A review on c3i systems' security: Vulnerabilities, attacks, and countermeasures
Command, Control, Communication, and Intelligence (C3I) systems are increasingly used in
critical civil and military domains for achieving information superiority, operational efficacy …
critical civil and military domains for achieving information superiority, operational efficacy …
On the design of IoT security: Analysis of software vulnerabilities for smart grids
The 5G communication network will underpin a vast number of new and emerging services,
paving the way for unprecedented performance and capabilities in mobile networks. In this …
paving the way for unprecedented performance and capabilities in mobile networks. In this …
Toward a readiness model for secure software coding
The heart of the application's secure operation is its software code. If the code contains
flaws, the entire program might be hacked. The issue with software vulnerabilities is that they …
flaws, the entire program might be hacked. The issue with software vulnerabilities is that they …
Towards decentralized data storage in general cloud platform for meta-products
Meta products, such as wearable sensor devices, smart phones, and smart cars can offer
intelligent services to users in the context of their daily lives and help them better …
intelligent services to users in the context of their daily lives and help them better …
Detecting Broken Object-Level Authorization Vulnerabilities in Database-Backed Applications
Broken object-level authorization (BOLA) vulnerabilities are among the most critical security
risks facing database-backed applications. However, there is still a significant gap in our …
risks facing database-backed applications. However, there is still a significant gap in our …
[PDF][PDF] Survey on detecting and preventing web application broken access control attacks
Web applications are an essential component of the current wide range of digital services
proposition including financial and governmental services as well as social networking and …
proposition including financial and governmental services as well as social networking and …
Research and implementation of web application system vulnerability location technology
L Zheng, H Yuan, X Peng, G Zhu, Y Guo… - … Security Intelligence and …, 2020 - Springer
In the era of rapid development of Internet technology, more and more Web application
systems have emerged, and the security problems of Web applications have become more …
systems have emerged, and the security problems of Web applications have become more …
Penetration Testing on Web Application Using Insecure Direct Object References (IDOR) Method
IPAE Pratama, AM Rhusuli - … on ICT for Smart Society (ICISS), 2022 - ieeexplore.ieee.org
Security on a network is a crucial aspect along with the increase in the amount of data
exchanged on the internet network. Every company or organization is required to be able to …
exchanged on the internet network. Every company or organization is required to be able to …
[PDF][PDF] SECURING WEB APPLICATIONS
OB ISSI - 2024 - trepo.tuni.fi
ABSTRACT Oguzhan Burak ISSI: Securing Web Applications Master of Science Thesis
Tampere University Master's Programme in Computing Sciences May 2024 In today's digital …
Tampere University Master's Programme in Computing Sciences May 2024 In today's digital …
Detectando ataques Broken Object Level Authorization em APIs REST usando dependência Produtor-Consumidor
MC Loebens - 2022 - tede.ufam.edu.br
Web APIs (Application Programming Interfaces) have become ubiquitous in applications that
require some type of communication between client and server, being developed mainly …
require some type of communication between client and server, being developed mainly …