Journal articles on the topic 'Web Application Firewall (WAFW)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Web Application Firewall (WAFW).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Dr., A.SHAJI GEORGE, and GEORGE A.S.HOVAN. "A Brief Study on The Evolution of Next Generation Firewall and Web Application Firewall." IJARCCE:International Journal of Advanced Research in Computer and Communication Engineering 10, no. 5 (2021): 31–37. https://doi.org/10.5281/zenodo.7027397.
Full textA. Zaki, Aya, and Saja J. Mohammed. "Artificial Intelligence for Web Application Firewall (WAF): A Comprehensive Review." International Research Journal of Innovations in Engineering and Technology 08, no. 11 (2024): 219–24. https://doi.org/10.47001/irjiet/2024.811027.
Full textRizal, Randi, and Yusuf Sumaryana. "Peningkatan Keamanan Aplikasi Web Menggunakan Web Application Firewall (WAF) Pada Sistem Informasi Manajemen Kampus Terintegrasi." Jurnal ICT : Information Communication & Technology 20, no. 2 (2021): 323–30. http://dx.doi.org/10.36054/jict-ikmi.v20i2.416.
Full textRiska, Riska, and Hendri Alamsyah. "Penerapan Sistem Keamanan Web Menggunakan Metode Web Aplication Firewall." JURNAL AMPLIFIER : JURNAL ILMIAH BIDANG TEKNIK ELEKTRO DAN KOMPUTER 11, no. 1 (2021): 37–42. http://dx.doi.org/10.33369/jamplifier.v11i1.16683.
Full textAlotaibi, Fahad M., and Vassilios G. Vassilakis. "Toward an SDN-Based Web Application Firewall: Defending against SQL Injection Attacks." Future Internet 15, no. 5 (2023): 170. http://dx.doi.org/10.3390/fi15050170.
Full textSurekha, M., K. Kiran Kumar, M. V.S.Prasanth, and P. S.G.Aruna Sri. "Web application firewall using XSS." International Journal of Engineering & Technology 7, no. 2.7 (2018): 941. http://dx.doi.org/10.14419/ijet.v7i2.7.11429.
Full textRizqi, Muhamad Fahrizal, Rohmat Tulloh, and Nazel Djibran. "Implementasi Web Application Firewall untuk Melindungi Aplikasi Web dari Serangan Malware." Jurnal Informatika Universitas Pamulang 8, no. 2 (2023): 341–48. http://dx.doi.org/10.32493/informatika.v8i2.33691.
Full textAnnas, Muhammad, Rizal Tjut Adek, and Yesy Afrillia. "Web Application Firewall (WAF) Design to Detect and Anticipate Hacking in Web-Based Applications." Journal of Advanced Computer Knowledge and Algorithms 1, no. 3 (2024): 52. http://dx.doi.org/10.29103/jacka.v1i3.16315.
Full textALQAHTANI, ABDULLAH HAMAD. "Web Intrusion Detection Systems Comparison: Techniques and usage." Journal of Computer and Information Technology 13, no. 1 (2022): 1–10. http://dx.doi.org/10.22147/jucit/130101.
Full textMohammed, Mustafa Khan. "Developing Comprehensive Web Application Firewall (WAF) Policies for Multiple Environments, Enhancing Web Application Security." Journal of Scientific and Engineering Research 11, no. 4 (2024): 358–65. https://doi.org/10.5281/zenodo.13950690.
Full textSime, Raif, Necmettin Sezgin, and Fikri Ağgün. "An Integrated Web Security Application: Integration Of Nginx Reverse Proxy, Fail2ban, Waf, Postgresql and Laravel." Balkan Journal of Electrical and Computer Engineering 13, no. 1 (2025): 106–11. https://doi.org/10.17694/bajece.1547456.
Full textDeski Ari Sandi and Agus Tedyyana. "Implementasi dan Analisa Sistem Pencegahan Intrusi pada Aplikasi Web Menggunakan Web Application Firewall." Repeater : Publikasi Teknik Informatika dan Jaringan 2, no. 4 (2024): 16–26. http://dx.doi.org/10.62951/repeater.v2i4.196.
