|
|
|
Calum C. Hall, Lynsay A. Shepherd and Natalie Coull
Web applications are relied upon by many for the services they provide. It is essential that applications implement appropriate security measures to prevent security incidents. Currently, web applications focus resources towards the preventative side of ...
ver más
|
|
|
|
|
|
|
Anggi Elanda,Robby Lintang Buana
Pág. 185 - 191
Abstract -- OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications. This systematic review is intended to review whether the Open Web ...
ver más
|
|
|
|
|
|
|
Keyong Wang, Mengyao Tong, Dequan Yang and Yuhang Liu
IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the pu...
ver más
|
|
|
|
|
|
|
Luigi Lo Iacono, Hoai Viet Nguyen and Peter Leo Gorski
Contemporary software is inherently distributed. The principles guiding the design of such software have been mainly manifested by the service-oriented architecture (SOA) concept. In a SOA, applications are orchestrated by software services generally ope...
ver más
|
|
|
|
|
|
|
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ...
ver más
|
|
|
|
|
|
|
Sibel Kapan and Efnan Sora Gunal
In phishing attack detection, machine learning-based approaches are more effective than simple blacklisting strategies, as they can adapt to new types of attacks and do not require manual updates. However, for these approaches, the choice of features and...
ver más
|
|
|
|
|
|
|
Zoltán Szabó and Vilmos Bilicki
Due to the proliferation of large language models (LLMs) and their widespread use in applications such as ChatGPT, there has been a significant increase in interest in AI over the past year. Multiple researchers have raised the question: how will AI be a...
ver más
|
|
|
|
|
|
|
Harshvardhan J. Pandit
Solid is a new radical paradigm based on decentralising control of data from central organisations to individuals that seeks to empower individuals to have active control of who and how their data is being used. In order to realise this vision, the use-c...
ver más
|
|
|
|
|
|
|
Fahad M. Alotaibi and Vassilios G. Vassilakis
Web attacks pose a significant threat to enterprises, as attackers often target web applications first. Various solutions have been proposed to mitigate and reduce the severity of these threats, such as web application firewalls (WAFs). On the other hand...
ver más
|
|
|
|
|
|
|
Rokia Lamrani Alaoui and El Habib Nfaoui
Web applications are the best Internet-based solution to provide online web services, but they also bring serious security challenges. Thus, enhancing web applications security against hacking attempts is of paramount importance. Traditional Web Applicat...
ver más
|
|
|
|
|
|
|
Muhammad Idris, Iwan Syarif, Idris Winarno
Pág. 246 - 261
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple applicat...
ver más
|
|
|
|
|
|
|
Hayder Najm,Haider K. Hoomod,Rehab Hassan
Pág. pp. 184 - 199
The concept Web of Things (WoT) goes well beyond the emphasis on the Internet as a means of sharing data, instead of introducing all resources and connections involving computers, data, and people to the Web. It, therefore, focuses on a range of problems...
ver más
|
|
|
|
|
|
|
|
John Edison Moreno Marín, Paulo Cesar Coronado Sánchez
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the...
ver más
|
|
|
|
|
|
|
Jose-Manuel Martinez-Caro, Antonio-Jose Aledo-Hernandez, Antonio Guillen-Perez, Ramon Sanchez-Iborra and Maria-Dolores Cano
Web Content Management Systems (WCMS) play an increasingly important role in the Internet?s evolution. They are software platforms that facilitate the implementation of a web site or an e-commerce and are gaining popularity due to its flexibility and eas...
ver más
|
|
|
|
|
|
|
Luca Roffia, Paolo Azzoni, Cristiano Aguzzi, Fabio Viola, Francesco Antoniazzi and Tullio Salmon Cinotti
This paper presents a decentralized Web-based architecture designed to support the development of distributed, dynamic, context-aware and interoperable services and applications. The architecture enables the detection and notification of changes over the...
ver más
|
|
|
|
|
|
|
Ramamurthi Deeptha,Rajeswari Mukesh
Pág. 8 - 14
Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc...
ver más
|
|
|
|
|
|
|
Aris Budiyarto,Abdur Rohman Harits Martawireja,Mohammad Harry Khomas Saputra,Gun Gun Maulana
Pág. 22 - 33
In Indonesia, the theft rate is still quite high. According to Bappeda data, cases of theft still tend to be high. In 2019, there were 362,000 cases of theft. CCTV use is still ineffective because at the time of the theft of goods, we only know the goods...
ver más
|
|
|
|
|
|
|
Eduardo B. Fernandez, Ola Ajaj, Ingrid Buckley, Nelly Delessy-Gassant, Keiko Hashizume and Maria M. Larrondo-Petrie
|
|
|
|