Search Results - (( _ application service algorithm ) OR ( web application security algorithm ))*
Search alternatives:
- application service »
- service algorithm »
- web application »
-
1
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Herein, we examine the security vulnerabilities of RESTful web services in the view of popular OWASP rating methodologies and analyze the gaps in the existing security solutions. …”
Get full text
Get full text
Article -
2
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Herein, we examine the security vulnerabilities of RESTful web services in the view of popular OWASP rating methodologies and analyze the gaps in the existing security solutions. …”
Get full text
Get full text
Article -
3
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. …”
Get full text
Get full text
Get full text
Thesis -
5
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
6
-
7
-
8
Towards cross-site scripting vulnerability detection in mobile web applications
Published 2018“…Cross-site scripting vulnerabilities are among the top ten security vulnerabilities affecting web applications for the past decade and mobile version web applications more recently. …”
Get full text
Get full text
Get full text
Article -
9
Recent applications in quantitative methods and information technology
Published 2018“…The analyses in each chapter are explained in detail with samples of real applications in daily life to assist readers to appreciate theoretical, algorithm and mathematical formulations.Prior to reading this book, readers are advised to have some basic foundation in statistical sampling, tabu search approach, neural network, algorithms, and mathematical formulation. …”
Get full text
Get full text
Book -
10
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…In addition, a web-based application was designed and developed to remotely control the car security access and to trigger the car alarm. …”
Article -
11
Detection of SQL injection attack using machine learning
Published 2024“…Integrating this system into the backend of the web application server would augment the safety and security measures of the online application. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
-
14
Design and implementation of a private and public key crypto processor for next-generation it security applications
Published 2006“…The operating system frequency is set to 40 MHz. A demonstration application prototype in the form of a real-time secure e-document application has been developed to verify the functionality and validate the embedded system.…”
Get full text
Get full text
Get full text
Article -
15
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure Socket Layer (SSL) and Transport Layer Security (TLS) enable data encryption and authentication between various homogeneous and heterogeneous devices such as servers, computers, and software applications running all over a network. …”
Get full text
Get full text
Get full text
Proceeding -
16
Explore Ease
Published 2024“…The sophisticated search algorithm of the application makes customized vacation planning easier by allowing searches by category, date range, map location, and special needs like the number of guests, rooms, and bathrooms. …”
Get full text
Get full text
Final Year Project -
17
Implementing RC5 Encrtption Algorithm On a Web Based Medical Cosultation System
Published 2007“…Even though security requirements in medical care are traditionally high, most computerized medical care applications lack sophisticated security measures or focus only on single security objectives. …”
Get full text
Get full text
Thesis -
18
-
19
Secure mobile AES encryptor (SMAE)
Published 2016“…Besides that, the application is developed as a web based application to ensure the application can be accessed using both mobile application as well as web browser. …”
Get full text
Get full text
Undergraduates Project Papers -
20
An optimized attack tree model for security test case planning and generation
Published 2018“…A 100% security risk intervention of the web application was achieved with respect to preventing SQL injection attacks after applying all security recommendations from test case execution report.…”
Get full text
Get full text
Article
