咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web application vulnerabilities"
25 条 记 录,以下是1-10 订阅
排序:
Effect of Coding Styles in Detection of web application vulnerabilities  16
Effect of Coding Styles in Detection of Web Application Vuln...
收藏 引用
16th European Dependable Computing Conference (EDCC)
作者: Medeiros, Iberia Neves, Nuno Univ Lisbon Fac Ciencias LASIGE Lisbon Portugal
web application security has become paramount for the organisation's operation, and therefore, static analysis tools (SAT) for vulnerability detection have been widely researched in the last years. Nevertheless, S... 详细信息
来源: 评论
A Method for web application vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm  3rd
A Method for Web Application Vulnerabilities Detection by Us...
收藏 引用
3rd Information Systems International Conference
作者: Saleh, Ain Zubaidah Mohd Rozali, Nur Amizah Buja, Alya Geogiana Jalil, Kamarularifin Abd. Ali, Fakariah Hani Mohd Rahman, Teh Faradilla Abdul Univ Teknol MARA Shah Alam 40000 Malaysia Univ Teknol MARA Merlimau 77300 Melaka Malaysia Univ Teknol MARA Kuala Selangor 42300 Selangor Malaysia
Internet have become a great medium of communication as it is free, supportive, entertaining and easily for reachable to millions of people today. The usage of Internet among people become higher day by day, thus also... 详细信息
来源: 评论
A Method for web application vulnerabilities Detection by Using Boyer-Moore String Matching Algorithm
收藏 引用
Procedia Computer Science 2015年 72卷 112-121页
作者: Ain Zubaidah Mohd Saleh Nur Amizah Rozali Alya Geogiana Buja Kamarularifin Abd. Jalil Fakariah Hani Mohd Ali Teh Faradilla Abdul Rahman Universiti Teknologi MARA Shah Alam 40000 Selangor Universiti Teknologi MARA Kampus Jasin Merlimau 77300 Melaka Universiti Teknologi MARA Kampus Puncak Alam Kuala Selangor 42300 Selangor
Internet have become a great medium of communication as it is free, supportive, entertaining and easily for reachable to millions of people today. The usage of Internet among people become higher day by day, thus also... 详细信息
来源: 评论
KAVE: A Knowledge-Based Multi-Agent System for web Vulnerability Detection
KAVE: A Knowledge-Based Multi-Agent System for Web Vulnerabi...
收藏 引用
IEEE International Conference on web Services (IEEE ICWS)
作者: Ramires, Rafael Respicio, Ana Medeiros, Iberia Univ Lisbon LASIGE DI Fac Ciencias Lisbon Portugal
The growing use of the web has led to a rise in cyber attacks exploiting software vulnerabilities, thereby causing significant damage to companies and individuals. Static analysis tools can assist programmers in ident... 详细信息
来源: 评论
A Pilot Study on Secure Code Generation with ChatGPT forweb applications  24
A Pilot Study on Secure Code Generation with ChatGPT forWeb ...
收藏 引用
Annual ACM Southeast Conference (ACMSE)
作者: Jamdade, Mahesh Liu, Yi Univ Massachusetts Dartmouth Dartmouth MA 02747 USA
Conversational Large Language Models (LLMs), such as ChatGPT, have demonstrated their potent capabilities in natural language processing tasks. This paper presents a pilot study that uses ChatGPT for generating web ap... 详细信息
来源: 评论
DANGEROUSNESS OF CLIENT-SIDE CODE EXECUTION WITH MICROSOFT OFFICE
收藏 引用
COMPUTING AND INFORMATICS 2024年 第5期43卷 1219-1233页
作者: Dora, Jean Rosemond Hluchy, Ladislav Slovak Acad Sci Inst Informat Dubravska cesta 9 Bratislava 84507 Slovakia
Gaining unauthorized remote access to an environment is generally done either by exploiting a vulnerable service, or application that is internet-based;or by tricking a user into executing malicious codes. The former ... 详细信息
来源: 评论
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector  25
ASPIDA: An Observatory for Security and Privacy in the Greek...
收藏 引用
25th Pan-Hellenic Conference on Informatics with International Participation (PCI)
作者: Vlachos, Vasileios Katevas, Gerasimos Katsidimas, Ioannis Kerimakis, Emmanouil Nikoletseas, Sotiris Panagiotou, Stefanos Spirakis, Paul Univ Thessaly Volos Greece Comp Technol Inst & Press Diophantus CTI Volos Greece Univ Patras Comp Engn & Informat Dept Patras Greece Univ Liverpool Liverpool Merseyside England
Modern e-business policy aims to better frame and steer progress and advancements towards a legal and security aware framework. However, a large percentage of cases neglects the adoption of good security practices, ex... 详细信息
来源: 评论
Predicting Common web application vulnerabilities from Input Validation and Sanitization Code Patterns  12
Predicting Common Web Application Vulnerabilities from Input...
收藏 引用
27th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Shar, Lwin Khin Tan, Hee Beng Kuan Nanyang Technol Univ Sch Elect & Elect Engn Singapore 639798 Singapore
Software defect prediction studies have shown that defect predictors built from static code attributes are useful and effective. On the other hand, to mitigate the threats posed by common web application vulnerabiliti... 详细信息
来源: 评论
A Survey on web application vulnerabilities and Countermeasures
A Survey on Web Application Vulnerabilities and Countermeasu...
收藏 引用
6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)
作者: Atashzar, Hasty Torkaman, Atefeh Bahrololum, Marjan Tadayon, Mohammad H. ICT Research Institute (ITRC) Iran
Security vulnerabilities continue to infect web applications, allowing attackers to access sensitive data and exploiting legitimate web sites as a hosting ground for malware. Consequently, researchers have focused on ... 详细信息
来源: 评论
ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector  2021
ASPIDA: An Observatory for Security and Privacy in the Greek...
收藏 引用
25th Pan-Hellenic Conference on Informatics
作者: Vasileios Vlachos Gerasimos Katevas Ioannis Katsidimas Emmanouil Kerimakis Sotiris Nikoletseas Stefanos Panagiotou Paul Spirakis Department of Economics University of Thessaly Greece and Computer Technology Institute and Press Greece University of Patras Greece University of Patras Greece and Computer Technology Institute and Press Greece
Modern e-business policy aims to better frame and steer progress and advancements towards a legal and security aware framework. However, a large percentage of cases neglects the adoption of good security practices, ex... 详细信息
来源: 评论