咨询与建议

限定检索结果

文献类型

  • 113 篇 会议
  • 61 篇 期刊文献
  • 7 篇 学位论文
  • 1 册 图书

馆藏范围

  • 182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 165 篇 工学
    • 145 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 44 篇 电气工程
    • 19 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 3 篇 电子科学与技术(可...
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 测绘科学与技术
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 土木工程
    • 1 篇 石油与天然气工程
    • 1 篇 交通运输工程
    • 1 篇 食品科学与工程(可...
    • 1 篇 生物工程
  • 10 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 7 篇 理学
    • 3 篇 数学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 地理学
    • 1 篇 地球物理学
  • 6 篇 教育学
    • 6 篇 教育学
  • 3 篇 医学
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 文学
    • 2 篇 新闻传播学

主题

  • 182 篇 web application ...
  • 17 篇 sql injection
  • 13 篇 machine learning
  • 12 篇 xss
  • 11 篇 software securit...
  • 11 篇 cross-site scrip...
  • 9 篇 anomaly detectio...
  • 9 篇 static analysis
  • 7 篇 vulnerability de...
  • 6 篇 cyber security
  • 6 篇 penetration test...
  • 6 篇 access control
  • 6 篇 cross site scrip...
  • 5 篇 deep learning
  • 5 篇 web application ...
  • 5 篇 security vulnera...
  • 5 篇 security testing
  • 5 篇 network security
  • 5 篇 sql injection at...
  • 4 篇 secure coding

机构

  • 3 篇 malviya natl ins...
  • 2 篇 beijing univ tec...
  • 2 篇 natl inst techno...
  • 2 篇 king abdulaziz u...
  • 2 篇 univ sains malay...
  • 2 篇 vanderbilt univ ...
  • 2 篇 utp univ sci & t...
  • 2 篇 arab open univ f...
  • 2 篇 katholieke univ ...
  • 2 篇 virginia tech | ...
  • 2 篇 univ putra malay...
  • 2 篇 stanford univ st...
  • 1 篇 univ bridgeport ...
  • 1 篇 int islamic univ...
  • 1 篇 univ washington ...
  • 1 篇 ilma univ fac co...
  • 1 篇 saarland univ sa...
  • 1 篇 king abdulaziz u...
  • 1 篇 department of co...
  • 1 篇 chonnam natl uni...

作者

  • 4 篇 deepa g.
  • 4 篇 zaaba zarul fitr...
  • 4 篇 thilagam p. sant...
  • 4 篇 marashdih abdall...
  • 3 篇 govil mahesh cha...
  • 3 篇 kozik rafal
  • 3 篇 sabelfeld andrei
  • 3 篇 johns martin
  • 3 篇 choras michal
  • 3 篇 gupta mukesh kum...
  • 3 篇 joosen wouter
  • 3 篇 xue yuan
  • 3 篇 singh girdhari
  • 3 篇 pais alwyn r.
  • 3 篇 desmet lieven
  • 2 篇 ko ryan k. l.
  • 2 篇 walden james
  • 2 篇 alhuzali abeer
  • 2 篇 visaggio corrado...
  • 2 篇 samsudin khairul...

