-
1Academic Journal
Source: Ingeniería e Innovación.
Subject Terms: FOS: Computer and information sciences, Social Sciences, FOS: Law, FOS: Humanities, Constitutional Rights and Legal Theory in Latin America, Web Application Security and Vulnerability Detection, Computer science, Security Testing, Humanities, Computer Science, Physical Sciences, Political Science and International Relations, Protection of Education Rights and Privacy, Law, Art, Information Systems
-
2Academic Journal
Source: ConcienciaDigital. 6:133-146
Subject Terms: FOS: Computer and information sciences, Cartography, Geography, 05 social sciences, 0211 other engineering and technologies, FOS: Humanities, 02 engineering and technology, Web Application Security and Vulnerability Detection, FOS: Philosophy, ethics and religion, Humanities, Philosophy, 0502 economics and business, Computer Science, Physical Sciences, Vulnerability Detection, Information Systems
-
3Academic Journal
Authors: Deris Stiawan, Ali Bardadi, Nurul Afifah, Lisa Melinda, Ahmad Heryanto, Tri Wanda Septian, Mohd. Yazid Idris, Imam Much Ibnu Subroto, Lukman Lukman, Rahmat Budiarto
Source: Computer Systems Science and Engineering. 46:1759-1774
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, SQL Injection, Computer Networks and Communications, QA75 Electronic computers. Computer science, 02 engineering and technology, Web Application Security and Vulnerability Detection, Search engine, Social psychology, Security Testing, SQL injection, Database, Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Information retrieval, Psychology, Web development, Cross-site scripting, SQL, 4. Education, Query by Example, Scripting language, Computer science, Intrusion Detection, Programming language, World Wide Web, FOS: Psychology, Popularity, Signal Processing, Computer Science, Physical Sciences, Network Intrusion Detection and Defense Mechanisms, Security Analysis, Web search query, Classifier (UML), The Internet, Information Systems, Penetration Testing
File Description: application/pdf
-
4Academic Journal
Authors: Rushabh Kela, Abhinav Chawla, Pratishtha Gaur, K Manikandan
Source: international journal of advanced research in computer science. 13:28-34
Subject Terms: FOS: Computer and information sciences, Denial-of-service attack, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Security Testing, Characterization and Detection of Android Malware, Computer security, Web application security, Web development, DDoS Attacks, Cross-site scripting, Web service, Brute-force attack, Scripting language, 16. Peace & justice, Computer science, 3. Good health, World Wide Web, Operating system, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Cryptography, Security Analysis, Internet privacy, Confidentiality, The Internet, Information Systems
-
5Academic Journal
Authors: Isaac Odun-Ayo, Emmanuel Owoka, Otavie Okuoyo, Opeyemi Ogunsola, Obaro Ikoh, Olumide Adeosun, Deborah Etukudo, Victoria Robert, Gabriel Oyeyemi
Source: Journal of Computer Science. 18:103-115
Subject Terms: FOS: Computer and information sciences, Bubble, Parallel computing, Interface (matter), Computer Networks and Communications, 9. Industry and infrastructure, Information Security Policy Compliance and Awareness, Security Awareness, 02 engineering and technology, Web Application Security and Vulnerability Detection, 16. Peace & justice, Computer science, Security Testing, Hacker, Intrusion Detection, Computer security, Computer Science, Physical Sciences, Vulnerability Detection, Network Intrusion Detection and Defense Mechanisms, 0202 electrical engineering, electronic engineering, information engineering, Maximum bubble pressure method, Information Systems, Penetration Testing
-
6Academic Journal
Source: International Journal of Data and Network Science, Vol 6, Iss 3, Pp 849-860 (2022)
Subject Terms: FOS: Computer and information sciences, Computer Networks and Communications, Software Defect Prediction, Social Sciences, 02 engineering and technology, Web Application Security and Vulnerability Detection, Software bug, Security bug, 12. Responsible consumption, Context (archaeology), Computer security, 11. Sustainability, Management. Industrial management, 0202 electrical engineering, electronic engineering, information engineering, Biology, Software Maintenance, Software engineering, Information security, Paleontology, API Usage Patterns, Software security assurance, 15. Life on land, HD28-70, Computer science, Programming language, Operating system, Schedule, Bug Localization, 13. Climate action, Log Analysis and System Performance Diagnosis, Security service, Computer Science, Physical Sciences, 8. Economic growth, Software, Empirical Studies in Software Engineering, Information Systems
-
7Academic Journal
Authors: Sudhansu Sekhar Singh, Vishnu Menon, S. A. Sajidha, V. M. Nisha, Sheik Abdullah A, M Nivedita, Aakif Mairaj
