Zobrazeno 1 - 10
of 43
pro vyhledávání: '"File inclusion vulnerability"'
Autor:
Muhammad Izzad Ramli, Ku Ahmad Haziq Hezret Bin Che Ku Mohd Sahidi, Zolidah Kasiran, Muhammad Azizi Mohd Ariffin
Publikováno v:
ICSIPA
Web applications have made communication and services for users extremely simple because of the user-friendly interface, global accessibility, and ease of management. However, careless web application design and implementation are crucial to a securi
Autor:
Andrey Averin, Natalya Zyulyarkina
Publikováno v:
2020 Global Smart Industry Conference (GloSIC).
Today’s rapidly changing world, is observing fast development of QR-code and Blockchain technologies. It is worth noting that these technologies have also received a boost for sharing. The user gets the opportunity to receive / send funds, issue in
Publikováno v:
IEEE Access, Vol 6, Pp 77829-77840 (2018)
Code injection attacks (CIAs) exploit security vulnerabilities and computer bugs that are caused by processing invalid codes. CIA is a problem which hackers attempt to introduce to any new method, their objective being to bypass the protection system
Autor:
Hossain Shahriar, Hisham M. Haddad
Publikováno v:
International Journal of Secure Software Engineering. 7:1-18
This paper addresses the problem of assessing risk in web application due to implementation level vulnerabilities. In particular, the authors address the common research challenge of finding enough historical data to compute the probability of vulner
Publikováno v:
Scientific Journals of Rzeszów University of Technology, Series: Electrotechnics. :35-46
Autor:
A. B. M. Alim Al Islam, Mazharul Islam, Novia Nurain, Salauddin Parvez Shams, Md. Nazmuddoha Ansary
Publikováno v:
NSysS
Recent emergence of new vulnerabilities is an epoch-making problem in the complex world of website security. Most of the websites are failing to keep updating to tackle their websites from these new vulnerabilities leaving without realizing the weakn
Publikováno v:
i-manager's Journal on Information Technology. 4:25-33
Autor:
Divya Rishi Sahu, Deepak Singh Tomar
Publikováno v:
International Journal of Computer Network and Information Security. 7:21-28
With the increase in technology, Internet has provided set of tools and technologies which has enabled web programmers to develop effective websites. PHP is most widely used server side scripting language and more than twenty million of web sites are
Autor:
Dilip Motwani, Saba Khan
Publikováno v:
2017 International Conference on Intelligent Computing and Control (I2C2).
Web application security is a threat to the world's information technology infrastructure. The most widely used accepted solution to this threat is to deploy an Intrusion Detection System(IDS). Such systems currently rely on either signature of the a
Publikováno v:
2017 International Conference on Recent Advances in Electronics and Communication Technology (ICRAECT).
Proper identification is important for providing secure facilities and services to user. Cloud computing is involved in our day to day life as it offers several services, storage spaces, applications etc. As the usage increases, vulnerability and sec