语言

  • 180 篇 英文
  • 1 篇 葡萄牙文
  • 1 篇 中文
检索条件"主题词=Web Application Security"
182 条 记 录,以下是61-70 订阅
排序:
Detection and Removing Cross Site Scripting Vulnerability in PHP web application
Detection and Removing Cross Site Scripting Vulnerability in...
收藏 引用
International Conference on Promising Electronic Technologies (ICPET)
作者: Marashdih, Abdalla Wasef Zaaba, Zarul Fitri Univ Sains Malaysia Sch Comp Sci Minden 11800 Pulau Pinang Malaysia
Cross Site Scripting (XSS) vulnerability acts as one of the chief widespread security issues in web applications. By reviewing the literature pertaining to XSS vulnerability, it has been found that many investigations... 详细信息
来源: 评论
Static Analysis for web Service security - Tools & Techniques for a Secure Development Life Cycle
Static Analysis for Web Service Security - Tools & Technique...
收藏 引用
IEEE International Symposium on Technologies for Homeland security (HST)
作者: Masood, Adnan Java, Jim Nova Southeastern Univ Grad Sch Comp & Informat Sci Ft Lauderdale FL 33314 USA
In this ubiquitous IoT (Internet of Things) era, web services have become a vital part of today's critical national and public sector infrastructure. With the industry wide adaptation of service-oriented architect... 详细信息
来源: 评论
An Approach to Generate Realistic HTTP Parameters for application Layer Deception  20th
An Approach to Generate Realistic HTTP Parameters for Applic...
收藏 引用
20th International Conference on Applied Cryptography and Network security (ACNS)
作者: Sahin, Merve Hebert, Cedric Lozoya, Rocio Cabrera SAP Secur Res Sophia Antipolis France
Deception is a form of active defense that aims to confuse and divert attackers who try to tamper with a system. Deceptive techniques have been proposed for web application security, in particular, to enrich a given a... 详细信息
来源: 评论
Payload Recognition and Detection of Cross Site Scripting Attack  2
Payload Recognition and Detection of Cross Site Scripting At...
收藏 引用
2nd International Conference on Anti-Cyber Crimes (ICACC)
作者: Zalbina, M. Ridwan Septian, Tri Wanda Stiawan, Deris Idris, Moh. Yazid Heryanto, Ahmad Budiarto, Rahmat Sriwijaya Univ Fac Comp Sci Dept Comp Engn Inderalaya Indonesia Univ Teknol Malaysia Fac Comp Johor Baharu Malaysia Albaha Univ Coll Comp Sci & IT Albaha Saudi Arabia
web application becomes the leading solution for the utilization of systems that need access globally, distributed, cost-effective, as well as the diversity of the content that can run on this technology. At the same ... 详细信息
来源: 评论
SQL Injection is Still Alive: A Study on SQL Injection Signature Evasion Techniques
SQL Injection is Still Alive: A Study on SQL Injection Signa...
收藏 引用
International Conference on Informatics and Creative Multimedia (ICICM)
作者: Sadeghian, Amirmohammad Zamani, Mazdak Ibrahim, Suhaimi Univ Teknol Malaysia Adv Informat Sch Kuala Lumpur Malaysia
SQL injection is one of the biggest challenges for the web application security. Based on the studies by OWASP, SQL injection has the highest rank in the web based vulnerabilities. In case of a successful SQL injectio... 详细信息
来源: 评论
Towards a Secure SCRUM Process for Agile web application Development  17
Towards a Secure SCRUM Process for Agile Web Application Dev...
收藏 引用
12th International Conference on Availability, Reliability and security (ARES)
作者: Maier, Patrik Ma, Zhendong Bloem, Roderick Graz Univ Technol Inst Appl Informat Proc & Commun Graz Austria Austrian Inst Technol Ctr Digital Safety & Secur Vienna Austria
Agile development such as Scrum and Extreme Programming deliver software in short iterations for quick response to rapid business requirement and market changes. However, established secure software development method... 详细信息
来源: 评论
Half-Baked Cookies: Hardening Cookie-Based Authentication for the Modern web  16
Half-Baked Cookies: Hardening Cookie-Based Authentication fo...
收藏 引用
11th ACM Asia Conference on Computer and Communications security (ASIA CCS)
作者: Mundada, Yogesh Feamster, Nick Krishnamurthy, Balachander Georgia Tech Atlanta GA 30332 USA Princeton Univ Princeton NJ 08544 USA AT&T Labs Res Florham Pk NJ USA
Modern websites use multiple authentication cookies to allow visitors to the site different levels of access. The complexity of modern web applications can make it difficult for a web application programmer to ensure ... 详细信息
来源: 评论
XSS Attack Prevention Using DOM-Based Filter  4th
XSS Attack Prevention Using DOM-Based Filter
收藏 引用
4th International Conference on Advanced Computing, Networking and Informatics (ICACNI)
作者: Dalai, Asish Kumar Ankush, Shende Dinesh Jena, Sanjay Kumar Natl Inst Technol Rourkela Rourkela India Maverick Labs Pvt Ltd Pune Maharashtra India
Cross-site scripting (XSS) is one of the most critical vulnerabilities found inweb applications. XSS vulnerability present inweb application that takes untrusted data and sends it to a web browser without proper input... 详细信息
来源: 评论
Idea: Java vs. PHP: security Implications of Language Choice for web applications  10
Idea: Java vs. PHP: Security Implications of Language Choice...
收藏 引用
2nd International Symposium on Engineering Secure Software and Systems
作者: Walden, James Doyle, Maureen Lenhof, Robert Murray, John No Kentucky Univ Dept Comp Sci Highland Hts KY 41099 USA
While Java and PEEP are two of the most popular languages for open source web applications found at ***, Java has had a much better security reputation than PHP. In this paper, we examine whether that reputation is de... 详细信息
来源: 评论
A Survey on web application Vulnerabilities and Countermeasures
A Survey on Web Application Vulnerabilities and Countermeasu...
收藏 引用
6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Atashzar, Hasty Torkaman, Atefeh Bahrololum, Marjan Tadayon, Mohammad H. ICT Research Institute (ITRC) Iran
security vulnerabilities continue to infect web applications, allowing attackers to access sensitive data and exploiting legitimate web sites as a hosting ground for malware. Consequently, researchers have focused on ... 详细信息
来源: 评论