-
1
Design and implementation of national security vulnerability database
Published 2011-01-01Subjects: Get full text
Article -
2
Research on key technology of vulnerability threat classification
Published 2012-09-01Subjects: “…information security;vulnerability;vulnerability evaluation;vulnerability management…”
Get full text
Article -
3
Vulnerability detection method for blockchain smart contracts based on metamorphic testing
Published 2023-10-01Subjects: Get full text
Article -
4
Game-based detection method of broken access control vulnerabilities in Web application
Published 2024-06-01Subjects: “…Web application security;vulnerability detection;access control vulnerability;access control rule;game…”
Get full text
Article -
5
Evaluasi Kerentanan Insecure Direct Object Reference pada Aplikasi Pendaftaran Sidang Universitas XYZ
Published 2024-12-01Subjects: “…Higher Education Application Security; Personal Data Protection; Security Vulnerability; Action Research Methodology.…”
Get full text
Article -
6
SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING
Published 2024-12-01Subjects: “…zed attack proxy, web application security, vulnerability detection, security testing, threat mitigation.…”
Get full text
Article -
7
Qualitative analysis of cyber security vulnerability for Ethernet-based train communication network
Published 2022-07-01Subjects: Get full text
Article -
8
Systematic Review of Current Approaches and Innovative Solutions for Combating Zero-Day Vulnerabilities and Zero-Day Attacks
Published 2025-01-01Subjects: Get full text
Article -
9
Predicting the Risk of Unauthorized Theft of Grid Identification Information Under IoT Technology
Published 2024-12-01Subjects: Get full text
Article -
10
From Breakers to Builders: The Role of Bug Bounty Hunters in Strengthening Organizational Cybersecurity
Published 2025-03-01Subjects: Get full text
Article