Zobrazeno 1 - 10
of 6 052
pro vyhledávání: '"Web application security"'
Autor:
Artem Tetskyi, Dmytro Uzun
Publikováno v:
Радіоелектронні і комп'ютерні системи, Vol 2024, Iss 3, Pp 166-174 (2024)
Many financial institutions and payment solution providers are required to comply with PCI DSS (Payment Card Industry Data Security Standard). Such requirements are understandable, as compliance helps in reducing the risks of data leaks and financial
Externí odkaz:
https://doaj.org/article/c8d430028481488f8c4d4ddabab57039
Publikováno v:
Tongxin xuebao, Vol 45, Pp 117-130 (2024)
To solve the problem that the access control strategy of the program in the industrial Internet was difficult to extract from the source code, and that the user’s access operation was difficult to trigger all access paths, which led to the difficul
Externí odkaz:
https://doaj.org/article/2a9763690df5401da9240e0f535f7911
Publikováno v:
SoftwareX, Vol 27, Iss , Pp 101809- (2024)
Most contemporary web applications are primarily coded in interpreted languages (JavaScript, PHP, Python...) and are initiated by the web server. This requires solving the persistence issue: HTTP/HTTPS is a stateless protocol but user identity and co
Externí odkaz:
https://doaj.org/article/9859cc8e950b4540910789bbce674b34
Autor:
Onur Aktas, Ahmet Burak Can
Publikováno v:
IEEE Access, Vol 12, Pp 161688-161696 (2024)
The widespread use of web applications requires important changes in cybersecurity to protect online services and data. In the process of identifying security vulnerabilities in web applications, a systematic approach is employed to detect and mitiga
Externí odkaz:
https://doaj.org/article/6d3a32cb1bab4f07bedd1f77fc6964f9
Autor:
Shao-Fang Wen
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 34, Iss 1, Pp 182-https://youtu.be/VoG7qsK5UZw (2023)
In the digital era, web applications have become a prevalent tool for businesses. As the number of web applications continues to grow, they become enticing targets for malicious actors seeking to exploit potential security vulnerabilities. Organizati
Externí odkaz:
https://doaj.org/article/2024ab5a77724ca281ddfdb210bb2026
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 10, Pp 10068-10078 (2022)
Web applications’ security is critical because we share sensitive data through them frequently, which attracts attackers who exploit their vulnerabilities. Detecting and exploiting such vulnerabilities automatically is challenging because of the ap
Externí odkaz:
https://doaj.org/article/9af45db30cd64bd9833d73142d6d7893
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 7, Pp 101628- (2023)
Web applications are paramount tools for facilitating services providing in the modern world. Unfortunately, the tremendous growth in the web application usage has resulted in a rise in cyberattacks. Cross-site scripting (XSS) is one of the most freq
Externí odkaz:
https://doaj.org/article/fe48f31eec624551872584b06bdcc078
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 35, Iss 6, Pp 101490- (2023)
Web applications’ popularity has raised attention in various service domains, which increased the concern about cyber-attacks. One of these most serious and frequent web application attacks is a Cross-site scripting attack (XSS). It causes grievous
Externí odkaz:
https://doaj.org/article/8373364c0bc84475b72abf46a3c797fd
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.