Výsledky vyhľadávania - "JavaScript security"
-
1
Autori: a ďalší
Zdroj: Сучасні інформаційні системи, Vol 3, Iss 4 (2019)
Сучасні інформаційні системи; Том 3 № 4 (2019): Сучасні інформаційні системи; 105-108
Advanced Information Systems; Vol. 3 No. 4 (2019): Advanced Information Systems; 105-108
Современные информационные системы-Sučasnì ìnformacìjnì sistemi; Том 3 № 4 (2019): Современные информационные системы; 105-108Predmety: Information theory, JavaScript security, объектная модель документа, method of protection againstattacks, безопасность JavaScript, криптографические хеш-функции, криптографічні хеш-функції, безпека JavaScript, метод захисту від атак, QA76.75-76.765, об'єктна модель документа, cryptographic hash functions, 004.056, Computer software, method of protection against attacks, Q350-390, метод защиты от атак, document object model
Popis súboru: application/pdf
Prístupová URL adresa: http://ais.khpi.edu.ua/article/download/2522-9052.2019.4.15/188273
https://doaj.org/article/e953d075b902433a9e28420179a1f9c5
http://ais.khpi.edu.ua/article/view/2522-9052.2019.4.15
http://ais.khpi.edu.ua/article/download/2522-9052.2019.4.15/188273
http://repository.kpi.kharkov.ua/handle/KhPI-Press/43617
http://ais.khpi.edu.ua/article/view/2522-9052.2019.4.15 -
2
Autori: Ayusinta, Rima
Predmety: Broken Access Control, Open-Source Software, JavaScript Security, Static Code Analysis, Vulnerability Detection, Software Engineering, Programvaruteknik
Popis súboru: application/pdf
-
3
Autori:
Zdroj: High-Confidence Computing, Vol 1, Iss 2, Pp 100035- (2021)
Predmety: JavaScript security, Web security, Web frameworks, Framework analysis, Cross-site request forgery, Electronic computers. Computer science, QA75.5-76.95
Popis súboru: electronic resource
Relation: http://www.sciencedirect.com/science/article/pii/S2667295221000258; https://doaj.org/toc/2667-2952
Prístupová URL adresa: https://doaj.org/article/cdac97a7bc874a0c9e495bb28c5d63cc
-
4
Autori:
Zdroj: High-Confidence Computing, Vol 1, Iss 2, Pp 100032- (2021)
Predmety: JavaScript security, Web security, Desktop security, Framework analysis, Electron framework, Static analysis, Electronic computers. Computer science, QA75.5-76.95
Popis súboru: electronic resource
Relation: http://www.sciencedirect.com/science/article/pii/S2667295221000222; https://doaj.org/toc/2667-2952
Prístupová URL adresa: https://doaj.org/article/f321fd0ddf834125af5111535c75d877
-
5
Autori: a ďalší
Zdroj: Lecture Notes in Computer Science ISBN: 9783030657444
Predmety: Linters, JavaScript security, Software vulnerabilities, Static analysis, Mainstream programmers
Popis súboru: application/pdf
-
6
Autori:
Prispievatelia:
Zdroj: ACM Computing Surveys, September 2022
Predmety: wpad security, web security, service discovery, proxy security, PAC #le, javascript security, NTLM, HTTPS, MITM, SSL, remote code execution
Relation: https://www.eurecom.fr/publication/7066
Dostupnosť: https://www.eurecom.fr/publication/7066
-
7
Autori: Phung, Phu, 1979
Predmety: security policy enforcement, JavaScript security, web-application security, vehicle software security, untrusted software
Popis súboru: electronic
-
8
Autori:
Predmety: Vulnerability prediction, static source code metrics, process metrics, JavaScript security
Relation: https://zenodo.org/records/4590021; oai:zenodo.org:4590021; https://doi.org/10.5281/zenodo.4590021
-
9
Autori: a ďalší
Prispievatelia: a ďalší
Zdroj: e-Informatica Software Engineering Journal, Vol 8, Iss 1, Pp 65-78 (2015)
Predmety: QA76.75-76.765, malicious web pages, JavaScript, security, static analysis, machine learning, 0202 electrical engineering, electronic engineering, information engineering, informatyka - czasopisma, Computer software, 02 engineering and technology, malicious JavaScripts, 3. Good health
Popis súboru: application/pdf
Prístupová URL adresa: https://doaj.org/article/ffb1293311cf45bfb4865f519bf6927b
https://dblp.uni-trier.de/db/journals/eInformatica/eInformatica8.html#CanforaMV14
http://www.e-informatyka.pl/attach/e-Informatica_-_Volume_8/eInformatica2014Art5.pdf
https://www.e-informatyka.pl/attach/e-Informatica_-_Volume_8/eInformatica2014Art5.pdf
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.baztech-e7bd0354-d3fd-4a81-84c7-479fe2b097ca
https://hdl.handle.net/11695/115414
https://doi.org/10.5277/e-Inf140105 -
10
-
11
-
12
Autori:
Zdroj: Journal of Web Development and Web Designing; Vol. 10 No. 2 (2025); 1-6
Témy: JavaScript security, Npm vulnerabilities, Prototype pollution, Supply chain attacks, Third-party libraries, info:eu-repo/semantics/article, info:eu-repo/semantics/publishedVersion, Peer-reviewed Article
Nájsť tento článok vo Web of Science
Full Text Finder