Search Results - "Web Application Security and Vulnerability Detection"
-
1
Authors: et al.
Source: Ingeniería e Innovación.
Subject Terms: FOS: Computer and information sciences, Social Sciences, FOS: Law, FOS: Humanities, Constitutional Rights and Legal Theory in Latin America, Web Application Security and Vulnerability Detection, Computer science, Security Testing, Humanities, Computer Science, Physical Sciences, Political Science and International Relations, Protection of Education Rights and Privacy, Law, Art, Information Systems
-
2
Authors:
Source: ConcienciaDigital. 6:133-146
Subject Terms: FOS: Computer and information sciences, Cartography, Geography, 05 social sciences, 0211 other engineering and technologies, FOS: Humanities, 02 engineering and technology, Web Application Security and Vulnerability Detection, FOS: Philosophy, ethics and religion, Humanities, Philosophy, 0502 economics and business, Computer Science, Physical Sciences, Vulnerability Detection, Information Systems
-
3
Authors: et al.
Source: Computer Systems Science and Engineering. 46:1759-1774
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, SQL Injection, Computer Networks and Communications, QA75 Electronic computers. Computer science, 02 engineering and technology, Web Application Security and Vulnerability Detection, Search engine, Social psychology, Security Testing, SQL injection, Database, Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Information retrieval, Psychology, Web development, Cross-site scripting, SQL, 4. Education, Query by Example, Scripting language, Computer science, Intrusion Detection, Programming language, World Wide Web, FOS: Psychology, Popularity, Signal Processing, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Security Analysis, Web search query, Classifier (UML), The Internet, Information Systems, Penetration Testing
File Description: application/pdf
-
4
Authors: et al.
Source: international journal of advanced research in computer science. 13:28-34
Subject Terms: FOS: Computer and information sciences, Denial-of-service attack, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Security Testing, Characterization and Detection of Android Malware, Computer security, Web application security, Web development, DDoS Attacks, Cross-site scripting, Web service, Brute-force attack, Scripting language, 16. Peace & justice, Computer science, 3. Good health, World Wide Web, Operating system, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Cryptography, Security Analysis, Internet privacy, Confidentiality, The Internet, Information Systems
-
5
Authors: et al.
Source: Journal of Computer Science. 18:103-115
Subject Terms: FOS: Computer and information sciences, Bubble, Parallel computing, Interface (matter), Computer Networks and Communications, 9. Industry and infrastructure, Information Security Policy Compliance and Awareness, Security Awareness, 02 engineering and technology, Web Application Security and Vulnerability Detection, 16. Peace & justice, Computer science, Security Testing, Hacker, Intrusion Detection, Computer security, Computer Science, Physical Sciences, Vulnerability Detection, Network Intrusion Detection and Defense Mechanisms, 0202 electrical engineering, electronic engineering, information engineering, Maximum bubble pressure method, Information Systems, Penetration Testing
-
6
Authors: et al.
Source: International Journal of Data and Network Science, Vol 6, Iss 3, Pp 849-860 (2022)
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, Software Defect Prediction, Social Sciences, 02 engineering and technology, Web Application Security and Vulnerability Detection, Software bug, Security bug, 12. Responsible consumption, Context (archaeology), Computer security, 11. Sustainability, Management. Industrial management, 0202 electrical engineering, electronic engineering, information engineering, Biology, Software Maintenance, Software engineering, Information security, Paleontology, API Usage Patterns, Software security assurance, 15. Life on land, HD28-70, Computer science, Programming language, Operating system, Schedule, Bug Localization, 13. Climate action, Log Analysis and System Performance Diagnosis, Security service, Computer Science, Physical Sciences, 8. Economic growth, Software, Empirical Studies in Software Engineering, Information Systems
-
7
Authors: et al.