Full textSukmana, Sulaeman Hadi, Deri Saputra, Diah Puspitasari, Qudsiah Nur Azizah, Erma Delima Sikumbang, and Kresna Ramanda. "Analisis Web Performance Load Test Pada Situs Web PT Neptus Teknologi Indonesia Jakarta Setelah Menggunakan Cloud Web Application Firewall (WAF)." J-SAKTI (Jurnal Sains Komputer dan Informatika) 8, no. 1 (2024): 12. https://doi.org/10.30645/j-sakti.v8i1.762.
Full textCárdenas Rosero, Gabriela Elizabeth, Cathy Pamela Guevara Vega, and Pablo Landeta-López. "Website Protection: An Evaluation of the Web Application Firewall." Data and Metadata 4 (February 13, 2025): 190. https://doi.org/10.56294/dm2025190.
Full textHarini, K. "Enhancing Web Application Protection with ModSecurity and Reverse Proxy." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1476–80. https://doi.org/10.22214/ijraset.2025.67528.
Full textYusup, Muhammad, Maisyaroh Maisyaroh, and Laila Septiana. "Securing Web Application by Embedded Firewall at Gytech Indosantara Mandiri Ltd." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 8, no. 1 (2020): 49–58. http://dx.doi.org/10.33558/piksel.v8i1.2019.
Full textMuttaqin, Rofif Zainul, and Dodi Sudiana. "Design of Realtime Web Application Firewall on Deep Learning-Based to Improve Web Application Security." Jurnal Penelitian Pendidikan IPA 10, no. 12 (2025): 11121–29. https://doi.org/10.29303/jppipa.v10i12.8346.
Full textThang, Nguyen Manh, and Tran Thi Luong. "Algorithm for detecting attacks on Web applications based on machine learning methods and attributes queries." Journal of Science and Technology on Information security 2, no. 14 (2022): 26–34. http://dx.doi.org/10.54654/isj.v2i14.118.
Full textKurniawan, Azis, and Kalamullah Ramli. "EFFECTIVENESS OF SECURITY THROUGH OBSCURITY METHODS TO AVOID WEB APPLICATION VULNERABILITY SCANNERS." Jurnal Teknik Informatika (Jutif) 4, no. 6 (2023): 1479–86. http://dx.doi.org/10.52436/1.jutif.2023.4.6.778.
Full textAkhmetov, B. S., and V. A. Lakhno. "Using WAF to protect the university’s internal services in the Zero Trust structure." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 84, no. 2 (2022): 25–33. http://dx.doi.org/10.47533/2020.1606-146x.151.
Full textInnuddin, Muhammad, Pahrul Irfan, and Rifqi Hammad. "Meningkatkan Keamanan Web Server Nginx dengan NAXSI sebagai Web Application Firewall." Jurnal Aplikasi Teknologi Informasi dan Manajemen (JATIM) 4, no. 2 (2023): 148–56. http://dx.doi.org/10.31102/jatim.v4i2.2310.
Full textKhabibah, Dea Ummul, Yana Nurrohman, Kenzi Dewandaru, Steven Jona Duari Huta Balian, and Aep Setiawan. "Strategi Mitigasi SQL Injection dengan Implementasi SQLMap dan Web Application Firewall." Journal of Technology and System Information 1, no. 4 (2024): 12. http://dx.doi.org/10.47134/jtsi.v1i4.2656.
Full textDawadi, Babu R., Bibek Adhikari, and Devesh K. Srivastava. "Deep Learning Technique-Enabled Web Application Firewall for the Detection of Web Attacks." Sensors 23, no. 4 (2023): 2073. http://dx.doi.org/10.3390/s23042073.
Full textPratama, Krisna Dewa, and Nuril Anwar. "Impact Analysis of Web Application Firewall on Website-Based Application Security (Case Study PPDB Kak Seto School Website)." Mobile and Forensics 5, no. 1 (2023): 44–58. http://dx.doi.org/10.12928/mf.v5i1.8914.
Full textSudha, T. Gnana, N. Snehalatha, and A. Komala. "Penetration Testing and Simulation for Vulnerability Assessment in Application Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue ICCIS (2025): 75–79. https://doi.org/10.47001/irjiet/2025.iccis-202511.
Full textВульфин, А. М. "Security analysis of a web application for accessing the critical data storage system." МОДЕЛИРОВАНИЕ, ОПТИМИЗАЦИЯ И ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ 9, no. 4(35) (2021): 38–39. http://dx.doi.org/10.26102/2310-6018/2021.35.4.038.