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Support vector machine, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Detection and Prevention of Phishing Attacks, Computer security, Machine learning, Data mining, Information security, Malicious Code Detection, Network security, 16. Peace & justice, Computer science, 3. Good health, World Wide Web, Security Education, URL Filtering, Security service, Computer Science, Physical Sciences, Vulnerability Detection, Gradient boosting, Network Intrusion Detection and Defense Mechanisms, Botnet Detection, Classifier (UML), The Internet, Information Systems, Random forest, Internet security
-
8Academic Journal
Authors: Moreno Almanza Olmedo
Source: Minerva. 2:23-31
Subject Terms: FOS: Computer and information sciences, Alternative medicine, Encryption, E-commerce, Web Application Security and Vulnerability Detection, Vulnerability (computing), Engineering, Characterization and Detection of Android Malware, Computer security, FOS: Electrical engineering, electronic engineering, information engineering, Pathology, Electrical and Electronic Engineering, Hypertext, Computer network, 05 social sciences, Transport Layer Security (TLS), 16. Peace & justice, Computer science, World Wide Web, Data transmission, Wireless Mobility and Network Handoff Management, Computer Science, Physical Sciences, Signal Processing, Protocol (science), Internet privacy, Medicine, 0509 other social sciences, Hypertext Transfer Protocol, 0503 education, The Internet, Information Systems
-
9Academic Journal
Source: Journal of Computer Science. 17:296-303
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, SQL Injection, Computer Networks and Communications, Set (abstract data type), 02 engineering and technology, Web Application Security and Vulnerability Detection, Search engine, Security Testing, SQL injection, Database, Characterization and Detection of Android Malware, Computer security, Machine learning, 0202 electrical engineering, electronic engineering, information engineering, Information retrieval, Data mining, SQL, Malicious Code Detection, Query by Example, 05 social sciences, Detector, Computer science, Intrusion Detection, Programming language, 3. Good health, Detection, Operating system, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Telecommunications, Web application, Web search query, 0509 other social sciences, Information Systems, Training set
-
10Academic Journal
Authors: Ikram Ul Haq, Tamim Ahmed Khan
Source: IEEE Access, Vol 9, Pp 87806-87825 (2021)
Subject Terms: FOS: Computer and information sciences, Exploit, Mobile device, 02 engineering and technology, Web Application Security and Vulnerability Detection, Hacker, Vulnerability management, penetration testing, Characterization and Detection of Android Malware, Android, Android (operating system), Computer security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, android security and privacy, Psychological resilience, Automated Software Testing Techniques, Information security, Attack surface, Software security assurance, Computer science, TK1-9971, World Wide Web, FOS: Psychology, Operating system, Vulnerability assessment, Security service, Signal Processing, Computer Science, Physical Sciences, Psychotherapist, Security Analysis, Electrical engineering. Electronics. Nuclear engineering, Software, Information Systems, Application security
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/6514899/09450725.pdf
https://doaj.org/article/3b4ce7ed0f1f47bc90d7d5c2d1c26f48
https://dblp.uni-trier.de/db/journals/access/access9.html#HaqK21
https://ieeexplore.ieee.org/document/9450725 -
11Academic Journal
Authors: Santiago Ibarra-Fiallos, Javier Bermejo Higuera, Monserrate Intriago-Pazmiño, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo, Javier Cubo
Source: IEEE Access, Vol 9, Pp 10378-10391 (2021)
Subject Terms: input validation, FOS: Computer and information sciences, SQL Injection, Computer Networks and Communications, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Filter (signal processing), Artificial Intelligence, Computer security, 0202 electrical engineering, electronic engineering, information engineering, sanitization, Language-based Information Flow Security, software security, Information security, Computer science, TK1-9971, Intrusion Detection, Computer Science, Physical Sciences, regular expression, Network Intrusion Detection and Defense Mechanisms, Web Application, Computer vision, Electrical engineering. Electronics. Nuclear engineering, Information Systems, Penetration Testing
Linked Full TextAccess URL: https://ieeexplore.ieee.org/ielx7/6287639/9312710/09319139.pdf
https://doaj.org/article/62d362566d4443efb10496c067d42264
https://ieeexplore.ieee.org/document/9319139
https://reunir.unir.net/handle/123456789/11266
https://dblp.uni-trier.de/db/journals/access/access9.html#Ibarra-FiallosH21 -
12Academic Journal
Authors: Aminu Abdullahi Ahmad, Y. Lu, Mohamed Kholief, Abba Garba
