Results 31 to 40 of about 783,488 (290)
Protokol HTTPS, Apakah Benar-benar Aman?
In particular, the method used in this research is a case study where previously the p3m.pnp.ac.id website still uses the http protocol. However http protocol does not have a method of securing data in its communication.
Deddy Prayama, Yuhefizar, Amelia Yolanda
doaj +1 more source
The Final Project Information System (SITASI) website plays a critical role in supporting academic administrative processes at the Faculty of Science and Technology, UIN Sultan Syarif Kasim Riau.
Rengga Renaldi +3 more
doaj +1 more source
IT Support Website Security Evaluation Using Vulnerability Assessment Tools
Vulnerability Assessment is one of the crucial stages that must be carried out to define and identify vulnerabilities in web systems so that they can be repaired and reduced.
Rio Armando +4 more
doaj +1 more source
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses
Tor provides low-latency anonymous and uncensored network access against a local or network adversary. Due to the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client's ...
Adamic Lada A +8 more
core +1 more source
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah +3 more
doaj +1 more source
Secure Architecture for E-commerce Websites
With the rapid growth of Information Technology(IT), the current markets are being transformed into e-markets/ecommerce.This has created a need for a secure approach toimplement e-commerce and to keep its security. To meet thisneed, Service Oriented Architecture (SOA), is one of the bestproficiencies to opt to, because it is flexible and easy to use ...
Tooba Ahmed, Tauseef Rana
openaire +3 more sources
Campus Website Security Vulnerability Analysis Using Nessus
Agencies or organizations are competing to create websites for their agencies, where this website to make work easier or disseminate information to the public in this study is a college or campus website. With this website, many people access it, so there is a possibility of security holes, which can be exploited by irresponsible people.
Muhammad Abdul Muin +2 more
openaire +1 more source
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu +2 more
core
Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations [PDF]
Many millions of users routinely use their Google, Facebook and Microsoft accounts to log in to websites supporting OAuth 2.0-based single sign on. The security of OAuth 2.0 is therefore of critical importance, and it has been widely examined both in ...
C Bansal, DL Dill, E Shernan, W Li, W Li
core +2 more sources
Age‐Related Characteristics of SYT1‐Associated Neurodevelopmental Disorder
ABSTRACT Objectives We describe the clinical manifestations and developmental abilities of individuals with SYT1‐associated neurodevelopmental disorder (Baker‐Gordon syndrome) from infancy to adulthood. We further describe the neuroradiological and electrophysiological characteristics of the condition at different ages, and explore the associations ...
Sam G. Norwitz +3 more
wiley +1 more source

