咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web Application Vulnerabilities"
25 条 记 录,以下是1-10 订阅
排序:
A Method for web application vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm  3rd
A Method for Web Application Vulnerabilities Detection by Us...
收藏 引用
3rd Information Systems International Conference
作者: Saleh, Ain Zubaidah Mohd Rozali, Nur Amizah Buja, Alya Geogiana Jalil, Kamarularifin Abd. Ali, Fakariah Hani Mohd Rahman, Teh Faradilla Abdul Univ Teknol MARA Shah Alam 40000 Malaysia Univ Teknol MARA Merlimau 77300 Melaka Malaysia Univ Teknol MARA Kuala Selangor 42300 Selangor Malaysia
Internet have become a great medium of communication as it is free, supportive, entertaining and easily for reachable to millions of people today. The usage of Internet among people become higher day by day, thus also... 详细信息
来源: 评论
Predicting Common web application vulnerabilities from Input Validation and Sanitization Code Patterns  12
Predicting Common Web Application Vulnerabilities from Input...
收藏 引用
27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Shar, Lwin Khin Tan, Hee Beng Kuan Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate the threats posed by common web application vulnerabiliti... 详细信息
来源: 评论
A Survey on web application vulnerabilities and Countermeasures
A Survey on Web Application Vulnerabilities and Countermeasu...
收藏 引用
6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Atashzar, Hasty Torkaman, Atefeh Bahrololum, Marjan Tadayon, Mohammad H. ICT Research Institute (ITRC) Iran
Security vulnerabilities continue to infect web applications, allowing attackers to access sensitive data and exploiting legitimate web sites as a hosting ground for malware. Consequently, researchers have focused on ... 详细信息
来源: 评论
Effect of Coding Styles in Detection of web application vulnerabilities  16
Effect of Coding Styles in Detection of Web Application Vuln...
收藏 引用
16th European Dependable Computing Conference (EDCC)
作者: Medeiros, Iberia Neves, Nuno Univ Lisbon Fac Ciencias LASIGE Lisbon Portugal
web application security has become paramount for the organisation's operation, and therefore, static analysis tools (SAT) for vulnerability detection have been widely researched in the last years. Nevertheless, S... 详细信息
来源: 评论
A Method for web application vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
收藏 引用
Procedia Computer Science 2015年 72卷 112-121页
作者: Ain Zubaidah Mohd Saleh Nur Amizah Rozali Alya Geogiana Buja Kamarularifin Abd. Jalil Fakariah Hani Mohd Ali Teh Faradilla Abdul Rahman Universiti Teknologi MARA Shah Alam 40000 Selangor Universiti Teknologi MARA Kampus Jasin Merlimau 77300 Melaka Universiti Teknologi MARA Kampus Puncak Alam Kuala Selangor 42300 Selangor
Internet have become a great medium of communication as it is free, supportive, entertaining and easily for reachable to millions of people today. The usage of Internet among people become higher day by day, thus also... 详细信息
来源: 评论
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第11期10卷 4377-4405页
作者: Gupta, Shashank Gupta, B. B. Birla Inst Technol & Sci Dept Comp Sci & Informat Syst Pilani 333031 Rajasthan India Natl Inst Technol Kurukshetra Dept Comp Engn Kurukshetra 136119 Haryana India
XSS is well- thought-out to be an industry-wide problem that is affecting the diverse contemporary web platforms. The collection of most recent web application reports revealed that XSS reserved the topmost position a... 详细信息
来源: 评论
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 3966-3986页
作者: Gupta, Shashank Gupta, Brij Bhooshan Natl Inst Technol Dept Comp Engn Kurukshetra Haryana India
In this paper, the authors analyzed and discussed the performance issues in the existing cross-site scripting (XSS) filters and based on that, proposed a JavaScript string comparison and context-aware sanitization-bas... 详细信息
来源: 评论
Context-oriented web application protection model
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2016年 285卷 59-78页
作者: Prokhorenko, Victor Choo, Kim-Kwang Raymond Ashman, Helen Univ S Australia Sch Informat Technol & Math Sci Adelaide SA 5095 Australia
Due to growing user demand, web application development is becoming increasingly complicated. Multiple programming languages along with the complex multi-tier architecture commonly involved in web application developm... 详细信息
来源: 评论
Exploring Defense of SQL Injection Attack in Penetration Testing
收藏 引用
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2017年 第4期9卷 62-71页
作者: Zhu, Alex Yan, Wei Qi Auckland Univ Technol Auckland New Zealand Auckland Univ Technol Sch Comp & Math Sci Auckland New Zealand
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also en... 详细信息
来源: 评论
KAVE: A Knowledge-Based Multi-Agent System for web Vulnerability Detection
KAVE: A Knowledge-Based Multi-Agent System for Web Vulnerabi...
收藏 引用
IEEE International Conference on web Services (IEEE ICWS)
作者: Ramires, Rafael Respicio, Ana Medeiros, Iberia Univ Lisbon LASIGE DI Fac Ciencias Lisbon Portugal
The growing use of the web has led to a rise in cyber attacks exploiting software vulnerabilities, thereby causing significant damage to companies and individuals. Static analysis tools can assist programmers in ident... 详细信息
来源: 评论