Penetration frameworks and development issues in secure mobile application development: A systematic literature review

IU Haq, TA Khan - IEEE Access, 2021 - ieeexplore.ieee.org
The invention of smartphones has opened a new market for mobile application
development. Amateur android app developers often do not possess knowledge of the latest …

Overview and open issues on penetration test

D Dalalana Bertoglio, AF Zorzo - Journal of the Brazilian Computer Society, 2017 - Springer
Several studies regarding security testing for corporate environments, networks, and
systems were developed in the past years. Therefore, to understand how methodologies …

Incorporating active learning activities to the design and development of an undergraduate software and web security course

T Srivatanakul, F Annansingh - Journal of Computers in Education, 2022 - Springer
Data breaches and cybersecurity incidents have been a major concern for companies in
various sectors, including healthcare, financial, entertainment, business, education, and …

Blockchain-based whitelisting for consumer IoT devices and home networks

DM Mendez Mena, B Yang - Proceedings of the 19th Annual SIG …, 2018 - dl.acm.org
Internet of Things (IoT) devices present different security challenges that have not been
addressed yet and there is no clear commitment from stakeholders to do so. Such problems …

How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on Authentications

A Eipper, D Pöhn - arXiv preprint arXiv:2407.16238, 2024 - arxiv.org
Cyber attacks are ubiquitous and a constantly growing threat in the age of digitization. In
order to protect important data, developers and system administrators must be trained and …

No longer partying like it's 1999: designing a modern web stream using the it2008 curriculum guidelines

RW Connolly - Proceedings of the 10th ACM conference on SIG …, 2009 - dl.acm.org
One of the key knowledge areas in the IT 2008 Curriculum Guidelines (IT2008) is web
systems and technologies. While the minimum core coverage for this area is only 22 hours …

Is teaching with security in mind working?

S Peltsverger, O Karam - 2010 Information Security Curriculum …, 2010 - dl.acm.org
Security topics have been taught for some time at universities. The most common approach
has been to teach a required topic, and then introduce a security module later in the course …

Utilizing a vulnerable software package to teach software security design analysis

N Luburić, G Sladić… - 2019 42nd International …, 2019 - ieeexplore.ieee.org
As the number of threats and attacks to software systems increases, more attention is given
to secure software engineering practices, such as secure coding and security testing. More …

Security Analysis Methodology for Student Web Applications: A Case Study of the Mills College Computer Science Department Alumni Website

J Diaz - 2018 - search.proquest.com
Dynamic web applications are a major feature of the internet today. These web-based
database applications are responsible for storing data and for the communication between …

Enhancing the Performance of Web Application Security Testing: An In-Depth Analysis and Optimization of Web Vulnerability Scanners

S Alazmi - 2023 - search.proquest.com
Web applications have become an indispensable part of our lives today. Meanwhile,
hackers' exploitation of web application vulnerabilities is increasing, and the damages …