咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web Application Vulnerabilities"
25 条 记 录,以下是21-30 订阅
排序:
web application SECURITY: SHELL ACCESS
WEB APPLICATION SECURITY: SHELL ACCESS
收藏 引用
作者: Koponen, Kalle LAPPEENRANTA UNIVERSITY OF TECHNOLOGY
学位级别:硕士
This study presents how it is possible to get a shell access to the target system using common web application vulnerabilities. Both the client and server side are breached. Attacks are described step by step and resu... 详细信息
来源: 评论
Exploring Defense of SQL Injection Attack in Penetration Testing
Exploring Defense of SQL Injection Attack in Penetration Tes...
收藏 引用
作者: Yao Chu Zhu Auckland University of Technology
学位级别:硕士
SQLIA is adopted to attack websites with and without confidential information. Hackers utilize the compromisedwebsite as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enla... 详细信息
来源: 评论
Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment
收藏 引用
COMPUTERS & SECURITY 2021年 103卷 102204-102204页
作者: Caturano, Francesco Perrone, Gaetano Romano, Simon Pietro Univ Napoli Federico II Dept Elect Engn & Informat Technol Via Claudio 21 I-80125 Naples Italy
Tools that automate testing of web applications for Cross-Site Scripting (XSS) vulnerabilities perform well when they have a strong knowledge base. Though, they heavily rely on brute force, which is not always an effe... 详细信息
来源: 评论
DANGEROUSNESS OF CLIENT-SIDE CODE EXECUTION WITH MICROSOFT OFFICE
收藏 引用
COMPUTING AND INFORMATICS 2024年 第5期43卷 1219-1233页
作者: Dora, Jean Rosemond Hluchy, Ladislav Slovak Acad Sci Inst Informat Dubravska cesta 9 Bratislava 84507 Slovakia
Gaining unauthorized remote access to an environment is generally done either by exploiting a vulnerable service, or application that is internet-based;or by tricking a user into executing malicious codes. The former ... 详细信息
来源: 评论
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector  2021
ASPIDA: An Observatory for Security and Privacy in the Greek...
收藏 引用
25th Pan-Hellenic Conference on Informatics
作者: Vasileios Vlachos Gerasimos Katevas Ioannis Katsidimas Emmanouil Kerimakis Sotiris Nikoletseas Stefanos Panagiotou Paul Spirakis Department of Economics University of Thessaly Greece and Computer Technology Institute and Press Greece University of Patras Greece University of Patras Greece and Computer Technology Institute and Press Greece
Modern e-business policy aims to better frame and steer progress and advancements towards a legal and security aware framework. However, a large percentage of cases neglects the adoption of good security practices, ex... 详细信息
来源: 评论