咨询与建议

限定检索结果

文献类型

  • 16 篇 会议
  • 7 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 25 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 18 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 25 篇 web application ...
  • 4 篇 cross-site scrip...
  • 3 篇 software securit...
  • 2 篇 penetration test...
  • 2 篇 cross-site reque...
  • 2 篇 world wide web
  • 2 篇 cybersecurity
  • 2 篇 hacking
  • 2 篇 information secu...
  • 2 篇 sql injection
  • 2 篇 buffer overflow
  • 2 篇 web application
  • 2 篇 sql injection at...
  • 2 篇 database protect...
  • 2 篇 e-business
  • 2 篇 privacy
  • 2 篇 web application ...
  • 1 篇 javascript code ...
  • 1 篇 information flow...
  • 1 篇 security vulnera...

机构

  • 2 篇 univ lisbon fac ...
  • 1 篇 univ tokyo ctr i...
  • 1 篇 univ thessaly vo...
  • 1 篇 univ teknol mara...
  • 1 篇 universiti tekno...
  • 1 篇 american univers...
  • 1 篇 auckland univers...
  • 1 篇 univ s australia...
  • 1 篇 natl inst techno...
  • 1 篇 uptu: cs and e i...
  • 1 篇 univ napoli fede...
  • 1 篇 ict research ins...
  • 1 篇 univ fed pernamb...
  • 1 篇 universiti tekno...
  • 1 篇 lappeenranta uni...
  • 1 篇 univ patras comp...
  • 1 篇 univ fed rural p...
  • 1 篇 oakland univ dep...
  • 1 篇 cleveland state ...
  • 1 篇 birla inst techn...

作者

  • 3 篇 medeiros iberia
  • 2 篇 neves nuno
  • 2 篇 gupta shashank
  • 1 篇 el-kassas sherif
  • 1 篇 alqazzaz ali
  • 1 篇 yan wei qi
  • 1 篇 ain zubaidah moh...
  • 1 篇 perrone gaetano
  • 1 篇 bahrololum marja...
  • 1 篇 shar lwin khin
  • 1 篇 brito kellyton
  • 1 篇 fakariah hani mo...
  • 1 篇 katsidimas ioann...
  • 1 篇 ioannis katsidim...
  • 1 篇 vlachos vasileio...
  • 1 篇 kamarularifin ab...
  • 1 篇 hassan doaa
  • 1 篇 hluchy ladislav
  • 1 篇 rozali nur amiza...
  • 1 篇 almashfi nabil

语言

  • 24 篇 英文
  • 1 篇 其他
检索条件"主题词=Web application vulnerabilities"
25 条 记 录,以下是21-30 订阅
排序:
Positive Security Model based Server-side Solution for prevention of Cross-site Scripting Attacks  12
Positive Security Model based Server-side Solution for preve...
收藏 引用
12 IEEE Int C Elect Energy Env Communications Computer Control
作者: Maurya, Swati Deenbandhu Chhotu Ram Univ Sci & Technol Dept Comp Sci & Engn Murthal Haryana India
The latest advancements in the internet and communication technology has made day-to-day life fully dependent on web applications as all the facilities are available at just one click. Network failure, data breaches, ... 详细信息
来源: 评论
Towards Improving web Attack Detection: Highlighting the Significant Factors  5
Towards Improving Web Attack Detection: Highlighting the Sig...
收藏 引用
5th International Conference on IT Convergence and Security (ICITCS)
作者: Wazzan, Majda A. Awadh, Mohammad H. King Abdulaziz Univ Deanship Informat Technol Secur Tech Unit Jeddah Saudi Arabia King Abdulaziz Univ Fac Engn Dept Elect & Comp Engn Jeddah Saudi Arabia
Nowadays, with the rapid development of Internet, the use of web is increasing and the web applications have become a substantial part of people's daily life ( e. g. E-Government, E-Health and E-Learning), as they... 详细信息
来源: 评论
Cross site request forgery: A common web application weakness
Cross site request forgery: A common web application weaknes...
收藏 引用
IEEE International Conference on Communication Software and Networks
作者: Siddiqui, Mohd. Shadab Verma, Deepanker UPTU: C.S and e SRMCEM Lucknow India UPTU: CS and e IERT Allahabad India
Now a days, most of the people use internet for their business and commercial use. This advancement of technology make our daily life better but there are so many risks due to some web applications vulnerabilities. Cr... 详细信息
来源: 评论
Idea: Automatic Security Testing for web applications
Idea: Automatic Security Testing for Web Applications
收藏 引用
1st International Symposium on Engineering Secure Software and Systems
作者: Dao, Thanh-Binh Shibayama, Etsuya Tokyo Inst Technol Dept Math & Comp Sci Meguro Ku 2-12-1 O Okayama Tokyo 152 Japan Univ Tokyo Ctr Informat Technol Tokyo Japan
With the increasingly important role of web applications in online set-vices and business systems, vulnerabilities such as SQL Injection have become serious security threats. Finding these vulnerabilities by manual te... 详细信息
来源: 评论
Challenges for Security Typed web Scripting Languages Design
Challenges for Security Typed Web Scripting Languages Design
收藏 引用
4th International Symposium on Information Assurance and Security
作者: Hassan, Doaa El-Kassas, Sherif Ziedan, Ibrahim National Telecomm Institute American University in Cairo Faculty of Engineering Zagazig University
This paper focuses on the different challenges to design a security typed web scripting language. It uses the type system approach on a simple imperative language that captures a subset of the security typed web langu... 详细信息
来源: 评论