Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

Design and development of artificial intelligence knowledge processing system for optimizing security of software system

RR Althar, D Samanta, S Purushotham, SS Sengar… - SN Computer …, 2023 - Springer
Software security vulnerabilities are significant for the software development industry.
Exploration is conducted for software development industry landscape, software …

A frictionless and secure user authentication in web-based premium applications

RF Olanrewaju, BUI Khan, MA Morshidi, F Anwar… - Ieee …, 2021 - ieeexplore.ieee.org
By and large, authentication systems employed for web-based applications primarily utilize
conventional username and password-based schemes, which can be compromised easily …

KARTAL: Web Application Vulnerability Hunting Using Large Language Models: Novel method for detecting logical vulnerabilities in web applications with finetuned …

S Sakaoglu - 2023 - diva-portal.org
Abstract Broken Access Control is the most serious web application security risk as
published by Open Worldwide Application Security Project (OWASP). This category has …

[HTML][HTML] Intelligent platform for automating vulnerability detection in web applications

D Moreira, JP Seara, JP Pavia, C Serrão - Electronics, 2024 - mdpi.com
In a world increasingly dependent on technology and in an era where connectivity is
omnipresent, Web applications have become an essential part of our everyday life. The …

Enhancing Security in Industrial Application Development: Case Study on Self-Generating Artificial Intelligence Tools

TJ Mateo Sanguino - Applied Sciences, 2024 - mdpi.com
The emergence of security vulnerabilities and risks in software development assisted by self-
generated tools, particularly with regard to the generation of code that lacks due …

A Survey on Web Application Testing: A Decade of Evolution

T Li, R Huang, C Cui, D Towey, L Ma, YF Li… - arXiv preprint arXiv …, 2024 - arxiv.org
As one of the most popular software applications, a web application is a program, accessible
through the web, to dynamically generate content based on user interactions or contextual …

Security of web applications: Threats, vulnerabilities, and protection methods

A Mohammed, J Alkhathami, H Alsuwat… - International Journal of …, 2021 - koreascience.kr
This is the world of computer science and innovations. In this modern era, every day new
apps, webs and software are being introduced. As well as new apps and software are being …

[PDF][PDF] Automated testing: Testing top 10 OWASP vulnerabilities of government web applications in bangladesh

A Ahamed, N Sadman, TA Khan, MI Hannan… - ICSEA …, 2022 - irinsubria.uninsubria.it
With an increase in the popularity of the Internet, there is also a rise in the number of security
threats and vulnerabilities. The Open Web Application Security Project (OWASP) is an …

[PDF][PDF] ANALISIS PENGUJIAN PENETRASI PADA LAYANAN HOSTING MENGGUNAKAN METODE BLACK BOX (Studi kasus: Blogspot, Wordpress dan Shared …

A Bimandaru, A Alamsyah, A Nugroho - Foristek, 2023 - foristek.fatek.untad.ac.id
ANALISIS PENGUJIAN PENETRASI PADA LAYANAN HOSTING MENGGUNAKAN METODE
BLACK BOX (Studi kasus : Blogspot, Wordpress dan Shared Hos Page 1 Jurnal FORISTEK …