Android mobile applications vulnerabilities and prevention methods: A review
H Abdullah, SRM Zeebaree - … To Enhance e-learning and Other …, 2021 - ieeexplore.ieee.org
The popularity of mobile applications is rapidly increasing in the age of smartphones and
tablets. Communication, social media, news, sending emails, buying, paying, viewing …
tablets. Communication, social media, news, sending emails, buying, paying, viewing …
An empirical comparison of pen-testing tools for detecting web app vulnerabilities
Today, one of the most popular ways organizations use to provide their services, or broadly
speaking, interact with their customers, is through web applications. Those applications …
speaking, interact with their customers, is through web applications. Those applications …
Cyber security: Current threats, challenges, and prevention methods
M Jain, A Sinha, A Agrawal… - … Conference on Advances …, 2022 - ieeexplore.ieee.org
Objective of this study is to perceive the attacks, threats, and weaknesses of digital
framework, which incorporate equipment and programming frameworks, organizations, and …
framework, which incorporate equipment and programming frameworks, organizations, and …
A path forward for automation in robotic process automation projects: Potential process selection strategies
Today's businesses are continually gazing for innovative methods to digitize and automate
their processes with the intention to maximize production and efficiency. Organizations are …
their processes with the intention to maximize production and efficiency. Organizations are …
[PDF][PDF] A framework for systematic classification of assets for security testing
Over the last decade, a significant increase has been observed in the use of web-based
Information systems that process sensitive information, eg, personal, financial, medical. With …
Information systems that process sensitive information, eg, personal, financial, medical. With …
Towards a Contemporary Definition of Cybersecurity
F Schiliro - arXiv preprint arXiv:2302.02274, 2023 - arxiv.org
The report provides an intricate analysis of cyber security defined in contemporary
operational digital environments. An extensive literature review is formed to determine how …
operational digital environments. An extensive literature review is formed to determine how …
[PDF][PDF] Recommended practices for the analysis of web application vulnerabilities
VV Varenitca, AS Markov, VV Savchenko - … International Scientific and …, 2019 - ceur-ws.org
The paper is dedicated to information security of web applications. It discusses main classes
of web application vulnerabilities and topic-related regulatory documents. An original …
of web application vulnerabilities and topic-related regulatory documents. An original …
HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms
A Singhal, J Madan, S Madan - Advances in Information Communication …, 2023 - Springer
With the advancement in technology, plenty of data is being shared between users using
various mediums. And with this excessive data transmission, it needs to be supervised that …
various mediums. And with this excessive data transmission, it needs to be supervised that …
Automation of active reconnaissance phase: an automated API-based port and vulnerability scanner
M Malkawi, T Özyer, R Alhajj - Proceedings of the 2021 IEEE/ACM …, 2021 - dl.acm.org
The unprecedented growth in technology has increased the importance of the required
information security that is still hard to be reached. Recently, network and web application …
information security that is still hard to be reached. Recently, network and web application …
Streams of Data Flow in Transmission Control Protocol (TCP) Request-Response Cycle Efficiency
A Abubakar, ZM Yusof - International Journal on Perceptive …, 2024 - journals.iium.edu.my
This study examines the complexities of data transmission in Transmission Control Protocol
(TCP) Request-Response cycles, with the goal of improving overall efficiency. The research …
(TCP) Request-Response cycles, with the goal of improving overall efficiency. The research …