Journal articles on the topic 'Security of web applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security of web applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Wu, Raymond, and Masayuki Hisada. "SOA Web Security and Applications." Journal of Object Technology 9, no. 2 (2010): 163. http://dx.doi.org/10.5381/jot.2010.9.2.a4.
Full textErşahin, Buket, and Mustafa Erşahin. "Web application security." South Florida Journal of Development 3, no. 4 (2022): 4194–203. http://dx.doi.org/10.46932/sfjdv3n4-002.
Full textJalgasbaevna, PerdebaevaInabat. "Identifying andMitigating Security Vulnerabilities inWeb Applications." American Journal of Applied Science and Technology 5, no. 5 (2025): 10–11. https://doi.org/10.37547/ajast/volume05issue05-03.
Full textPankaj, Choudhary, Aaseri Rajendra, and Roberts Nirmal. "HTTPI BASED WEB SERVICE SECURITY OVER SOAP." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 55–66. https://doi.org/10.5281/zenodo.4278394.
Full textShah, Sarthak. "Fortifying Data Security." International Journal of Applied and Advanced Multidisciplinary Research 1, no. 3 (2023): 221–28. http://dx.doi.org/10.59890/ijaamr.v1i3.679.
Full textAlrawais, Layla Mohammed, Mamdouh Alenezi, and Mohammad Akour. "Security Testing Framework for Web Applications." International Journal of Software Innovation 6, no. 3 (2018): 93–117. http://dx.doi.org/10.4018/ijsi.2018070107.
Full textMorgan, David. "Network security and custom Web applications." Network Security 2004, no. 4 (2004): 15–17. http://dx.doi.org/10.1016/s1353-4858(04)00068-6.
Full textJoshi, James B. D., Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford. "Security models for web-based applications." Communications of the ACM 44, no. 2 (2001): 38–44. http://dx.doi.org/10.1145/359205.359224.
Full textAyyarrappan, Mariappan. "Optimizing Cloud Security for Web Applications." Journal of Artificial Intelligence, Machine Learning and Data Science 1, no. 3 (2023): 2520–22. https://doi.org/10.51219/jaimld/mariappan-ayyarrappan/539.
Full textAlzahrani, Abdulrahman, Ali Alqazzaz, Nabil Almashfi, Huirong Fu, and Ye Zhu. "Web Application Security Tools Analysis." Studies in Media and Communication 5, no. 2 (2017): 118. http://dx.doi.org/10.11114/smc.v5i2.2663.
Full textWulandari, Kusuma Herdanu, Alayham Abbas Helmi Rabab, and Syamsudin Mariana. "Integration biometrics in web application: Security for web apps." International Research Journal of Science, Technology, Education, and Management 3, no. 2 (2023): 103–16. https://doi.org/10.5281/zenodo.8139747.
Full textKamil, Mustofa. "Methodology of Security testing of IKID website and Security Vulnerabilities." ACMIT Proceedings 6, no. 1 (2021): 83–90. http://dx.doi.org/10.33555/acmit.v6i1.101.
Full textГорелик, В. Ю., and Д. С. Скоморохов. "Networked web application security." Informacionno-technologicheskij vestnik, no. 1(23) (March 11, 2020): 104–9. http://dx.doi.org/10.21499/2409-1650-2020-23-1-104-109.
Full textRizqi, Muhamad Fahrizal, Rohmat Tulloh, and Nazel Djibran. "Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 341–48. http://dx.doi.org/10.32493/informatika.v8i2.33691.
Full textJovicic, Bojan, and Dejan Simic. "Common web application attack types and security using ASP.NET." Computer Science and Information Systems 3, no. 2 (2006): 83–96. http://dx.doi.org/10.2298/csis0602083j.
Full textErbel, Mateusz, and Piotr Kopniak. "Assessment of the web application security effectiveness against various methods of network attacks." Journal of Computer Sciences Institute 9 (December 30, 2018): 340–44. http://dx.doi.org/10.35784/jcsi.707.
Full textManiraj, S. P., Chitra Sabapathy Ranganathan, and Satheeshkumar Sekar. "SECURING WEB APPLICATIONS WITH OWASP ZAP FOR COMPREHENSIVE SECURITY TESTING." INTERNATIONAL JOURNAL OF ADVANCES IN SIGNAL AND IMAGE SCIENCES 10, no. 2 (2024): 12–23. https://doi.org/10.29284/ijasis.10.2.2024.12-23.
