16   Artículos

 
en línea
Muhammad Idris, Iwan Syarif, Idris Winarno     Pág. 246 - 261
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple applicat... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Olga R. Laponina,Vasily A. