咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 61 篇 期刊文献
  • 7 篇 学位论文
  • 1 册 图书

馆藏范围

  • 182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 165 篇 工学
    • 145 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 44 篇 电气工程
    • 20 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 生物工程
  • 11 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 7 篇 理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地理学
    • 1 篇 地球物理学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 医学
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学

主题

  • 182 篇 web application ...
  • 17 篇 sql injection
  • 13 篇 machine learning
  • 12 篇 xss
  • 11 篇 cross-site scrip...
  • 10 篇 software securit...
  • 9 篇 anomaly detectio...
  • 8 篇 static analysis
  • 7 篇 vulnerability de...
  • 6 篇 cyber security
  • 6 篇 penetration test...
  • 6 篇 access control
  • 6 篇 cross site scrip...
  • 5 篇 deep learning
  • 5 篇 web application ...
  • 5 篇 security vulnera...
  • 5 篇 network security
  • 5 篇 sql injection at...
  • 4 篇 secure coding
  • 4 篇 cross-site scrip...

机构

  • 3 篇 malviya natl ins...
  • 2 篇 beijing univ tec...
  • 2 篇 natl inst techno...
  • 2 篇 king abdulaziz u...
  • 2 篇 univ sains malay...
  • 2 篇 vanderbilt univ ...
  • 2 篇 utp univ sci & t...
  • 2 篇 arab open univ f...
  • 2 篇 katholieke univ ...
  • 2 篇 virginia tech | ...
  • 2 篇 univ putra malay...
  • 2 篇 stanford univ st...
  • 1 篇 univ bridgeport ...
  • 1 篇 int islamic univ...
  • 1 篇 univ washington ...
  • 1 篇 ilma univ fac co...
  • 1 篇 saarland univ sa...
  • 1 篇 king abdulaziz u...
  • 1 篇 department of co...
  • 1 篇 chonnam natl uni...

作者

  • 4 篇 deepa g.
  • 4 篇 zaaba zarul fitr...
  • 4 篇 thilagam p. sant...
  • 4 篇 marashdih abdall...
  • 3 篇 govil mahesh cha...
  • 3 篇 kozik rafal
  • 3 篇 sabelfeld andrei
  • 3 篇 johns martin
  • 3 篇 choras michal
  • 3 篇 gupta mukesh kum...
  • 3 篇 joosen wouter
  • 3 篇 xue yuan
  • 3 篇 singh girdhari
  • 3 篇 pais alwyn r.
  • 3 篇 desmet lieven
  • 2 篇 ko ryan k. l.
  • 2 篇 alhuzali abeer
  • 2 篇 visaggio corrado...
  • 2 篇 samsudin khairul...
  • 2 篇 hashim shaiful j...