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Software Defect Prediction, Set (abstract data type), Semantic matching, Web Application Security and Vulnerability Detection, Characterization and Detection of Android Malware, Deep Learning, Context (archaeology), Machine learning, FOS: Mathematics, Information retrieval, Source code, Biology, Code (set theory), Malicious Code Detection, Natural language processing, 4. Education, Statistics, Ranking (information retrieval), Paleontology, Deep learning, Linguistics, Computer science, TRACE (psycholinguistics), Programming language, FOS: Philosophy, ethics and religion, Detection, Philosophy, Learning to rank, Bug Localization, Rank (graph theory), Combinatorics, Computer Science, Physical Sciences, Signal Processing, Matching (statistics), FOS: Languages and literature, Mathematics, Empirical Studies in Software Engineering, Information Systems, Embedding
-
13Academic Journal
Authors: Long D. Nguyen, A. Simmons, Hai Anh Tran, Truong X. Tran
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Denial-of-service attack, IoT Security, Internet of Things, Control (management), Web Application Security and Vulnerability Detection, 7. Clean energy, Security Testing, Security bug, Characterization and Detection of Android Malware, NIST, Computer security, 11. Sustainability, Cloud computing security, Cloud computing, Access control, Security controls, Automated Software Testing Techniques, Information security, Home automation, Natural language processing, Security testing, Software security assurance, Computer science, World Wide Web, Operating system, Security service, Signal Processing, Computer Science, Physical Sciences, Telecommunications, Security information and event management, Software, The Internet, Information Systems
-
14Academic Journal
Authors: Richard Amankwah, Jinfu Chen, Patrick Kwaku Kudjo, Dave Towey
Source: Software: Practice and Experience. 50:1842-1857
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, False positive paradox, 02 engineering and technology, Web Application Security and Vulnerability Detection, Detection and Prevention of Phishing Attacks, Security Testing, Vulnerability management, IBM, Vulnerability (computing), Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, Nanotechnology, Source code, Web development, Psychological resilience, FOS: Nanotechnology, Information security, Geography, Web service, Malicious Code Detection, Open source, Software security assurance, Computer science, Materials science, World Wide Web, FOS: Psychology, Operating system, Spam Detection, Vulnerability assessment, Security service, Computer Science, Physical Sciences, Signal Processing, Vulnerability Detection, Psychotherapist, Security Analysis, Web application, Benchmark (surveying), Software, Geodesy, Information Systems, Application security
File Description: application/pdf
Linked Full TextAccess URL: http://eprints.nottingham.ac.uk/61145/9/Dave.pdf
https://eprints.nottingham.ac.uk/61145/9/Dave.pdf
https://onlinelibrary.wiley.com/doi/10.1002/spe.2870
https://dblp.uni-trier.de/db/journals/spe/spe50.html#AmankwahCKT20
http://eprints.nottingham.ac.uk/61145/ -
15Book
Authors: Tarikul Islam, Shaikh Muhammad Allayear
Source: Communications in Computer and Information Science ISBN: 9783030984564
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Computer Networks and Communications, Web Application Security and Vulnerability Detection, 7. Clean energy, Detection and Prevention of Phishing Attacks, Machine learning, FOS: Mathematics, Data mining, Wireless network, Tuple space, Curse of dimensionality, Malicious Code Detection, Intrusion detection system, Discrete mathematics, Computer science, Intrusion Detection, 3. Good health, Computer Science, Physical Sciences, Vulnerability Detection, Network Intrusion Detection and Defense Mechanisms, Wireless, Telecommunications, Botnet Detection, Tuple, Classifier (UML), Mathematics, Information Systems, Penetration Testing
-
16Book
Source: Lecture Notes in Computer Science ISBN: 9783031131875
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Separation Logic, Set (abstract data type), Web Application Security and Vulnerability Detection, 7. Clean energy, Theoretical computer science, 5. Gender equality, Artificial Intelligence, String (physics), Image (mathematics), FOS: Mathematics, Modulo, Satisfiability, 10. No inequality, Satisfiability modulo theories, Automated Software Testing Techniques, Discrete mathematics, Computer science, Programming language, Algorithm, Solver, Mathematical physics, Computer Science, Physical Sciences, Program Analysis and Verification Techniques, Software, Mathematics, Information Systems
-
17Academic Journal
Source: Journal of Computer Science. 15:1341-1354
