Showing 1 - 10 results of 10 for search '"security vulnerability"', query time: 0.06s Refine Results
  1. 1
  2. 2

    Research on key technology of vulnerability threat classification by Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG

    Published 2012-09-01
    Subjects: “…information security;vulnerability;vulnerability evaluation;vulnerability management…”
    Get full text
    Article
  3. 3
  4. 4

    Game-based detection method of broken access control vulnerabilities in Web application by HE Haitao, XU Ke, YANG Shuailin, ZHANG Bing, ZHAO Yuxuan, LI Jiazheng

    Published 2024-06-01
    Subjects: “…Web application security;vulnerability detection;access control vulnerability;access control rule;game…”
    Get full text
    Article
  5. 5

    Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ by Stefanus Eko Prasetyo, Haeruddin, Tiara

    Published 2024-12-01
    Subjects: “…Higher Education Application Security; Personal Data Protection; Security Vulnerability; Action Research Methodology.…”
    Get full text
    Article
  6. 6

    SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING by S. P. Maniraj, Chitra Sabapathy Ranganathan, Satheeshkumar Sekar

    Published 2024-12-01
    Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10