咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web application vulnerabilities"
25 条 记 录,以下是11-20 订阅
排序:
Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment
收藏 引用
COMPUTERS & SECURITY 2021年 103卷 102204-102204页
作者: Caturano, Francesco Perrone, Gaetano Romano, Simon Pietro Univ Napoli Federico II Dept Elect Engn & Informat Technol Via Claudio 21 I-80125 Naples Italy
Tools that automate testing of web applications for Cross-Site Scripting (XSS) vulnerabilities perform well when they have a strong knowledge base. Though, they heavily rely on brute force, which is not always an effe... 详细信息
来源: 评论
Towards a Deep Learning Model for Vulnerability Detection on web application Variants  13
Towards a Deep Learning Model for Vulnerability Detection on...
收藏 引用
13th IEEE International Conference on Software Testing, Verification and Validation (ICST)
作者: Fidalgo, Ana Medeiros, Iberia Antunes, Paulo Neves, Nuno Univ Lisbon Fac Ciencias LASIGE Lisbon Portugal
Reported vulnerabilities have grown significantly over the recent years, with SQL injection (SQLi) being one of the most prominent, especially in web applications. For these, such increase can be explained by the inte... 详细信息
来源: 评论
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
收藏 引用
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2019年 第11期10卷 4377-4405页
作者: Gupta, Shashank Gupta, B. B. Birla Inst Technol & Sci Dept Comp Sci & Informat Syst Pilani 333031 Rajasthan India Natl Inst Technol Kurukshetra Dept Comp Engn Kurukshetra 136119 Haryana India
XSS is well- thought-out to be an industry-wide problem that is affecting the diverse contemporary web platforms. The collection of most recent web application reports revealed that XSS reserved the topmost position a... 详细信息
来源: 评论
Exploring Defense of SQL Injection Attack in Penetration Testing
收藏 引用
INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS 2017年 第4期9卷 62-71页
作者: Zhu, Alex Yan, Wei Qi Auckland Univ Technol Auckland New Zealand Auckland Univ Technol Sch Comp & Math Sci Auckland New Zealand
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also en... 详细信息
来源: 评论
web application Security Tools Analysis  3
Web Application Security Tools Analysis
收藏 引用
IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity) / 3rd IEEE International Conference on High Performance and Smart Computing (HPSC) / 2nd IEEE International Conference on Intelligent Data and Security (IDS)
作者: Alzahrani, Abdulrahman Alqazzaz, Ali Fu, Huirong Almashfi, Nabil Zhu, Ye Oakland Univ Dept Comp Sci & Engn Rochester MI 48309 USA Cleveland State Univ Elect & Comp Engn Dept Cleveland OH 44115 USA
Strong security in web applications is critical to the success of your online presence. Security importance has grown massively, especially among web applications. Dealing with web application or website security issu... 详细信息
来源: 评论
web application SECURITY: SHELL ACCESS
WEB APPLICATION SECURITY: SHELL ACCESS
收藏 引用
作者: Koponen, Kalle LAPPEENRANTA UNIVERSITY OF TECHNOLOGY
学位级别:硕士
This study presents how it is possible to get a shell access to the target system using common web application vulnerabilities. Both the client and server side are breached. Attacks are described step by step and resu... 详细信息
来源: 评论
XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2016年 第17期9卷 3966-3986页
作者: Gupta, Shashank Gupta, Brij Bhooshan Natl Inst Technol Dept Comp Engn Kurukshetra Haryana India
In this paper, the authors analyzed and discussed the performance issues in the existing cross-site scripting (XSS) filters and based on that, proposed a JavaScript string comparison and context-aware sanitization-bas... 详细信息
来源: 评论
Context-oriented web application protection model
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2016年 285卷 59-78页
作者: Prokhorenko, Victor Choo, Kim-Kwang Raymond Ashman, Helen Univ S Australia Sch Informat Technol & Math Sci Adelaide SA 5095 Australia
Due to growing user demand, web application development is becoming increasingly complicated. Multiple programming languages along with the complex multi-tier architecture commonly involved in web application developm... 详细信息
来源: 评论
Towards a Taxonomy for Security Threats on the web Ecosystem
Towards a Taxonomy for Security Threats on the Web Ecosystem
收藏 引用
IEEE/IFIP Network Operations and Management Symposium (NOMS)
作者: Silva, Carlo Batista, Ricardo Queiroz, Ruy Garcia, Vinicius Silva, Jose Gatti, Daniel Assad, Rodrigo Nascimento, Leandro Brito, Kellyton Miranda, Pericles Univ Fed Pernambuco CIn Recife PE Brazil PUC SP TiDD Sao Paulo SP Brazil Univ Fed Rural Pernambuco DEINFO Recife PE Brazil
The aim of this paper is to present a taxonomy for security threats on the web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstra... 详细信息
来源: 评论
Exploring Defense of SQL Injection Attack in Penetration Testing
Exploring Defense of SQL Injection Attack in Penetration Tes...
收藏 引用
作者: Yao Chu Zhu Auckland University of Technology
学位级别:硕士
SQLIA is adopted to attack websites with and without confidential information. Hackers utilize the compromisedwebsite as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enla... 详细信息
来源: 评论