Full textPrasetio, Dimaz Arno, Ahmad Fauzi, Ema Utami, and Kusnawi. "Optimasi Pencarian Alamat IP Menggunakan Counting Bloom Filter Pada Web Application Firewall." Aisyah Journal Of Informatics and Electrical Engineering (A.J.I.E.E) 2, no. 2 (2020): 163–70. http://dx.doi.org/10.30604/jti.v2i2.44.
Full textHardianto, Hardianto. "Analisis Cyber Crime handling pada Aplikasi Web dengan WAF ModSecurity." PETIR 16, no. 1 (2023): 91–99. http://dx.doi.org/10.33322/petir.v16i1.1910.
Full textWidiyono, Nabila Apriliana, and Unan Yusmaniar Oktiawati. "Implementasi Web Application Firewall (WAF) pada Aplikasi Fishku Berbasis Google Cloud Armor." Journal of Internet and Software Engineering 5, no. 2 (2024): 75–85. http://dx.doi.org/10.22146/jise.v5i2.9980.
Full textLaipaka, Robertus. "Menerapkan Teknik Firewall Aplikasi Web (WAF) Pada Aplikasi SINTEL Untuk Mengatasi Serangan Siber." Prosiding Seminar Nasional Inovasi dan Adopsi Teknologi (INOTEK) 4, no. 1 (2024): 1–10. http://dx.doi.org/10.35969/inotek.v4i1.407.
Full textKasturi, Santanam, Xiaolong Li, John Pickard, and Peng Li. "Prioritization of Application Security Vulnerability Remediation Using Metrics, Correlation Analysis, and Threat Model." American Journal of Software Engineering and Applications 12, no. 1 (2024): 5–13. http://dx.doi.org/10.11648/j.ajsea.20241201.12.
Full textKerimov, Komil, Zarina Azizova, Fayzi Bekkamov, Mekhriddin Rakhimov, and Mannon Ochilov. "ENSURING INFORMATION SECURITY IN THE INTELLIGENT SCIENTIFIC AND TECHNICAL INFORMATION SYSTEMS." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 2 (June 22, 2024): 150–54. http://dx.doi.org/10.17770/etr2024vol2.8042.
Full textThang, Nguyen Manh, Truong Phi Ho, and Hoang Thanh Nam. "A new approach to improving web application firewall performance based on support vector machine method with analysis of Http request." Journal of Science and Technology on Information security 1, no. 15 (2022): 62–73. http://dx.doi.org/10.54654/isj.v1i15.842.
Full textMauricio, Leopoldo, and Marcelo Rubinstein. "A Network Function Virtualization Architecture for Automatic and Efficient Detection and Mitigation against Web Application Malware." Journal of Internet Services and Applications 14, no. 1 (2023): 10–20. http://dx.doi.org/10.5753/jisa.2023.2847.
Full textThodupunuri, Mohit. "AKAMAI WAF VS. AWS WAF A COMPARATIVE ANALYSIS OF WEB APPLICATION FIREWALL SOLUTIONS FOR CLOUD SECURITY." INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND MANAGEMENT INFORMATION SYSTEMS 14, no. 2 (2023): 68–79. https://doi.org/10.34218/ijitmis_14_02_009.
Full textWijaya, Adi, and Tata Sutabri. "Mendesain Cyber Security untuk Keamanan Website Menggunakan Web Aplication Firewall pada Kantor Bkpsdm Ogan Ilir." Blantika: Multidisciplinary Journal 2, no. 4 (2024): 386–95. http://dx.doi.org/10.57096/blantika.v2i4.121.
Full textTuyishime, Emmanuel, Titus C. Balan, Petru A. Cotfas, Daniel T. Cotfas, and Alexandre Rekeraho. "Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach." Applied Sciences 13, no. 22 (2023): 12359. http://dx.doi.org/10.3390/app132212359.
Full textBorlakova, Mariam A., Said I. Eltaev, and Movladi I. Isaev. "DETECTING AND PREVENTING ATTACKS BASED ON JAVASCRIPT VULNERABILITIES IN MODERN WEB APPLICATIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 12/10, no. 153 (2024): 84–90. https://doi.org/10.36871/ek.up.p.r.2024.12.10.012.
