咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web Application Vulnerabilities"
25 条 记 录,以下是11-20 订阅
排序:
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector  25
ASPIDA: An Observatory for Security and Privacy in the Greek...
收藏 引用
25th Pan-Hellenic Conference on Informatics with International Participation (PCI)
作者: Vlachos, Vasileios Katevas, Gerasimos Katsidimas, Ioannis Kerimakis, Emmanouil Nikoletseas, Sotiris Panagiotou, Stefanos Spirakis, Paul Univ Thessaly Volos Greece Comp Technol Inst & Press Diophantus CTI Volos Greece Univ Patras Comp Engn & Informat Dept Patras Greece Univ Liverpool Liverpool Merseyside England
Modern e-business policy aims to better frame and steer progress and advancements towards a legal and security aware framework. However, a large percentage of cases neglects the adoption of good security practices, ex... 详细信息
来源: 评论
Towards a Deep Learning Model for Vulnerability Detection on web application Variants  13
Towards a Deep Learning Model for Vulnerability Detection on...
收藏 引用
13th IEEE International Conference on Software Testing, Verification and Validation (ICST)
作者: Fidalgo, Ana Medeiros, Iberia Antunes, Paulo Neves, Nuno Univ Lisbon Fac Ciencias LASIGE Lisbon Portugal
Reported vulnerabilities have grown significantly over the recent years, with SQL injection (SQLi) being one of the most prominent, especially in web applications. For these, such increase can be explained by the inte... 详细信息
来源: 评论
A Pilot Study on Secure Code Generation with ChatGPT forweb applications  24
A Pilot Study on Secure Code Generation with ChatGPT forWeb ...
收藏 引用
Annual ACM Southeast Conference (ACMSE)
作者: Jamdade, Mahesh Liu, Yi Univ Massachusetts Dartmouth Dartmouth MA 02747 USA
Conversational Large Language Models (LLMs), such as ChatGPT, have demonstrated their potent capabilities in natural language processing tasks. This paper presents a pilot study that uses ChatGPT for generating web ap... 详细信息
来源: 评论
web application Security Tools Analysis  3
Web Application Security Tools Analysis
收藏 引用
IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity) / 3rd IEEE International Conference on High Performance and Smart Computing (HPSC) / 2nd IEEE International Conference on Intelligent Data and Security (IDS)
作者: Alzahrani, Abdulrahman Alqazzaz, Ali Fu, Huirong Almashfi, Nabil Zhu, Ye Oakland Univ Dept Comp Sci & Engn Rochester MI 48309 USA Cleveland State Univ Elect & Comp Engn Dept Cleveland OH 44115 USA
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issu... 详细信息
来源: 评论
Positive Security Model based Server-side Solution for prevention of Cross-site Scripting Attacks  12
Positive Security Model based Server-side Solution for preve...
收藏 引用
12 IEEE Int C Elect Energy Env Communications Computer Control
作者: Maurya, Swati Deenbandhu Chhotu Ram Univ Sci & Technol Dept Comp Sci & Engn Murthal Haryana India
The latest advancements in the internet and communication technology has made day-to-day life fully dependent on web applications as all the facilities are available at just one click. Network failure, data breaches, ... 详细信息
来源: 评论
Towards Improving web Attack Detection: Highlighting the Significant Factors  5
Towards Improving Web Attack Detection: Highlighting the Sig...
收藏 引用
5th International Conference on IT Convergence and Security (ICITCS)
作者: Wazzan, Majda A. Awadh, Mohammad H. King Abdulaziz Univ Deanship Informat Technol Secur Tech Unit Jeddah Saudi Arabia King Abdulaziz Univ Fac Engn Dept Elect & Comp Engn Jeddah Saudi Arabia
Nowadays, with the rapid development of Internet, the use of web is increasing and the web applications have become a substantial part of people's daily life ( e. g. E-Government, E-Health and E-Learning), as they... 详细信息
来源: 评论
Challenges for Security Typed web Scripting Languages Design
Challenges for Security Typed Web Scripting Languages Design
收藏 引用
4th International Symposium on Information Assurance and Security
作者: Hassan, Doaa El-Kassas, Sherif Ziedan, Ibrahim National Telecomm Institute American University in Cairo Faculty of Engineering Zagazig University
This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a subset of the security typed web langu... 详细信息
来源: 评论
Idea: Automatic Security Testing for web applications
Idea: Automatic Security Testing for Web Applications
收藏 引用
1st International Symposium on Engineering Secure Software and Systems
作者: Dao, Thanh-Binh Shibayama, Etsuya Tokyo Inst Technol Dept Math & Comp Sci Meguro Ku 2-12-1 O Okayama Tokyo 152 Japan Univ Tokyo Ctr Informat Technol Tokyo Japan
With the increasingly important role of web applications in online set-vices and business systems, vulnerabilities such as SQL Injection have become serious security threats. Finding these vulnerabilities by manual te... 详细信息
来源: 评论
Towards a Taxonomy for Security Threats on the web Ecosystem
Towards a Taxonomy for Security Threats on the Web Ecosystem
收藏 引用
IEEE/IFIP Network Operations and Management Symposium (NOMS)
作者: Silva, Carlo Batista, Ricardo Queiroz, Ruy Garcia, Vinicius Silva, Jose Gatti, Daniel Assad, Rodrigo Nascimento, Leandro Brito, Kellyton Miranda, Pericles Univ Fed Pernambuco CIn Recife PE Brazil PUC SP TiDD Sao Paulo SP Brazil Univ Fed Rural Pernambuco DEINFO Recife PE Brazil
The aim of this paper is to present a taxonomy for security threats on the web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstra... 详细信息
来源: 评论
Cross site request forgery: A common web application weakness
Cross site request forgery: A common web application weaknes...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Siddiqui, Mohd. Shadab Verma, Deepanker UPTU: C.S and e SRMCEM Lucknow India UPTU: CS and e IERT Allahabad India
Now a days, most of the people use internet for their business and commercial use. This advancement of technology make our daily life better but there are so many risks due to some web applications vulnerabilities. Cr... 详细信息
来源: 评论