Results 21 to 30 of about 783,488 (290)
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks
Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and low delay, but it also brings challenges in data security and privacy.
Tao Luo +4 more
doaj +1 more source
PENGARUH E-SERVICE QUALITY TERHADAP KEPUASAN PENGGUNA APLIKASI GRAB DI KOTA KUPANG
This study aims to determine and analyze (1) the partial effect of e-service quality (website design, reliability, responsiveness, security/privacy, fulfillment, personalization, information, and empathy) on Grab Application users in Kupang City and (2)
Juita L D Bessie, Lea Susanti Taek
doaj +1 more source
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj +1 more source
Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts
Jean Rosemond Dora, Karol Nemoga
doaj +1 more source
The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the ...
Yoel Armando, Rosalina Rosalina
doaj +1 more source
Application of Blockchain Technology in e-LoA Technopreneurship Journal
LoA or Letter of Acceptance is a statement received. LoA is usually used as a statement of scholarship acceptance or even journal acceptance. In addition, the current issuance of LoA is still conventional, using paper as the access medium.
Alexander Williams, Ellen Dolan
doaj +1 more source
Security control for website defacement
Cyber-attacks to websites are increasing steadily affecting the integrity and availability of information, so the implementation of safeguards to mitigate or reduce to acceptable levels the risks generated are necessary. Computer incidents produce economic and reputational impacts to different organizations.
Oscar, Mondragón +3 more
openaire +4 more sources
MITIGATION HANDLING OF SQL INJECTION ATTACKS ON WEBSITES USING OWASP FRAMEWORK
The development of the security system on the application of a website is now more advanced. But a software that has vulnerability will threaten all fields such as information system of health, defense, finance, and education.
imam riadi, Rusydi Umar, wasito sukarno
doaj +1 more source
Metode Vulnerability Assesment Dalam Pengujian Kinerja Sistem Keamanan Website Points of Sales
Perkembangan perdagangan elektronik melalui website berbasis point of sales terkait erat dengan tingkat pertumbuhan internet, karena perdagangan elektronik berjalan melalui jaringan dan koneksi Internet. Namun, semakin banyaknya website berbasis point of
Wahyudin Wahyudin +3 more
doaj +1 more source
PrivacyScore: Improving Privacy and Security via Crowd-Sourced Benchmarks of Websites
Website owners make conscious and unconscious decisions that affect their users, potentially exposing them to privacy and security risks in the process.
Herrmann, Dominik +3 more
core +1 more source

