Journal articles on the topic 'Web 2.0 security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web 2.0 security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Abselyamov, Amet-Han Alim-ogly, and Tatyana Vladimirovna Lagutkina. "Investigation of authentication methods on web services. Current trends and development prospects." Research result. Information technologies 9, no. 2 (2024): 12–20. http://dx.doi.org/10.18413/2518-1092-2024-9-2-0-2.
Full textTamam, Moh Badri, and Hozairi Hozairi. "IMPLEMENTASI METODE ANALYTICAL HIERARCY PROCESS (AHP) UNTUK ANALISIS FAKTOR KEAMANAN LAUT INDONESIA." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 1, no. 1 (2020): 10–18. http://dx.doi.org/10.31102/jatim.v1i1.753.
Full textIlalang, Gagas Akar, Handaru Jati, and Nurkhamid. "Pengembangan Web Direktori Karya Mahasiswa Dengan Implementasi Data Versioning." Journal of Information Technology and Education (JITED) 1, no. 2 (2023): 49–60. http://dx.doi.org/10.21831/jited.v1i2.83.
Full textAli Jadoo, Saad Ahmed, Adil Hassan Alhusseiny, Shukur Mahmood Yaseen, et al. "Knowledge, attitude, and practice toward COVID-19 among Iraqi people: a web-based cross-sectional study." Journal of Ideas in Health 3, Special2 (2020): 258–65. http://dx.doi.org/10.47108/jidhealth.vol3.issspecial2.59.
Full textDiharja, Reza, Sargawi Pakpahan, Mardiono Mardiono, and Sri Wiji Lestari. "Penerapan Sensor Sidik Jari pada Rancangan Prototipe Smart Home untuk Akses Pencahayaan dan Pintu." TELKA - Telekomunikasi Elektronika Komputasi dan Kontrol 8, no. 1 (2022): 82–94. http://dx.doi.org/10.15575/telka.v8n1.82-94.
Full textGarba, Faisal A., Rosemary M. Dima, A. Balarabe Isa, et al. "Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System." Journal of Cybersecurity and Information Management 10, no. 1 (2022): 18–33. http://dx.doi.org/10.54216/jcim.090105.
Full textChauvie, Stephane, Alberto Biggi, Alexandru Stancu, Piergiorgio Cerello, and Andrea Gallamini. "WIDEN: A tool for medical imaging management in oncology clinical trials." Journal of Clinical Oncology 30, no. 15_suppl (2012): e13093-e13093. http://dx.doi.org/10.1200/jco.2012.30.15_suppl.e13093.
Full textKobayashi, Koichi, Katsuyasu Fukasawa, and Naoko Masuyama. "The Observation of the Vein Distribution of a Partial Toe-Transfer Flaps with a Short Vascular Pedicle." Journal of Hand Surgery (Asian-Pacific Volume) 23, no. 02 (2018): 227–31. http://dx.doi.org/10.1142/s242483551850025x.
Full textTchatchueng-Mbougua, Jules Brice, Loique Landry Messanga Essengue, Francis Jaudel Septoh Yuya, et al. "Improving the management and security of COVID 19 diagnostic test data with a digital platform in resource-limited settings: The case of PlaCARD in Cameroon." PLOS Digital Health 1, no. 10 (2022): e0000113. http://dx.doi.org/10.1371/journal.pdig.0000113.
Full textIrawati, Irawati. "Network Monitoring System." JE-Unisla 5, no. 2 (2020): 359. http://dx.doi.org/10.30736/je.v5i2.456.
Full textNur'Aini, Dania Putri. "Analisis Performa Transmisi Data Log Berbasis IoT Cloud Pada Kunci Pintu Pintar Menggunakan Rekognisi Wajah." Indonesian Journal of Applied Informatics 7, no. 1 (2023): 28. http://dx.doi.org/10.20961/ijai.v7i1.63795.
Full textNorton, Melanie J. "Web security & commerce." Journal of the American Society for Information Science 49, no. 10 (1998): 955–56. http://dx.doi.org/10.1002/(sici)1097-4571(199808)49:10<955::aid-asi12>3.0.co;2-8.
Full textMiguel, Jorge, Santi Caballé, Fatos Xhafa, and Josep Prieto. "Security in online web learning assessment." World Wide Web 18, no. 6 (2015): 1655–76. http://dx.doi.org/10.1007/s11280-014-0320-2.
Full textAndrea, Daphne, and Theresa Aurel Tanuwijaya. "Weak State as a Security Threat: Study Case of El Salvador (2014-2019)." Jurnal Sentris 4, no. 1 (2023): 14–33. http://dx.doi.org/10.26593/sentris.v4i1.6545.14-33.
Full textLinnhoff-Popien, Claudia. "2. Cyber Security." Digitale Welt 4, no. 2 (2020): 50–51. http://dx.doi.org/10.1007/s42354-020-0261-0.
Full textItahriouan, Zakaria, Noura Aknin, Anouar Abtoy, and Kamal Eddine El Kadiri. "Building a Web-based IDE from Web 2. 0 perspective." International Journal of Computer Applications 96, no. 22 (2014): 46–50. http://dx.doi.org/10.5120/16930-7061.
