Results 41 to 50 of about 3,104,297 (275)
Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses [PDF]
Website Fingerprinting (WF) attacks raise major concerns about users’ privacy. They employ Machine Learning (ML) techniques to allow a local passive adversary to uncover the Web browsing behavior of a user, even if she browses through an encrypted tunnel
Giovanni Cherubin
semanticscholar +1 more source
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning [PDF]
Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor.
Payap Sirinam +3 more
semanticscholar +1 more source
The Final Project Information System (SITASI) website plays a critical role in supporting academic administrative processes at the Faculty of Science and Technology, UIN Sultan Syarif Kasim Riau.
Rengga Renaldi +3 more
doaj +1 more source
IT Support Website Security Evaluation Using Vulnerability Assessment Tools
Vulnerability Assessment is one of the crucial stages that must be carried out to define and identify vulnerabilities in web systems so that they can be repaired and reduced.
Rio Armando +4 more
doaj +1 more source
Website security is one of the main concerns in the digital era, given the increasing potential for cyber threats. This research aims to improve website security by using the Vulnerability Assessment and Penetration Testing (VAPT) method that refers to ...
Diana Rohmaniah +3 more
doaj +1 more source
Secure Architecture for E-commerce Websites
With the rapid growth of Information Technology(IT), the current markets are being transformed into e-markets/ecommerce.This has created a need for a secure approach toimplement e-commerce and to keep its security. To meet thisneed, Service Oriented Architecture (SOA), is one of the bestproficiencies to opt to, because it is flexible and easy to use ...
Tooba Ahmed, Tauseef Rana
openaire +3 more sources
ABSTRACT Objective People with epilepsy (PWE) may experience cognitive deficits but fail to undergo formal evaluation. This study compares cognitive status between PWE and healthy controls in the West African Republic of Guinea. Methods A cross‐sectional, case–control study was conducted in sequential recruitment phases (July 2024–July 2025) at Ignace ...
Maya L. Mastick +14 more
wiley +1 more source
ABSTRAK Pada universitas, website dibangun sebagai jendela informasi elektronik yang menyediakan informasi tentang pendidikan tinggi. Namun, adanya celah keamanan pada website berpotensi untuk dieksploitasi bagi kriminal teknologi informasi. Berdasarkan
RIZAL MUNADI +3 more
doaj +1 more source
Website Application Security Scanner Using Local File Inclusion and Remote File Inclusion [PDF]
Today many web-based applications developed to be accessible via the internet. The problem that often occurs is commonly found on web application vulnerabilities.
Gunawan, Ibnu +2 more
core
Usability of Humanly Computable Passwords
Reusing passwords across multiple websites is a common practice that compromises security. Recently, Blum and Vempala have proposed password strategies to help people calculate, in their heads, passwords for different sites without dependence on third ...
Kalai, Adam Tauman +2 more
core +1 more source

