Buscar
Mostrando ítems 1-10 de 11
Prevention and fighting against web attacks through anomaly detection technology. A systematic review
(Sustainability (Switzerland), 2020-06-01)
Numerous techniques have been developed in order to prevent attacks on web servers. Anomaly detection techniques are based on models of normal user and application behavior, interpreting deviations from the established ...
Hybrid Security Assessment Methodology for Web Applications
(CMES-Computer Modeling in Engineering & Sciences, 2021)
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that allow to perform security assessments ...
Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities
(CMC-Computers Materials & Continua, 2020)
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities ...
Systematic Approach to Malware Analysis (SAMA)
(Applied Sciences, 2020-02)
Malware threats pose new challenges to analytic and reverse engineering tasks. It is needed for a systematic approach to that analysis, in an attempt to fully uncover their underlying attack vectors and techniques and find ...
A New Mail System for Secure Data Transmission in Cyber Physical Systems
(International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2020-12)
This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed ...
Vaccine Hesitancy on Social Media: Sentiment Analysis from June 2011 to April 2019
(Vaccines, 2021-01)
Vaccine hesitancy was one of the ten major threats to global health in 2019, according to the World Health Organisation. Nowadays, social media has an important role in the spread of information, misinformation, and ...
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
(Applied Sciences-Basel, 2020-12)
The design of the techniques and algorithms used by the static, dynamic and interactive security testing tools differ. Therefore, each tool detects to a greater or lesser extent each type of vulnerability for which they ...
A systematic approach to analysis for assessing the security level of cyber-physical systems in the electricity sector
(Elsevier B.V., 2021)
In a context of digitalization and technological evolution in all aspects of our lives, the electricity sector could not be left behind. This opens up a new range of possibilities until now unthinkable, which will facilitate ...
Combinatorial method with static analysis for source code security in web applications
(Tech Science Press, 2021)
Security weaknesses in web applications deployed in cloud architectures can seriously affect its data confidentiality and integrity. The construction of the procedure utilized in the static analysis tools of source code ...
On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A Practical Survey
(Institute of Electrical and Electronics Engineers Inc., 2021)
Organizations use Active Directory Windows service to authenticate users in a network with the extended Kerberos Authentication protocol. Therefore, it is necessary to investigate its resistance to the different types of ...