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Support vector machine, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Detection and Prevention of Phishing Attacks, Computer security, Machine learning, Data mining, Information security, Malicious Code Detection, Network security, 16. Peace & justice, Computer science, 3. Good health, World Wide Web, Security Education, URL Filtering, Security service, Computer Science, Physical Sciences, Vulnerability Detection, Gradient boosting, Network Intrusion Detection and Defense Mechanisms, Botnet Detection, Classifier (UML), The Internet, Information Systems, Random forest, Internet security
-
8
Authors: Moreno Almanza Olmedo
Source: Minerva. 2:23-31
Subject Terms: FOS: Computer and information sciences, Alternative medicine, Encryption, E-commerce, Web Application Security and Vulnerability Detection, Vulnerability (computing), Engineering, Characterization and Detection of Android Malware, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Pathology, Electrical and Electronic Engineering, Hypertext, Computer network, 05 social sciences, Transport Layer Security (TLS), 16. Peace & justice, Computer science, World Wide Web, Data transmission, Wireless Mobility and Network Handoff Management, Computer Science, Physical Sciences, Signal Processing, Protocol (science), Internet privacy, Medicine, 0509 other social sciences, Hypertext Transfer Protocol, 0503 education, The Internet, Information Systems
-
9
Authors:
Source: Journal of Computer Science. 17:296-303
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, SQL Injection, Computer Networks and Communications, Set (abstract data type), 02 engineering and technology, Web Application Security and Vulnerability Detection, Search engine, Security Testing, SQL injection, Database, Characterization and Detection of Android Malware, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Information retrieval, Data mining, SQL, Malicious Code Detection, Query by Example, 05 social sciences, Detector, Computer science, Intrusion Detection, Programming language, 3. Good health, Detection, Operating system, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Telecommunications, Web application, Web search query, 0509 other social sciences, Information Systems, Training set
-
10
Authors:
Source: IEEE Access, Vol 9, Pp 87806-87825 (2021)
Subject Terms: FOS: Computer and information sciences, Exploit, Mobile device, 02 engineering and technology, Web Application Security and Vulnerability Detection, Hacker, Vulnerability management, penetration testing, Characterization and Detection of Android Malware, Android, Android (operating system), Computer security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, android security and privacy, Psychological resilience, Automated Software Testing Techniques, Information security, Attack surface, Software security assurance, Computer science, TK1-9971, World Wide Web, FOS: Psychology, Operating system, Vulnerability assessment, Security service, Signal Processing, Computer Science, Physical Sciences, Psychotherapist, Security Analysis, Electrical engineering. Electronics. Nuclear engineering, Software, Information Systems, Application security
-
11
Authors: et al.
Source: IEEE Access, Vol 9, Pp 10378-10391 (2021)
Subject Terms: input validation, FOS: Computer and information sciences, SQL Injection, Computer Networks and Communications, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Filter (signal processing), Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, sanitization, Language-based Information Flow Security, software security, Information security, Computer science, TK1-9971, Intrusion Detection, Computer Science, Physical Sciences, regular expression, Network Intrusion Detection and Defense Mechanisms, Web Application, Computer vision, Electrical engineering. Electronics. Nuclear engineering, Information Systems, Penetration Testing
-
12
Authors: et al.
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Software Defect Prediction, Set (abstract data type), Semantic matching, Web Application Security and Vulnerability Detection, Characterization and Detection of Android Malware, Deep Learning, Context (archaeology), Machine learning, FOS: Mathematics, Information retrieval, Source code, Biology, Code (set theory), Malicious Code Detection, Natural language processing, 4. Education, Statistics, Ranking (information retrieval), Paleontology, Deep learning, Linguistics, Computer science, TRACE (psycholinguistics), Programming language, FOS: Philosophy, ethics and religion, Detection, Philosophy, Learning to rank, Bug Localization, Rank (graph theory), Combinatorics, Computer Science, Physical Sciences, Signal Processing, Matching (statistics), FOS: Languages and literature, Mathematics, Empirical Studies in Software Engineering, Information Systems, Embedding
-
13
Authors: et al.
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Denial-of-service attack, IoT Security, Internet of Things, Control (management), Web Application Security and Vulnerability Detection, 7. Clean energy, Security Testing, Security bug, Characterization and Detection of Android Malware, NIST, Computer security, 11. Sustainability, Cloud computing security, Cloud computing, Access control, Security controls, Automated Software Testing Techniques, Information security, Home automation, Natural language processing, Security testing, Software security assurance, Computer science, World Wide Web, Operating system, Security service, Signal Processing, Computer Science, Physical Sciences, Telecommunications, Security information and event management, Software, The Internet, Information Systems
-
14
Authors: et al.
Source: Software: Practice and Experience. 50:1842-1857
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, False positive paradox, 02 engineering and technology, Web Application Security and Vulnerability Detection, Detection and Prevention of Phishing Attacks, Security Testing, Vulnerability management, IBM, Vulnerability (computing), Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, Nanotechnology, Source code, Web development, Psychological resilience, FOS: Nanotechnology, Information security, Geography, Web service, Malicious Code Detection, Open source, Software security assurance, Computer science, Materials science, World Wide Web, FOS: Psychology, Operating system, Spam Detection, Vulnerability assessment, Security service, Computer Science, Physical Sciences, Signal Processing, Vulnerability Detection, Psychotherapist, Security Analysis, Web application, Benchmark (surveying), Software, Geodesy, Information Systems, Application security
File Description: application/pdf
-
15
Authors:
Source: Communications in Computer and Information Science ISBN: 9783030984564
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Detection and Prevention of Phishing Attacks, Machine learning, FOS: Mathematics, Data mining, Wireless network, Tuple space, Curse of dimensionality, Malicious Code Detection, Intrusion detection system, Discrete mathematics, Computer science, Intrusion Detection, 3. Good health, Computer Science, Physical Sciences, Vulnerability Detection, Network Intrusion Detection and Defense Mechanisms, Wireless, Telecommunications, Botnet Detection, Tuple, Classifier (UML), Mathematics, Information Systems, Penetration Testing
-
16
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783031131875
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Separation Logic, Set (abstract data type), Web Application Security and Vulnerability Detection, 7. Clean energy, Theoretical computer science, 5. Gender equality, Artificial Intelligence, String (physics), Image (mathematics), FOS: Mathematics, Modulo, Satisfiability, 10. No inequality, Satisfiability modulo theories, Automated Software Testing Techniques, Discrete mathematics, Computer science, Programming language, Algorithm, Solver, Mathematical physics, Computer Science, Physical Sciences, Program Analysis and Verification Techniques, Software, Mathematics, Information Systems
-
17
Authors: et al.
Source: Journal of Computer Science. 15:1341-1354
Subject Terms: FOS: Computer and information sciences, Security Awareness, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Secure coding, Vulnerability management, Vulnerability (computing), Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, 14. Life underwater, Biology, Web development, Psychological resilience, Information security, Ecology, Host (biology), 9. Industry and infrastructure, Information Security Policy Compliance and Awareness, Software security assurance, Computer science, World Wide Web, FOS: Psychology, Vulnerability assessment, 13. Climate action, Security service, FOS: Biological sciences, Computer Science, Physical Sciences, Signal Processing, Vulnerability Detection, Web Application, Psychotherapist, Security Analysis, Internet privacy, The Internet, Information Systems
-
18
Authors:
Source: Journal of Computer Networks and Communications, Vol 2018 (2018)
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Denial-of-service attack, Computer Networks and Communications, False positive paradox, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Cross-Site Scripting, Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Web development, Cross-site scripting, Information security, Malicious Code Detection, QA75.5-76.95, Scripting language, Computer science, 3. Good health, World Wide Web, Operating system, Electronic computers. Computer science, Security service, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Web Application, Security Analysis, Web application, The Internet, Confidentiality, Information Systems, Internet security
File Description: text/xhtml
Access URL: https://doaj.org/article/7ea33c8bc2f842a98f37b6b2701e6027
https://www.hindawi.com/journals/jcnc/2018/8159548/
https://paperity.org/p/137849292/detecting-cross-site-scripting-in-web -applications-using-fuzzy-inference-system
https://downloads.hindawi.com/journals/jcnc/2018/8159548.pdf
http://downloads.hindawi.com/journals/jcnc/2018/8159548.pdf -
19
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Authors:
Source: Revista Facultad de Ingeniería, Vol 27, Iss 47, Pp 73-80 (2018)
Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80
Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-80Subject Terms: FOS: Computer and information sciences, Alternative medicine, information security, Computer Networks and Communications, Economics, intrusion detection, detección de intrusión, Web Application Security and Vulnerability Detection, Wireless security, Computer security, Pathology, Intrusion detection, seguridad de la información, Data security, data security, Bluetooth Low Energy Technology Overview and Evaluation, Wireless network, Computer network, Information security, Intrusion, Geology, seguridad inalámbrica, Audit, FOS: Earth and related environmental sciences, Engineering (General). Civil engineering (General), Computer science, Management, Operating system, Geochemistry, seguridad de datos, Computer Science, Physical Sciences, Protocol (science), Data transmission systems, Network Intrusion Detection and Defense Mechanisms, Wireless, Medicine, TA1-2040, Wireless Technology, wireless security, Information Systems
File Description: application/pdf; application/xml
Access URL: https://revistas.uptc.edu.co/index.php/ingenieria/article/download/7748/6138
https://doaj.org/article/1ccf9b674190468e899fb1b7b6b74529
http://www.scielo.org.co/pdf/rfing/v27n47/0121-1129-rfing-27-47-73.pdf
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0121-11292018000100073
https://repositorio.uptc.edu.co/handle/001/2163
https://revistas.uptc.edu.co/revistas/index.php/ingenieria/article/view/7748
https://dialnet.unirioja.es/descarga/articulo/6359518.pdf
https://dialnet.unirioja.es/servlet/articulo?codigo=6359518
http://repositorio.uptc.edu.co/handle/001/2163
https://repositorio.uptc.edu.co/handle/001/14204 -
20
Authors: et al.
Subject Terms: FOS: Computer and information sciences, Service Selection Algorithms, Artificial intelligence, QoS-Aware Web Services Composition and Semantic Matching, Geometry, Epistemology, 02 engineering and technology, Operations research, Web Application Security and Vulnerability Detection, 01 natural sciences, Quality of Service (QoS), 12. Responsible consumption, FOS: Economics and business, Selection (genetic algorithm), Variance (accounting), Quality of service, Service (business), Accounting, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Business, QoS-Aware Middleware, 0101 mathematics, TOPSIS, Product (mathematics), Marketing, Web Service Composition, Computer network, Analytic hierarchy process, Web service, 9. Industry and infrastructure, 1. No poverty, Computer science, FOS: Philosophy, ethics and religion, Fuzzy logic, World Wide Web, Philosophy, Computer Science, Physical Sciences, Service-Oriented Computing, 8. Economic growth, Quality (philosophy), Mathematics, Information Systems
Nájsť tento článok vo Web of Science
Full Text Finder