Journal articles on the topic 'OWASP TOP 10'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 15 journal articles for your research on the topic 'OWASP TOP 10.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wetter, Dirk. "OWASP Top 10: Zwei Jahre danach." Datenschutz und Datensicherheit - DuD 36, no. 11 (October 23, 2012): 810–13. http://dx.doi.org/10.1007/s11623-012-0277-1.
Full textWibowo, Ripto Mukti, and Aruji Sulaksono. "Web Vulnerability Through Cross Site Scripting (XSS) Detection with OWASP Security Shepherd." Indonesian Journal of Information Systems 3, no. 2 (February 25, 2021): 149. http://dx.doi.org/10.24002/ijis.v3i2.4192.
Full textLi, Jinfeng. "Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)." Annals of Emerging Technologies in Computing 4, no. 3 (July 1, 2020): 1–8. http://dx.doi.org/10.33166/aetic.2020.03.001.
Full textKellezi, Deina, Christian Boegelund, and Weizhi Meng. "Securing Open Banking with Model-View-Controller Architecture and OWASP." Wireless Communications and Mobile Computing 2021 (September 21, 2021): 1–13. http://dx.doi.org/10.1155/2021/8028073.
Full textChen, Zhuang, Min Guo, and Lin zhou. "Research on SQL injection detection technology based on SVM." MATEC Web of Conferences 173 (2018): 01004. http://dx.doi.org/10.1051/matecconf/201817301004.
Full textChou, Yuyu, and Jan Oetting. "Risk Assessment for Cloud-Based IT Systems." International Journal of Grid and High Performance Computing 3, no. 2 (April 2011): 1–13. http://dx.doi.org/10.4018/jghpc.2011040101.
Full textWaheed Kadhim, Raed, and Methaq Talib Gaata. "A hybrid of CNN and LSTM methods for securing web application against cross-site scripting attack." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 2 (February 1, 2021): 1022. http://dx.doi.org/10.11591/ijeecs.v21.i2.pp1022-1029.
Full textYoda, Minami, Shuji Sakuraba, Yuichi Sei, Yasuyuki Tahara, and Akihiko Ohsuga. "Detection of the Hardcoded Login Information from Socket and String Compare Symbols." Annals of Emerging Technologies in Computing 5, no. 1 (January 1, 2021): 28–39. http://dx.doi.org/10.33166/aetic.2021.01.003.
Full textFarooq, Umar. "Ensemble Machine Learning Approaches for Detection of SQL Injection Attack." Tehnički glasnik 15, no. 1 (March 4, 2021): 112–20. http://dx.doi.org/10.31803/tg-20210205101347.
Full textFerrara, Pietro, Amit Kr Mandal, Agostino Cortesi, and Fausto Spoto. "Static analysis for discovering IoT vulnerabilities." International Journal on Software Tools for Technology Transfer, November 24, 2020. http://dx.doi.org/10.1007/s10009-020-00592-x.
Full text"Web Application Penetration Testing." VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE 8, no. 10 (August 10, 2019): 1029–35. http://dx.doi.org/10.35940/ijitee.j9173.0881019.
Full text"The Solutions of SQL Injection Vulnerability in Web Application Security." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 3803–8. http://dx.doi.org/10.35940/ijeat.f9395.088619.
Full textVergara Fajardo, Geraldín, Diana Marcela Montaño, Siler Amado Donado, and Katerine Márceles Villalba. "CONCEPTUAL FOUNDATION FOR AN AUTOMATED PENTESTER BASED ON A SINGLE BOARD COMPUTER." Ingeniería Solidaria 15, no. 28 (May 27, 2019). http://dx.doi.org/10.16925/2357-6014.2019.02.08.
Full textMonar Monar, Joffre Stalin, Danilo Mauricio Pastor Ramirez, Gloria de Lourdes Arcos Medina, and Mayra Alejandra Oñate Andino. "Técnicas de programación segura para mitigar vulnerabilidades en aplicaciones web." Congreso de Ciencia y Tecnología ESPE 13, no. 1 (June 23, 2018). http://dx.doi.org/10.24133/cctespe.v13i1.753.
Full text"Building the Security Function Point Method for Web Application Vulnerability Remediation." International Journal of Recent Technology and Engineering 8, no. 4 (November 30, 2019): 5962–68. http://dx.doi.org/10.35940/ijrte.d8948.118419.
Full text