Management Small and Medium Enterprises (SME's), 2023
This study aims to determine and analyze (1) the partial effect of e-service quality (website design, reliability, responsiveness, security/privacy, fulfillment, personalization, information, and empathy) on Grab Application users in Kupang City and (2)
Juita L D Bessie, Lea Susanti Taek
doaj   +1 more source

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj   +1 more source

Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

open access: yesJournal of Cybersecurity and Privacy, 2021
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts
Jean Rosemond Dora, Karol Nemoga
doaj   +1 more source

Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework

open access: yesJISA (Jurnal Informatika dan Sains), 2023
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj   +1 more source

Application of Blockchain Technology in e-LoA Technopreneurship Journal

open access: yesAptisi Transactions on Technopreneurship, 2020
LoA or Letter of Acceptance is a statement received. LoA is usually used as a statement of scholarship acceptance or even journal acceptance. In addition, the current issuance of LoA is still conventional, using paper as the access medium.
Alexander Williams, Ellen Dolan
doaj   +1 more source

Security control for website defacement

open access: yesSistemas y Telemática, 2017
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations.
Oscar, Mondragón   +3 more
openaire   +4 more sources

MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj   +1 more source

Metode Vulnerability Assesment Dalam Pengujian Kinerja Sistem Keamanan Website Points of Sales

open access: yesComputer Science
Perkembangan perdagangan elektronik melalui website berbasis point of sales terkait erat dengan tingkat pertumbuhan internet, karena perdagangan elektronik berjalan melalui jaringan dan koneksi Internet. Namun, semakin banyaknya website berbasis point of
Wahyudin Wahyudin   +3 more
doaj   +1 more source

PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites

open access: yes, 2017
Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process.
Herrmann, Dominik   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy