Results 41 to 50 of about 3,104,297 (275)

Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses [PDF]

open access: yesProceedings on Privacy Enhancing Technologies, 2017
Website Fingerprinting (WF) attacks raise major concerns about users’ privacy. They employ Machine Learning (ML) techniques to allow a local passive adversary to uncover the Web browsing behavior of a user, even if she browses through an encrypted tunnel
Giovanni Cherubin
semanticscholar   +1 more source

Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning [PDF]

open access: yesConference on Computer and Communications Security, 2018
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor.
Payap Sirinam   +3 more
semanticscholar   +1 more source

Security Analysis of the Final Project Information System (SITASI) Website using Penetration Testing Method

open access: yesSistemasi: Jurnal Sistem Informasi
The Final Project Information System (SITASI) website plays a critical role in supporting academic administrative processes at the Faculty of Science and Technology, UIN Sultan Syarif Kasim Riau.
Rengga Renaldi   +3 more
doaj   +1 more source

IT Support Website Security Evaluation Using Vulnerability Assessment Tools

open access: yesJournal of Information Systems and Informatics, 2022
Vulnerability Assessment is one of the crucial stages that must be carried out to define and identify vulnerabilities in web systems so that they can be repaired and reduced.
Rio Armando   +4 more
doaj   +1 more source

Enhancing Website Security Using Vulnerability Assessment and Penetration Testing (VAPT) Based on OWASP Top Ten

open access: yesJournal of Applied Informatics and Computing
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah   +3 more
doaj   +1 more source

Secure Architecture for E-commerce Websites

open access: yesSir Syed University Research Journal of Engineering & Technology, 2019
With the rapid growth of Information Technology(IT), the current markets are being transformed into e-markets/ecommerce.This has created a need for a secure approach toimplement e-commerce and to keep its security. To meet thisneed, Service Oriented Architecture (SOA), is one of the bestproficiencies to opt to, because it is flexible and easy to use ...
Tooba Ahmed, Tauseef Rana
openaire   +3 more sources

Cognitive Status in People With Epilepsy in the Republic of Guinea: A Prospective, Case–Control Study

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick   +14 more
wiley   +1 more source

Penerapan Multiple Attribute Decision Making dengan Metode Simple Additive Weighting untuk Pemeringkatan Kerentanan Keamanan Website

open access: yesJurnal Elkomika, 2018
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI   +3 more
doaj   +1 more source

Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]

open access: yes, 2012
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu   +2 more
core  

Usability of Humanly Computable Passwords

open access: yes, 2018
Reusing passwords across multiple websites is a common practice that compromises security. Recently, Blum and Vempala have proposed password strategies to help people calculate, in their heads, passwords for different sites without dependence on third ...
Kalai, Adam Tauman   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy