咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 20 篇 计算机科学与技术...
    • 8 篇 信息与通信工程
    • 6 篇 电气工程
    • 6 篇 软件工程
    • 2 篇 网络空间安全
    • 1 篇 仪器科学与技术
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 24 篇 api security
  • 4 篇 security
  • 3 篇 oauth
  • 2 篇 information flow...
  • 2 篇 anomaly detectio...
  • 2 篇 authentication
  • 2 篇 android
  • 2 篇 testing
  • 2 篇 privacy
  • 2 篇 restful api
  • 1 篇 cyber security
  • 1 篇 random forest
  • 1 篇 android automoti...
  • 1 篇 attack detection
  • 1 篇 authorization cl...
  • 1 篇 deep learning
  • 1 篇 domain driven de...
  • 1 篇 xored-hills ciph...
  • 1 篇 api management
  • 1 篇 context-based fi...

机构

  • 2 篇 ryerson univ dep...
  • 1 篇 ryerson univ com...
  • 1 篇 department of co...
  • 1 篇 flora telecom lt...
  • 1 篇 mahidol univ fac...
  • 1 篇 chalmers univ te...
  • 1 篇 goa univ goa bus...
  • 1 篇 graz univ techno...
  • 1 篇 norwegian univ s...
  • 1 篇 ariel univ dept ...
  • 1 篇 independent rese...
  • 1 篇 hosei univ grad ...
  • 1 篇 natl taiwan ocea...
  • 1 篇 maggioli spa res...
  • 1 篇 berryhill high s...
  • 1 篇 eastern bank ltd...
  • 1 篇 univ agder dept ...
  • 1 篇 ariel univ ariel...
  • 1 篇 holisun srl dept...
  • 1 篇 univ piraeus dep...

作者

  • 2 篇 ferworn alexande...
  • 2 篇 joosen wouter
  • 2 篇 sharieh salah
  • 1 篇 li sen
  • 1 篇 philippaerts pie...
  • 1 篇 sun ronghua
  • 1 篇 tan chaohong
  • 1 篇 ma shang-pin
  • 1 篇 dvir amit
  • 1 篇 thomas daniel r.
  • 1 篇 he yang
  • 1 篇 visoottiviseth v...
  • 1 篇 taylor adrian
  • 1 篇 dimova yana
  • 1 篇 alwaheidi mohamm...
  • 1 篇 moiz abdul
  • 1 篇 jahan sharmin
  • 1 篇 khatiwada pankaj
  • 1 篇 erdei rudolf
  • 1 篇 suzic bojan