Full textRahela, Sadaf, and Vijay Kumar Dr. "Security Risks in Web Applications and their Mitigation Techniques." International Journal of Innovative Analyses and Emerging Technology 1, no. 1 (2021): 1–6. https://doi.org/10.5281/zenodo.5094548.
Full textAbdel-Kader, Rabab F., Mona Nashaat, Mohamed I. Habib, and Hani M. K. Mahdi. "Automated server-side model for recognition of security vulnerabilities in scripting languages." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6061. http://dx.doi.org/10.11591/ijece.v10i6.pp6061-6070.
Full textRabab, F. Abdel-Kader, Nashaat Mona, I. Habib Mohamed, and M. K. Mahdi Hani. "Automated server-side model for recognition of security vulnerabilities in scripting languages." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 6 (2020): 6061–70. https://doi.org/10.11591/ijece.v10i6.pp6061-6070.
Full textSayan Basak, Mayur Jadhav, Suraj Choudhary, Pranjal Kadam, and Sheetal P. Gawande. "Web Application Security: A Survey." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 08 (2024): 2694–98. http://dx.doi.org/10.47392/irjaem.2024.0390.
Full textOlena, Trofymenko, Dyka Anastasiia, and Loboda Yuliia. "Analysis of vulnerabilities and security problems of web applications." System technologies 3, no. 146 (2023): 25–37. http://dx.doi.org/10.34185/1562-9945-3-146-2023-03.
Full textAniyikaiye, Jide, and Emmanuel Udoh. "Web Services Gateway." International Journal of Grid and High Performance Computing 8, no. 1 (2016): 85–92. http://dx.doi.org/10.4018/ijghpc.2016010108.
Full textSuganya, S., D. Rajthilak, and G. Gomathi. "Multi-Tier Web Security on Web Applications from Sql Attacks." IOSR Journal of Computer Engineering 16, no. 2 (2014): 01–04. http://dx.doi.org/10.9790/0661-16270104.
Full textAyyarrappan, Mariappan. "AI-driven Security Enhancements for Web Applications." International Scientific Journal of Engineering and Management 03, no. 08 (2024): 1–3. https://doi.org/10.55041/isjem01992.
Full textKaur, Prabhdeep, and Harkamal Kaur. "Evaluating the Security Flaws in Web Applications." International Journal of Computer Applications 122, no. 5 (2015): 27–29. http://dx.doi.org/10.5120/21697-4806.
Full textP.Salini and S. Kanmani. "Security Requirements Engineering Process for Web Applications." Procedia Engineering 38 (2012): 2799–807. http://dx.doi.org/10.1016/j.proeng.2012.06.328.
Full textPooj, Karishma, and Sonali Patil. "Understanding File Upload Security for Web Applications." International Journal of Engineering Trends and Technology 42, no. 7 (2016): 342–47. http://dx.doi.org/10.14445/22315381/ijett-v42p261.
Full textNeto, Afonso Araújo, and Marco Vieira. "Selecting Secure Web Applications Using Trustworthiness Benchmarking." International Journal of Dependable and Trustworthy Information Systems 2, no. 2 (2011): 1–16. http://dx.doi.org/10.4018/jdtis.2011040101.
Full textRutvi, Pradipkumar Adhyaru. "TECHNIQUES FOR ATTACKING WEB APPLICATION SECURITY." International Journal of Information Sciences and Techniques (IJIST) 6, no. 2 (2018): 45–52. https://doi.org/10.5281/zenodo.1217221.
Full textRutvi, Pradipkumar Adhyaru. "TECHNIQUES FOR ATTACKING WEB APPLICATION SECURITY." International Journal of Information Sciences and Techniques (IJIST) 6, no. 1/2 (2016): 45–52. https://doi.org/10.5281/zenodo.7388573.
Full textAndrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.
Full textChakradhar, Avinash Devarapalli. "Strategies to Secure Web Applications: Protecting Frontend from Common Vulnerabilities." Journal of Scientific and Engineering Research 6, no. 4 (2019): 201–5. https://doi.org/10.5281/zenodo.11211691.
Full textAl-Ahmad, Ahmad, Belal Abu Ata, and Abdullah Wahbeh. "Pen Testing for Web Applications." International Journal of Information Technology and Web Engineering 7, no. 3 (2012): 1–13. http://dx.doi.org/10.4018/jitwe.2012070101.
Full textHall, Calum, Lynsay Shepherd, and Natalie Coull. "BlackWatch: Increasing Attack Awareness within Web Applications." Future Internet 11, no. 2 (2019): 44. http://dx.doi.org/10.3390/fi11020044.
