-
1
Comparison of the effectiveness of tools for testing the security of web applications
Published 2025-03-01Subjects: “…web application security…”
Get full text
Article -
2
The Role of Security Perception and Usage Impact of Mobile Accounting Applications
Published 2025-01-01Subjects: “…technology acceptance model; mobile accounting application; security perception.…”
Get full text
Article -
3
Comparative evaluation of approaches & tools for effective security testing of Web applications
Published 2025-04-01Subjects: “…Static application security testing (SAST)…”
Get full text
Article -
4
Website Security Analysis Using Vulnerability Assessment Method
Published 2024-12-01Subjects: Get full text
Article -
5
An efficient deception architecture for cloud-based virtual networks
Published 2019-08-01Subjects: Get full text
Article -
6
Operational Readiness for Large Scale Distributed Applications: A Comprehensive Review
Published 2025-01-01Subjects: “…Application security…”
Get full text
Article -
7
Making JavaScript Render Decisions to Optimize Security-Oriented Crawler Process
Published 2024-01-01Subjects: Get full text
Article -
8
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: “…Web application security;vulnerability detection;access control vulnerability;access control rule;game…”
Get full text
Article -
9
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01Subjects: “…Higher Education Application Security; Personal Data Protection; Security Vulnerability; Action Research Methodology.…”
Get full text
Article -
10
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
11
Extensive Review of Threat Models for DevSecOps
Published 2025-01-01Subjects: Get full text
Article -
12
Cybersecurity Risks in EV Mobile Applications: A Comparative Assessment of OEM and Third-Party Solutions
Published 2025-06-01Subjects: Get full text
Article -
13
Unveiling Samsung Quantum Galaxy: Securing Smartphones With Quantum and Post-Quantum Cryptography
Published 2025-01-01Subjects: Get full text
Article -
14
Android Kötücül Yazılım Tespit Sistemleri İncelemesi
Published 2017-01-01Subjects: Get full text
Article -
15
Android Kötücül Yazılım Tespit Sistemleri İncelemesi
Published 2017-10-01Subjects: Get full text
Article -
16
Android Kötücül Yazılım Tespit Sistemleri İncelemesi
Published 2017-01-01Subjects: Get full text
Article