语言

  • 24 篇 英文
检索条件"主题词=API Security"
24 条 记 录,以下是1-10 订阅
排序:
An api security Framework for IoT-Enabled Healthcare System with the Application Blockchain-Based Smart Contract
收藏 引用
SN Computer Science 2024年 第8期5卷 1044页
作者: Kumar, Sandeep Shaw, Dilip Kumar Department of CSE National Institute of Technology Jharkhand Jamshedpur 831014 India
Healthcare (HC) systems must address the security, privacy, and trust issues due to the rapid advancements in technological *** visualizing these concepts, there are different approaches. However, they are inefficient... 详细信息
来源: 评论
Research Towards Key Issues of api security  18th
Research Towards Key Issues of API Security
收藏 引用
18th Annual Conference on China Cyber security (CNCERT)
作者: Sun, Ronghua Wang, Qianxun Guo, Liang Data Star Observ Technol Co Ltd Beijing Peoples R China
With the mass application of virtualization, micro-services, and cloud-native technologies, the interaction between service entities through apis has become a norm. Many platforms are still maintaining a large number ... 详细信息
来源: 评论
Web api security Vulnerabilities and Mitigation Mechanisms: A Systematic Mapping Study  9
Web API Security Vulnerabilities and Mitigation Mechanisms: ...
收藏 引用
9th International Conference in Software Engineering Research and Innovation (CONISOFT)
作者: Alejandro Diaz-Rojas, Josue Octavio Ocharan-Hernandez, Jorge Carlos Perez-Arriaga, Juan Limon, Xavier Univ Veracruzana Sch Stat & Informat Xalapa Veracruz Mexico
The growth of the web over the last couple of decades opened the door for the creation of an increasing number of web-based software systems. This change brought the need for new software solutions to establish commun... 详细信息
来源: 评论
The Application of RNN-based api Data security Detection in Government Cloud Service  10
The Application of RNN-based API Data Security Detection in ...
收藏 引用
10th International Conference on Advanced Cloud and Big Data (CBD)
作者: Wen, Jing Tan, Chaohong Chen, Jining Zhao, Qin Li, Sen Zhou, Fei Guangxi Zhuang Autonomous Reg Informat Ctr Joint Innovat Lab Digital GuangXi Smart Infrastru Nanning Peoples R China
As the government has accelerated the transition to the public service-oriented government and deepened smart government affairs, the electronic government model based on cloud computing has gradually become an import... 详细信息
来源: 评论
Intelligent Service Mesh Framework for api security and Management  10
Intelligent Service Mesh Framework for API Security and Mana...
收藏 引用
IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
作者: Hussain, Fatima Li, Weiyue Noye, Brett Sharieh, Salah Ferworn, Alexander Royal Bank Canada Toronto ON Canada Ryerson Univ Dept Comp Sci Toronto ON Canada
With the advancements in enterprise-level business development, the demand for new applications and services is *** the development and delivery of such applications and services, enterprise businesses rely on Applica... 详细信息
来源: 评论
LLM-Driven, Self-Improving Framework for security Test Automation: Leveraging Karate DSL for Augmented api Resilience
收藏 引用
IEEE ACCESS 2025年 13卷 56861-56886页
作者: Pasca, Emil Marian Delinschi, Daniela Erdei, Rudolf Matei, Oliviu Tech Univ Cluj Napoca North Univ Ctr Baia Mare Dept Elect Elect & Comp Engn Baia Mare 430122 Romania HOLISUN SRL Dept Res & Dev Baia Mare 430397 Romania
Modern software architectures heavily rely on apis, yet face significant security challenges, particularly with Broken Object Level Authorization (BOLA) vulnerabilities, which remain the most critical api security ris... 详细信息
来源: 评论
A Practical Model Driven Approach for Designing security Aware RESTful Web apis Using SOFL
收藏 引用
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS 2023年 第5期E106D卷 986-1000页
作者: Emeka, Busalire Onesmus Hidaka, Soichiro Liu, Shaoying Hosei Univ Grad Sch Comp & Informat Sci Koganei 1848584 Japan Hiroshima Univ Grad Sch Adv Sci & Engn Higashihiroshima 7390046 Japan AlpsAlpine Co Ltd Iwaki Fukushima 9701144 Japan
RESTful web apis have become ubiquitous with most modern web applications embracing the micro-service architecture. A RESTful api provides data over the network using HTTP probably in-teracting with databases and othe... 详细信息
来源: 评论
A classification-by-retrieval framework for few-shot anomaly detection to detect api injection
收藏 引用
COMPUTERS & security 2025年 150卷
作者: Aharon, Udi Dubin, Ran Dvir, Amit Hajaj, Chen Dept Comp & Software Engn Golan Hts 1 IL-4077625 Ariel Israel Ariel Univ Ariel Cyber Innovat Ctr Golan Hts 1 IL-4077625 Ariel Israel Ariel Univ Data Sci & Artificial Intelligence Res Ctr Golan Hts 1 IL-4077625 Ariel Israel Ariel Univ Dept Ind Engn & Management Golan Hts 1 IL-4077625 Ariel Israel
Application Programming Interface (api) Injection attacks refer to the unauthorized or malicious use of apis, which are often exploited to gain access to sensitive data or manipulate online systems for illicit purpose... 详细信息
来源: 评论
Adoption of Deep-Learning Models for Managing Threat in api Calls with Transparency Obligation Practice for Overall Resilience
收藏 引用
SENSORS 2024年 第15期24卷 4859页
作者: Basheer, Nihala Islam, Shareeful Alwaheidi, Mohammed K. S. Papastergiou, Spyridon Anglia Ruskin Univ Sch Comp & Informat Sci Cambridge CB1 1PT England MAGGIOLI SPA Res & Innovat Andrea Papandreou 19 Marousi Athens 15124 Greece Cybersecur Consultancy Serv Dept Securol Jeddah 23334 Saudi Arabia Univ Piraeus Dept Informat Piraeus 18534 Greece
System-to-system communication via Application Programming Interfaces (apis) plays a pivotal role in the seamless interaction among software applications and systems for efficient and automated service delivery. apis ... 详细信息
来源: 评论
Enhancing User Authentication: An Approach Utilizing Context-Based Fingerprinting With Random Forest Algorithm
收藏 引用
IEEE ACCESS 2024年 12卷 110850-110861页
作者: Al-Rumaim, Akram Pawar, Jyoti D. Goa Univ Goa Business Sch Taleigao 403206 Goa India
In the evolving world of Cyber Attacks, this research presents an innovative approach aimed at fortifying user authentication within the Application Programming Interfaces (apis) Ecosystem. We employ a groundbreaking ... 详细信息
来源: 评论