Results 41 to 50 of about 6,128 (199)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer +7 more
core +1 more source
SafeWeb: A Middleware for Securing Ruby-Based Web Applications [PDF]
Web applications in many domains such as healthcare and finance must process sensitive data, while complying with legal policies regarding the release of different classes of data to different parties.
A. Chaudhuri +15 more
core +7 more sources
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of the Industrial Internet-of-Things (IIoT) for smart manufacturing applications.
Hichem Mrabet +3 more
doaj +1 more source
Securing Web Applications from malware attacks using hybrid feature extraction [PDF]
In this technological era, many of the applications are taking the utilization of services of internet in order to cater to the needs of its users. With the rise in number of internet users, there's a substantial inflation within the internet attacks ...
Gopireddy Venkata, Kalyani +2 more
core
Atomically Resolved Acoustic Dynamics Coupled with Magnetic Order in a Van der Waals Antiferromagnet
Magnetically coupled acoustic phonon modes (f1, f2, f3) are captured by ultrafast X‐ray diffraction in a prototypical van der Waals antiferromagnet FePS3, including their atomic displacement vectors (u) and the acoustic propagation wave vectors (k). Notably, the atomic displacement vector and amplitude of these modes, represented by the direction and ...
Faran Zhou +24 more
wiley +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
ABSTRACT As software applications get increasingly connected and complex, cybersecurity becomes more and more important to consider during development and evaluation. Software engineers need to be aware of various security threats and the countermeasures that can be taken to mitigate them.
Raffaela Groner +5 more
wiley +1 more source
XSShield: Defending Against Stored XSS Attacks Using LLM-Based Semantic Understanding
Cross-site scripting attacks represent one of the major security threats facing web applications, with Stored XSS attacks becoming the predominant form. Compared to reflected XSS, stored XSS attack payloads exhibit temporal and spatial asynchrony between
Yuan Zhou +7 more
doaj +1 more source
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir +6 more
wiley +1 more source