Full textWijaya, I. Gusti Agung Surya Pramana, Gusti Made Arya Sasmita, and I. Putu Agus Eka Pratama. "Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)." International Journal of Information Technology and Computer Science 16, no. 2 (2024): 45–56. http://dx.doi.org/10.5815/ijitcs.2024.02.04.
Full textMeduri, Vedaswaroop. "Applying The Promethee Method In The Field Of Computer Cybersecurity Is “Ranking Cybersecurity Solutions For Risk Mitigation." Nanoscience & Technology: Open Access 7, no. 1 (2023): 1–11. https://doi.org/10.15226/2374-8141/7/1/00163.
Full textRifai, Muhammad Fajar, Syaiful Hendra, Hajra Rasmita Ngemba, Ryfial Azhar, and Rahmah Laila. "Enhancing Web Server Security against Layered Cyber Threats in Healthcare." Advance Sustainable Science, Engineering and Technology 6, no. 2 (2024): 0240209. http://dx.doi.org/10.26877/asset.v6i2.18307.
Full textPrasad, Y. Shyam, B. Simhadri, and A. Karthikram. "SecuProbe: Intelligent Detection of Cross-Site Scripting, SQL Injection, & No SQL Attacks with Real-Time Alert." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 238–44. https://doi.org/10.47001/irjiet/2025.inspire38.
Full textMamuriyah, Nimatul, Stefanus Eko Prasetyo, and Abner Onesimus Sijabat. "Rancangan Sistem Keamanan Jaringan dari serangan DDoS Menggunakan Metode Pengujian Penetrasi." Jurnal Teknologi Dan Sistem Informasi Bisnis 6, no. 1 (2024): 162–67. http://dx.doi.org/10.47233/jteksis.v6i1.1124.
Full textCharan, Shankar Kummarapurugu. "Securing Kubernetes Ingress Traffic for Public-Facing Microservices Using TLS Termination and WAF Integration." Journal of Scientific and Engineering Research 6, no. 1 (2019): 283–90. https://doi.org/10.5281/zenodo.14273907.
Full textОкулов, М. Д., та В. К. Денисенко. "Анализ защищенности web-приложения на основе моделирования сетевых атак". Информатика. Экономика. Управление - Informatics. Economics. Management 4, № 2 (2025): 2018–27. https://doi.org/10.47813/2782-5280-2025-4-2-2018-2027.
Full textСамандаров, Б. С., Г. А. Гулмирзаева та Д. Р. Жолдасбаев. "Анализ и моделирование уязвимостей безопасности информационных систем". Информатика. Экономика. Управление - Informatics. Economics. Management 4, № 1 (2025): 2019–26. https://doi.org/10.47813/2782-5280-2025-4-1-2019-2026.
Full textRipai, Rizki, Riki Aldi Pari, Fajar Sidik, Sony Veri Shandy, and Fajar Mahardika. "Implementasi Layanan Cloudflare sebagai Mitigasi terhadap Ancaman Pemindaian dan Eksploitasi Siber Menggunakan Nmap dan Metasploit." sudo Jurnal Teknik Informatika 4, no. 1 (2025): 40–49. https://doi.org/10.56211/sudo.v4i1.902.
Full textCharan, Shankar Kummarapurugu. "Securing Kubernetes Ingress Traffic for Public-Facing Microservices Using TLS Termination and WAF Integration." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 6, no. 2 (2020): 1–9. https://doi.org/10.5281/zenodo.14183876.
Full textMuhammad Risky Ardiansyah, Muhlis Tahir, Andi Risqita Nuria Fawash, et al. "Analisis Kerentanan Keamanan Website Menggunakan Metode PTES (Penetration Testing Execution And Standart)." NUANSA INFORMATIKA 18, no. 2 (2024): 145–53. http://dx.doi.org/10.25134/ilkom.v18i2.119.
Full textHanif Setia Nusantara, L. Budi Handoko, Maulana Ikhsan, and Chaerul Umam. "Vulnerability Analysis on Semarang City Road Section Information System Website Using VAPT Method." INOVTEK Polbeng - Seri Informatika 10, no. 2 (2025): 1119–30. https://doi.org/10.35314/gdaky847.
Full text