Full textYulianton, H., H. L. H. S. Warnars, B. Soewito, F. L. Gaol, and E. Abdurachman. "Web Security and Vulnerability: A Literature Review." Journal of Physics: Conference Series 1477 (March 2020): 022028. http://dx.doi.org/10.1088/1742-6596/1477/2/022028.
Full textArmando, Yoel, and Rosalina Rosalina. "Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework." JISA(Jurnal Informatika dan Sains) 6, no. 2 (2023): 105–9. http://dx.doi.org/10.31326/jisa.v6i2.1656.
Full textIvanenko, Dmytro, and Oleksii Pryshchepa. "Evaluation of the efficiency of web-application safety scanners." Computer Science and Cybersecurity, no. 2 (2021): 4–14. http://dx.doi.org/10.26565/2519-2310-2021-2-01.
Full textErtemel, Adnan Veysel, and Mustafa Emre Civelek. "The Effect of e-Commerce Web Site Security on Purchase Intention." Beykoz Akademi Dergisi 6, no. 2 (2018): 81–89. https://doi.org/10.14514/BYK.m.26515393.2018.6/2.
Full textR M, Bhavana. "Fast Identity Online 2 :Authentication Technique." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34662.
Full textHeuer de Carvalho, Victor Diogho, and Ana Paula Cabral Seixas Costa. "Public Security Sentiment Analysis on Social Web." International Journal of Decision Support System Technology 13, no. 1 (2021): 1–20. http://dx.doi.org/10.4018/ijdsst.2021010101.
Full textDawson, James. "Web and email security: Keeping your practice IT secure." BDJ In Practice 35, no. 5 (2022): 30. http://dx.doi.org/10.1038/s41404-022-1115-2.
Full textCanfora, Gerardo, and Corrado Aaron Visaggio. "A set of features to detect web security threats." Journal of Computer Virology and Hacking Techniques 12, no. 4 (2016): 243–61. http://dx.doi.org/10.1007/s11416-016-0266-2.
Full textLiwanag, Nancy. "“Agbasa” : A Web Application in Reading Comprehension." International Research and Innovation Journal on Education, Engineering, and Agriculture Journal 1 (June 1, 2024): 14–19. https://doi.org/10.62960/irijeea.v1i.2.
Full textYaremchuk, Kyrylo, Denys Voskoboinykov, and Olha Melkozerova. "Modern threats and ways to secure web applications." Computer Science and Cybersecurity, no. 2 (December 26, 2022): 28–34. http://dx.doi.org/10.26565/2519-2310-2022-2-03.
Full textAbdulraheem, A.O., Adepoju, S.A., Ojerinde, A.O., and Abisoye, O.A. "A Brief Overview on Applications of Multi-Criteria Decision Making Methods in Web Application Security." Advances in Multidisciplinary and scientific Research Journal Publication 2, no. 2 (2023): 59–66. http://dx.doi.org/10.22624/aims/csean-smart2023p8.
Full textKim, Jemin, and Joonseok Park. "Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection." Sensors 23, no. 23 (2023): 9407. http://dx.doi.org/10.3390/s23239407.
Full textAguaded Gómez, José Ignacio, and Manuel Fandos Igado. "Web 2 (y 3).0 desde una óptica empresarial." Edutec. Revista Electrónica de Tecnología Educativa, no. 26 (July 20, 2008): a095. http://dx.doi.org/10.21556/edutec.2008.26.467.
Full textKurapati, Lakshmanarao. "Types of Authentications in Web Based Frontend." International Journal of Advanced Information Technology 15, no. 1/2 (2025): 01–08. https://doi.org/10.5121/ijait.2025.15201.
Full textJin, Jingquan, and Xin Lin. "Web Log Analysis and Security Assessment Method Based on Data Mining." Computational Intelligence and Neuroscience 2022 (August 25, 2022): 1–9. http://dx.doi.org/10.1155/2022/8485014.
Full textNikishin, V. D. "Legal Support of Media Security and Cognitive Sovereignty: Challenges of Social Engineering, Hybrid Wars and Web 3.0 Mechanisms (Part 2)." Lex Russica 77, no. 12 (2024): 140–55. https://doi.org/10.17803/1729-5920.2024.217.12.140-155.
Full textYadav, S., and R. Samant. "AB1108 IMPACT OF THE FIRST WAVE OF THE COVID 19 PANDEMIC ON HEALTHCARE ACCESSIBILITY, DISEASE BEHAVIOUR, ANXIETY, AND PHYSICAL ACTIVITY IN RHEUMATIC DISEASE PATIENTS: AN ONLINE SURVEY AND POTENTIAL SOLUTIONS." Annals of the Rheumatic Diseases 81, Suppl 1 (2022): 1671.2–1671. http://dx.doi.org/10.1136/annrheumdis-2022-eular.1601.
Full textHubarieva, Iryna O., and Mykyta M. Khaustov. "Risks to Energy Security. Visualization of Scientific Research." PROBLEMS OF ECONOMY 2, no. 60 (2024): 21–30. http://dx.doi.org/10.32983/2222-0712-2024-2-21-30.