Full textDwivedi, Aarushi. "Vulnerability Scanning Technology on Web Applications." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 991–95. http://dx.doi.org/10.22214/ijraset.2021.35135.
Full textKeerthika, T., A. Adithyan, S. Balaji, and Mukulraj J Lunia. "Remote Code Execution in Web Applications." International Journal of Engineering & Technology 7, no. 4.19 (2018): 384–87. http://dx.doi.org/10.14419/ijet.v7i4.19.22098.
Full textHarrison Oke Ekpobimi, Regina Coelis Kandekere, and Adebamigbe Alex Fasanmade. "Front-end development and cybersecurity: A conceptual approach to building secure web applications." Computer Science & IT Research Journal 5, no. 9 (2024): 2154–68. http://dx.doi.org/10.51594/csitrj.v5i9.1556.
Full textx, Pooja. "Enhancing Data Security in JavaScript Web Applications Using SQL Encryption Techniques." International Journal of Science and Research (IJSR) 13, no. 10 (2024): 586–91. http://dx.doi.org/10.21275/sr241007123824.
Full textKumar, Shivam, Raval Mahesh, Nrip Nripesh, and Sinha Achalesh. "A research study on Web Application Security." International Journal of Multidisciplinary Research Transactions 4, no. 6 (2022): 93–104. https://doi.org/10.5281/zenodo.6633934.
Full textP.Salini and S.Kanmani. "IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY." International Journal on Web Service Computing (IJWSC) 3, no. 3 (2012): 95–107. https://doi.org/10.5281/zenodo.4405033.
Full textP.Salini and S.Kanmani. "IMPLEMENTATION OF MOSRE FRAMEWORK FOR A WEB APPLICATION - A CASE STUDY." International Journal on Web Service Computing (IJWSC) 3, no. 3 (2012): 95–107. https://doi.org/10.5281/zenodo.3549284.
Full textGupta, Ishaan, ira ., Aditya Gusain, Kusum Mahajan, Faisal Rais, and Rekha Chaudhary. "DATA SECURITY AND DATA BREACHES." International Journal of Engineering Applied Sciences and Technology 8, no. 2 (2023): 174–77. http://dx.doi.org/10.33564/ijeast.2023.v08i02.025.
Full textDr., AMMAR ALDALLAL, and KASHIF SHABBIR Dr. "Protecting Web Applications from Cross-Site Scripting Attacks." JOURNAL OF APPLIED ENGINEERING RESEARCH 2017, no. 03 (2017): 18. https://doi.org/10.5281/zenodo.849089.
Full textShah, Sarthak, and Anuja Phapale. "Home / Archives / Vol. 1 No. 3 (2023): November 2023 / Articles Fortifying Data Security: Node.js Authentication, Authorization, and the Dark Web Influence in Modern Web Apps." Fortifying Data Security: Node.js Authentication, Authorization, and the Dark Web Influence in Modern Web Apps 1, Vol. 1 No. 3 (2023): November 2023 (2024): 8. https://doi.org/10.59890/ijaamr.v1i3.679.
Full textSadritdinova, Dinora A'zamjon qizi. "WEB APPLICATIONS AND THEIR TYPES." Multidisciplinary Journal of Science and Technology 5, no. 3 (2025): 155–59. https://doi.org/10.5281/zenodo.14995607.
Full textRida, Abderrahim, and Ayoub Ait Lahcen. "Towards DevSecOps Model for Multi-tier Web Applications." ITM Web of Conferences 69 (2024): 04018. https://doi.org/10.1051/itmconf/20246904018.
Full textMohammed, Awad, Ali Muhammed, Takruri Maen, and Ismail Shereen. "Security vulnerabilities related to web-based data." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 852–56. https://doi.org/10.12928/TELKOMNIKA.v17i2.10484.
Full textSethi, IPS, Sanjay Kumar Sinha, Neeta Chauhan, and Deepti Khanduja. "Secure Web Application: Rudimentary perspective." Journal of Engineering Education Transformations 36, S1 (2022): 185–90. http://dx.doi.org/10.16920/jeet/2022/v36is1/22190.
Full textAlawsi, Wasan A., Hadab Khalid Obayes, and Saba M. Hussain. "A Novel Image Encryption Approach for IoT Applications." Webology 19, no. 1 (2022): 1593–606. http://dx.doi.org/10.14704/web/v19i1/web19107.
Full text