语言

  • 180 篇 英文
  • 1 篇 葡萄牙文
  • 1 篇 中文
检索条件"主题词=Web Application Security"
182 条 记 录,以下是1-10 订阅
排序:
web application security engineering
收藏 引用
IEEE security & PRIVACY 2006年 第4期4卷 16-24页
作者: Meier, J. D. Microsoft Corp Redmond WA 98052 USA
Integrating security throughout the life cycle can improve overall web application security. With a detailed review of the steps involved in applying security-specific activities throughout the software development li... 详细信息
来源: 评论
web application security: An Investigation on Static Analysis with other Algorithms to Detect Cross Site Scripting  5
Web Application Security: An Investigation on Static Analysi...
收藏 引用
5th Information Systems International Conference (ISICO) on Role of Information Systems in Industry 4.0
作者: Marashdih, Abdalla Wasef Zaaba, Zarul Fitri Suwais, Khaled Mohd, Nur Azimah Univ Sains Malaysia Sch Comp Sci George Town 11800 Malaysia Arab Open Univ Fac Comp Studies Jeddah Saudi Arabia
Among web application vulnerabilities, XSS is the most frequently occurring. Where a web application accepts a user-input, it is possible for such vulnerability to inject malicious scripts. The greater part of the lit... 详细信息
来源: 评论
web application security Tools Analysis  3
Web Application Security Tools Analysis
收藏 引用
IEEE 3rd International Conference on Big Data security on Cloud (BigDatasecurity) / 3rd IEEE International Conference on High Performance and Smart Computing (HPSC) / 2nd IEEE International Conference on Intelligent Data and security (IDS)
作者: Alzahrani, Abdulrahman Alqazzaz, Ali Fu, Huirong Almashfi, Nabil Zhu, Ye Oakland Univ Dept Comp Sci & Engn Rochester MI 48309 USA Cleveland State Univ Elect & Comp Engn Dept Cleveland OH 44115 USA
Strong security in web applications is critical to the success of your online presence. security importance has grown massively, especially among web applications. Dealing with web application or website security issu... 详细信息
来源: 评论
Ontology for attack detection: An intelligent approach to web application security
收藏 引用
COMPUTERS & security 2014年 45卷 124-146页
作者: Razzaq, Abdul Anwar, Zahid Ahmad, H. Farooq Latif, Khalid Munir, Faisal Natl Univ Sci & Technol Sch Elect Engn & Comp Sci Islamabad Pakistan King Faisal Univ Coll Comp Sci & Informat Technol Alahssa 31982 Saudi Arabia
Conventional detection techniques struggle to keep up with the inherent complexity of web application design and hence the ever growing variety of attacks that can exploit it. security frameworks modeled using an onto... 详细信息
来源: 评论
web application security: An Investigation on Static Analysis with other Algorithms to Detect Cross Site Scripting
收藏 引用
Procedia Computer Science 2019年 161卷 1173-1181页
作者: Abdalla Wasef Marashdih Zarul Fitri Zaaba Khaled Suwais Nur Azimah Mohd School of Computer Sciences Universiti Sains Malaysia 11800 Pulau Pinang Malaysia Faculty of Computer Studies Arab Open University Saudi Arabia
Among web application vulnerabilities, XSS is the most frequently occurring. Where a web application accepts a user-input, it is possible for such vulnerability to inject malicious scripts. The greater part of the lit... 详细信息
来源: 评论
Defending on-line web application security with user-behavior surveillance
Defending on-line web application security with user-behavio...
收藏 引用
3rd International Conference on Availability, Reliability and security
作者: Cheng, Yu-Chin Laih, Chi-Sung Lai, Gu-Hsin Chen, Chia-Mei Chen, Tsuhan Natl Cheng Kung Univ Tainan 70101 Taiwan Natl Sun Yat Sen Univ Kaohsiung Taiwan Carnegie Mellon Univ Pittsburgh PA 15213 USA
With the incoming of information era, web-based service has been developed rapidly and offered more and more business. These "open", and widely "web enabled" applications are subject to greater and... 详细信息
来源: 评论
webHOLE: Developing a web-based hands-on learning environment to assist beginners in learning web application security
收藏 引用
EDUCATION AND INFORMATION TECHNOLOGIES 2024年 第6期29卷 6579-6610页
作者: Su, Jun-Ming Natl Univ Tainan Dept Informat & Learning Technol Tainan Taiwan
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginne... 详细信息
来源: 评论
Work in Progress - web Penetration Testing: Effectiveness of Student Learning in web application security
Work in Progress - Web Penetration Testing: Effectiveness of...
收藏 引用
41st Annual Frontiers in Education Conference (FIE)
作者: Kam, Hwee-Joo Pauli, Joshua J. North Cent Michigan Coll Petoskey MI USA Dakota State Univ Madison SD USA
web penetration testing embodies both the understanding of attack and defense philosophies. By learning malicious hacking activities, students will understand the perspectives of attackers and realize how to defend a ... 详细信息
来源: 评论
On the applicability of combinatorial testing to web application security testing: A case study  2
On the applicability of combinatorial testing to web applica...
收藏 引用
2nd International Workshop on "Joining AcadeMiA and Industry Contributions to Test Automation and Model-Based Testing", JAMAICA 2014
作者: Garn, Bernhard Kapsalis, Ioannis Simos, Dimitris E. Winkler, Severin SBA Research ViennaA-1040 Austria Security Research ViennaA-1040 Austria
Case studies for evaluating tools in security testing are powerful. Although they cannot achieve the scientific rigor of formal experiments, the results can provide sufficient information to help professionals judge i... 详细信息
来源: 评论
Towards an Understanding of web application security Threats and Incidents
收藏 引用
Journal of Information Privacy and security 2011年 第4期7卷 54-69页
作者: Gerhard Steinke[a] Emanuel Tundrea[b] & Kenmoro Kelly[a] [a] Seattle Pacific University - Seattle USA [b] Emanuel University - Oradea Romania
This paper examines a variety of sources that provide web application security vulnerabilities and incident data. In particular, the research tracks the impact of SQL Injection, Cross-Site Scripting and Cross-Site Req... 详细信息
来源: 评论