Subject Terms: FOS: Computer and information sciences, Security Awareness, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Secure coding, Vulnerability management, Vulnerability (computing), Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Psychology, 14. Life underwater, Biology, Web development, Psychological resilience, Information security, Ecology, Host (biology), 9. Industry and infrastructure, Information Security Policy Compliance and Awareness, Software security assurance, Computer science, World Wide Web, FOS: Psychology, Vulnerability assessment, 13. Climate action, Security service, FOS: Biological sciences, Computer Science, Physical Sciences, Signal Processing, Vulnerability Detection, Web Application, Psychotherapist, Security Analysis, Internet privacy, The Internet, Information Systems
-
18Academic Journal
Authors: Bakare K. Ayeni, Junaidu B. Sahalu, Kolawole R. Adeyanju
Source: Journal of Computer Networks and Communications, Vol 2018 (2018)
Subject Terms: FOS: Computer and information sciences, Artificial intelligence, Denial-of-service attack, Computer Networks and Communications, False positive paradox, 02 engineering and technology, Web Application Security and Vulnerability Detection, Security Testing, Cross-Site Scripting, Characterization and Detection of Android Malware, Computer security, Web application security, 0202 electrical engineering, electronic engineering, information engineering, Web development, Cross-site scripting, Information security, Malicious Code Detection, QA75.5-76.95, Scripting language, Computer science, 3. Good health, World Wide Web, Operating system, Electronic computers. Computer science, Security service, Computer Science, Physical Sciences, Signal Processing, Network Intrusion Detection and Defense Mechanisms, Web Application, Security Analysis, Web application, The Internet, Confidentiality, Information Systems, Internet security
File Description: text/xhtml
Linked Full TextAccess URL: https://doaj.org/article/7ea33c8bc2f842a98f37b6b2701e6027
https://www.hindawi.com/journals/jcnc/2018/8159548/
https://paperity.org/p/137849292/detecting-cross-site-scripting-in-web -applications-using-fuzzy-inference-system
https://downloads.hindawi.com/journals/jcnc/2018/8159548.pdf
http://downloads.hindawi.com/journals/jcnc/2018/8159548.pdf -
19Academic Journal
Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Source: Revista Facultad de Ingeniería, Vol 27, Iss 47, Pp 73-80 (2018)
Revista Facultad de Ingeniería; Vol. 27 No. 47 (2018); 73-80
Revista Facultad de Ingeniería; Vol. 27 Núm. 47 (2018); 73-80Subject Terms: FOS: Computer and information sciences, Alternative medicine, information security, Computer Networks and Communications, Economics, intrusion detection, detección de intrusión, Web Application Security and Vulnerability Detection, Wireless security, Computer security, Pathology, Intrusion detection, seguridad de la información, Data security, data security, Bluetooth Low Energy Technology Overview and Evaluation, Wireless network, Computer network, Information security, Intrusion, Geology, seguridad inalámbrica, Audit, FOS: Earth and related environmental sciences, Engineering (General). Civil engineering (General), Computer science, Management, Operating system, Geochemistry, seguridad de datos, Computer Science, Physical Sciences, Protocol (science), Data transmission systems, Network Intrusion Detection and Defense Mechanisms, Wireless, Medicine, TA1-2040, Wireless Technology, wireless security, Information Systems
File Description: application/pdf; application/xml
Access URL: https://revistas.uptc.edu.co/index.php/ingenieria/article/download/7748/6138
https://doaj.org/article/1ccf9b674190468e899fb1b7b6b74529
http://www.scielo.org.co/pdf/rfing/v27n47/0121-1129-rfing-27-47-73.pdf
http://www.scielo.org.co/scielo.php?script=sci_arttext&pid=S0121-11292018000100073
https://repositorio.uptc.edu.co/handle/001/2163
https://revistas.uptc.edu.co/revistas/index.php/ingenieria/article/view/7748
https://dialnet.unirioja.es/descarga/articulo/6359518.pdf
https://dialnet.unirioja.es/servlet/articulo?codigo=6359518
http://repositorio.uptc.edu.co/handle/001/2163
https://repositorio.uptc.edu.co/handle/001/14204 -
20Academic Journal
Authors: S. Uma Maheswari, R. Pitchai, P. Supraja, Shivnath Babu
Subject Terms: FOS: Computer and information sciences, Service Selection Algorithms, Artificial intelligence, QoS-Aware Web Services Composition and Semantic Matching, Geometry, Epistemology, 02 engineering and technology, Operations research, Web Application Security and Vulnerability Detection, 01 natural sciences, Quality of Service (QoS), 12. Responsible consumption, FOS: Economics and business, Selection (genetic algorithm), Variance (accounting), Quality of service, Service (business), Accounting, FOS: Mathematics, 0202 electrical engineering, electronic engineering, information engineering, Business, QoS-Aware Middleware, 0101 mathematics, TOPSIS, Product (mathematics), Marketing, Web Service Composition, Computer network, Analytic hierarchy process, Web service, 9. Industry and infrastructure, 1. No poverty, Computer science, FOS: Philosophy, ethics and religion, Fuzzy logic, World Wide Web, Philosophy, Computer Science, Physical Sciences, Service-Oriented Computing, 8. Economic growth, Quality (philosophy), Mathematics, Information Systems