Android mobile applications vulnerabilities and prevention methods: A review

H Abdullah, SRM Zeebaree - … To Enhance e-learning and Other …, 2021 - ieeexplore.ieee.org
The popularity of mobile applications is rapidly increasing in the age of smartphones and
tablets. Communication, social media, news, sending emails, buying, paying, viewing …

An empirical comparison of pen-testing tools for detecting web app vulnerabilities

M Albahar, D Alansari, A Jurcut - Electronics, 2022 - mdpi.com
Today, one of the most popular ways organizations use to provide their services, or broadly
speaking, interact with their customers, is through web applications. Those applications …

Cyber security: Current threats, challenges, and prevention methods

M Jain, A Sinha, A Agrawal… - … Conference on Advances …, 2022 - ieeexplore.ieee.org
Objective of this study is to perceive the attacks, threats, and weaknesses of digital
framework, which incorporate equipment and programming frameworks, organizations, and …

A path forward for automation in robotic process automation projects: Potential process selection strategies

N Yadav, SP Panda - … on Machine Learning, Big Data, Cloud …, 2022 - ieeexplore.ieee.org
Today's businesses are continually gazing for innovative methods to digitize and automate
their processes with the intention to maximize production and efficiency. Organizations are …

[PDF][PDF] A framework for systematic classification of assets for security testing

S Jan, OB Tauqeer, FQ Khan, G Tsaramirsis… - Comput. Mater …, 2021 - academia.edu
Over the last decade, a significant increase has been observed in the use of web-based
Information systems that process sensitive information, eg, personal, financial, medical. With …

Towards a Contemporary Definition of Cybersecurity

F Schiliro - arXiv preprint arXiv:2302.02274, 2023 - arxiv.org
The report provides an intricate analysis of cyber security defined in contemporary
operational digital environments. An extensive literature review is formed to determine how …

[PDF][PDF] Recommended practices for the analysis of web application vulnerabilities

VV Varenitca, AS Markov, VV Savchenko - … International Scientific and …, 2019 - ceur-ws.org
The paper is dedicated to information security of web applications. It discusses main classes
of web application vulnerabilities and topic-related regulatory documents. An original …

HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms

A Singhal, J Madan, S Madan - Advances in Information Communication …, 2023 - Springer
With the advancement in technology, plenty of data is being shared between users using
various mediums. And with this excessive data transmission, it needs to be supervised that …

Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner

M Malkawi, T Özyer, R Alhajj - Proceedings of the 2021 IEEE/ACM …, 2021 - dl.acm.org
The unprecedented growth in technology has increased the importance of the required
information security that is still hard to be reached. Recently, network and web application …

Streams of Data Flow in Transmission Control Protocol (TCP) Request-Response Cycle Efficiency

A Abubakar, ZM Yusof - International Journal on Perceptive …, 2024 - journals.iium.edu.my
This study examines the complexities of data transmission in Transmission Control Protocol
(TCP) Request-Response cycles, with the goal of improving overall efficiency. The research …