Journal articles on the topic 'WordPress content injection vulnerability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 journal articles for your research on the topic 'WordPress content injection vulnerability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Md, Maruf Hassan, Kaushik Sarker, Saikat Biswas, and Hasan Sharif Md. "Detection of Wordpress Content Injection Vulnerability." International Journal on Cybernetics & Informatics 6, no. 5 (2017): 1–15. http://dx.doi.org/10.5121/ijci.2017.6501.
Full textYudistiawan, Ari Dimas, and Nuril Anwar. "Website Application Security Value Analysis Using Crawling Method Against SQL Injection Attacks." Mobile and Forensics 6, no. 1 (2024): 39–50. http://dx.doi.org/10.12928/mf.v6i1.8198.
Full textPetkova, Lilyana, and Vasilisa Pavlova. "Security Analysis on Content Management Systems." Mathematics and Informatics LXV, no. 5 (2022): 423–34. http://dx.doi.org/10.53656/math2022-5-2-sec.
Full textPutra, Bagus Setya, and Dwi Budi Santoso. "Analisis Keamanan Website Berbasis WordPress melalui Penetration Testing untuk Meningkatkan Keamanan Digital." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 9, no. 3 (2025): 981–90. https://doi.org/10.35870/jtik.v9i3.3692.
Full textA. Karunamurthy, Dr. "SECURE AND SCALABLE WORDPRES DEPLOYMENT ON AWS WITH RDS." International Scientific Journal of Engineering and Management 04, no. 06 (2025): 1–9. https://doi.org/10.55041/isjem04077.
Full textSusanto, Budi. "PEMBENAHAN WEB PROFIL SINODE GEREJA KRISTEN JAWA." SHARE "SHaring - Action - REflection" 6, no. 2 (2020): 93–98. http://dx.doi.org/10.9744/share.6.2.93-98.
Full textBuchyk, Serhii, and Andrii Kuroiedov. "JAVASCRIPT-BASED WEB EXPLOIT ANALYSIS MODEL." Information systems and technologies security, no. 2 (8) (2024): 17–25. https://doi.org/10.17721/ists.2024.8.17-25.
Full textRohit, Kumar*. "DEVELOPING A SECURE WORDPRESS WEBSITE AND HOSTING ON NIC PLATFORM." wordpress, hack, security threat, website 5, no. 8 (2016): 1027–38. https://doi.org/10.5281/zenodo.60877.
Full textJ. Santhosh Kumar, B., and Kankanala Pujitha. "Web Application Vulnerability Detection Using Hybrid String Matching Algorithm." International Journal of Engineering & Technology 7, no. 3.6 (2018): 106. http://dx.doi.org/10.14419/ijet.v7i3.6.14950.
Full textRosner, Sabine, Sebastian Nöbauer, and Klara Voggeneder. "Ready for Screening: Fast Assessable Hydraulic and Anatomical Proxies for Vulnerability to Cavitation of Young Conifer Sapwood." Forests 12, no. 8 (2021): 1104. http://dx.doi.org/10.3390/f12081104.
Full textHaeruddin, Gautama Wijaya, Hendra Winata, Sukma Aji, and Muhammad Nur Faiz. "Website Security Analysis Using Vulnerability Assessment Method." Journal of Innovation Information Technology and Application (JINITA) 6, no. 2 (2024): 173–80. https://doi.org/10.35970/jinita.v6i2.2476.
Full textCho, Ying-Chiang, and Jen-Yi Pan. "Multiple-Feature Extracting Modules Based Leak Mining System Design." Scientific World Journal 2013 (2013): 1–11. http://dx.doi.org/10.1155/2013/704865.
Full textM, Indushree, Manjit Kaur, Manish Raj, Shashidhara R, and Heung-No Lee. "Cross Channel Scripting and Code Injection Attacks on Web and Cloud-Based Applications: A Comprehensive Review." Sensors 22, no. 5 (2022): 1959. http://dx.doi.org/10.3390/s22051959.
Full textWardana, Wasis, Ahmad Almaarif, and Adityas Widjajarto. "Vulnerability Assessment and Penetration Testing On The Xyz Website Using Nist 800-115 Standard." Syntax Literate ; Jurnal Ilmiah Indonesia 7, no. 1 (2022): 520. http://dx.doi.org/10.36418/syntax-literate.v7i1.5800.
Full textSaputra, Dio Wahyu, Risqy Siwi Pradini, and Mochammad Anshori. "Analisis dan Rekomendasi Keamanan Website Kampus X Menggunakan ISSAF." Jurnal Indonesia : Manajemen Informatika dan Komunikasi 6, no. 1 (2025): 830–43. https://doi.org/10.35870/jimik.v6i1.1306.