Full textWang, Ping, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, and Muhammad Younas. "A fuzzy outranking approach in risk analysis of web service security." Cluster Computing 10, no. 1 (2007): 47–55. http://dx.doi.org/10.1007/s10586-007-0002-2.
Full textIkonnikov, Mark, and Igor Karmanov. "MEASURES AND REQUIREMENTS TO PROTECTED WEB APPLICATIONS." Interexpo GEO-Siberia 6, no. 2 (2019): 13–19. http://dx.doi.org/10.33764/2618-981x-2019-6-2-13-19.
Full textRifky Lana Rahardian. "ANALISIS KEAMANAN WEB NEW KUTA GOLF MENGGUNAKAN METODE VULNERABILITY ASSESSMENTS DAN PERHITUNGAN SECURITY METRIKS." Jurnal Informatika Dan Tekonologi Komputer (JITEK) 2, no. 3 (2022): 256–65. http://dx.doi.org/10.55606/jitek.v2i3.582.
Full textЧечет, А. С., М. В. Черних, Я. С. Панасюк, and І. І. Абдуллін. "FRONT-END SECURITY ARCHITECTURE: PROTECTION OF USER DATA AND PRIVACY." Systems and Technologies 68, no. 2 (2024): 102–11. https://doi.org/10.32782/2521-6643-2024-2-68.12.
Full text., Kamini, and Ravinder Singh. "Performance Test of WAP Gateway Over Web Server Using OPNET." CGC International Journal of Contemporary Technology and Research 2, no. 2 (2020): 120–25. http://dx.doi.org/10.46860/cgcijctr.2020.06.26.120.
Full textMr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.
Full textAYTAN, Talat. "Türkçe Öğretmen Adaylarının Web 2. 0 Araçlarına Yönelik Algılarının İncelenmesi." Journal of Turkish Studies 10, Volume 10 Issue 7 (2015): 149. http://dx.doi.org/10.7827/turkishstudies.8388.
Full textBhatia, Kavita, Santosh K. Pandey, Vivek K. Singh, and Deena Nath Gupta. "Hash and Physical Unclonable Function (PUF)-Based Mutual Authentication Mechanism." Sensors 23, no. 14 (2023): 6307. http://dx.doi.org/10.3390/s23146307.
Full textAlbalawi, Mariam, Rasha Aloufi, Norah Alamrani, Neaimh Albalawi, Amer Aljaedi, and Adel R. Alharbi. "Website Defacement Detection and Monitoring Methods: A Review." Electronics 11, no. 21 (2022): 3573. http://dx.doi.org/10.3390/electronics11213573.
Full textPriambodo, Dimas Febriyan, Asep Dadan Rifansyah, and Muhammad Hasbi. "Penetration Testing Web XYZ Berdasarkan OWASP Risk Rating." Teknika 12, no. 1 (2023): 33–46. http://dx.doi.org/10.34148/teknika.v12i1.571.
Full textMuin, Muhammad Abdul, Kapti Kapti, and Tri Yusnanto. "Campus Website Security Vulnerability Analysis Using Nessus." International Journal of Computer and Information System (IJCIS) 3, no. 2 (2022): 79–82. http://dx.doi.org/10.29040/ijcis.v3i2.72.
Full textVapen, Anna, and Nahid Shahmehri. "2-clickAuth." International Journal of Mobile Computing and Multimedia Communications 3, no. 2 (2011): 1–18. http://dx.doi.org/10.4018/jmcmc.2011040101.
Full textTange, Koen, Sebastian Mödersheim, Apostolos Lalos, Xenofon Fafoutis, and Nicola Dragoni. "rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things." Sensors 21, no. 19 (2021): 6524. http://dx.doi.org/10.3390/s21196524.
Full textPranata, Eko Jhony. "OPTIMALISASI KEAMANAN JARINGAN KOMPUTER PADA WEB E-COMMERCE MENGGUNAKAN NETFILTER." Cyber Security dan Forensik Digital 6, no. 1 (2023): 18–24. http://dx.doi.org/10.14421/csecurity.2023.6.1.2337.
Full textImran, Al, Dyah Vitalocca, and Reski Aulia Rahmah. "Pengembangan Sistem Informasi Pelaksanaan Prakerin Berbasis Web SMK Negeri 2 Kota Parepare." Jurnal MediaTIK 5, no. 3 (2022): 63. http://dx.doi.org/10.26858/jmtik.v5i3.40389.
Full textIlmi, Akmal, Henki Bayu Seta, and I. Wayan Widi Pradnyana. "Evaluasi Risiko Celah Keamanan Menggunakan Metodologi Open-Source Security Testing Methodology Manual (OSSTMM) Pada Aplikasi Web Terbaru Fakultas Ilmu Komputer UPN Veteran Jakarta." Informatik : Jurnal Ilmu Komputer 18, no. 2 (2022): 190. http://dx.doi.org/10.52958/iftk.v18i2.4672.
Full text