Full textSukumar, Viresh Krishnan, Yee Kit Tai, Ching Wan Chan, et al. "Brief Magnetic Field Exposure Stimulates Doxorubicin Uptake into Breast Cancer Cells in Association with TRPC1 Expression: A Precision Oncology Methodology to Enhance Chemotherapeutic Outcome." Cancers 16, no. 22 (2024): 3860. http://dx.doi.org/10.3390/cancers16223860.
Full textSantos, Sônia Maria Soares dos, and Magda Lúcia Félix de Oliveira. "Knowledge about aids and drugs among undergraduate students in a higher education institution in the state of Paraná." Revista Latino-Americana de Enfermagem 17, no. 4 (2009): 522–28. http://dx.doi.org/10.1590/s0104-11692009000400014.
Full textRiadi, Imam, Rusydi Umar, and Tri Lestari. "Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP." JISKA (Jurnal Informatika Sunan Kalijaga) 5, no. 3 (2020): 146. http://dx.doi.org/10.14421/jiska.2020.53-02.
Full textWidyaningrum, Bajeng Nurul, Destri Maya Rani, and Lingga Kurnia Ramadhani. "Analysis of the OWASP V4.2 Method in Hospital Information System Security Testing." MEDIKA TRADA 5, no. 2 (2024): 87–97. https://doi.org/10.59485/jtemp.v5i2.99.
Full textKumar, Saket, Roshan Tiwari, Maen Husein, Nitesh Kumar, and Upendra Yadav. "Enhancing the Performance of HPAM Polymer Flooding Using Nano CuO/Nanoclay Blend." Processes 8, no. 8 (2020): 907. http://dx.doi.org/10.3390/pr8080907.
Full textSepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.
Full textWijaya, I. Gusti Agung Surya Pramana, Gusti Made Arya Sasmita, and I. Putu Agus Eka Pratama. "Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)." International Journal of Information Technology and Computer Science 16, no. 2 (2024): 45–56. http://dx.doi.org/10.5815/ijitcs.2024.02.04.
Full textMd., Maruf Hassan, and Sarker Kaushik. "DETECTION OF WORDPRESS CONTENT INJECTION VULNERABILITY." May 24, 2019. https://doi.org/10.5121/ijci.2017.6501.
Full textChandramouli, Sai Prashanth, Ziming Zhao, Adam Doupé, and Gail-Joon Ahn. "E-mail Header Injection Vulnerabilities." it - Information Technology 59, no. 2 (2017). http://dx.doi.org/10.1515/itit-2016-0039.
Full text"Component based Web Application Firewall for Analyzing and Defending SQL Injection Attack Vectors." International Journal of Recent Technology and Engineering 8, no. 3 (2019): 4183–90. http://dx.doi.org/10.35940/ijrte.c4674.098319.
Full textBhanwar Lal and Irfan Khan. "Implementation of PSO Algorithm for Detection and Removal of XSS Attack." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, September 1, 2022, 39–51. http://dx.doi.org/10.32628/cseit22857.
Full textHussain, Shahbaz, Atif Iqbal, S. M. Suhail Hussain, et al. "A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids." Scientific Reports 13, no. 1 (2023). http://dx.doi.org/10.1038/s41598-022-27157-z.
Full textHan, Xiaoxuan, Songlin Yang, Wei Wang, Ziwen He, and Jing Dong. "Exploiting Backdoors of Face Synthesis Detection with Natural Triggers." ACM Transactions on Multimedia Computing, Communications, and Applications, July 11, 2024. http://dx.doi.org/10.1145/3677380.
Full textChong, S. Y., X. Wang, L. Van Bloois, et al. "Liposomal docosahexaenoic acid halts atherosclerosis progression." European Heart Journal 43, Supplement_2 (2022). http://dx.doi.org/10.1093/eurheartj/ehac544.1229.
Full textFilaretova, Ludmila, Olga Komkova, Olga Morozova, Polina Punina, and Natalia Yarushkina. "Environmental enrichment reverses proulcerogenic action of social isolation on the gastric mucosa and increases resilience to pain stimuli and working capacity in a treadmill." Physiology 38, S1 (2023). http://dx.doi.org/10.1152/physiol.2023.38.s1.5734968.
Full textKalil, Bruna, Nayara Pestana-Oliveira, Isabelle R. Santos, Ruither O. G. Carolino, and Janete A. Anselmo-Franci. "MON-017 Effect of Estradiol Therapy on Depressive like Behavior in an Ovarian Intact Rat Model of Perimenopause." Journal of the Endocrine Society 4, Supplement_1 (2020). http://dx.doi.org/10.1210/jendso/bvaa046.1298.
Full text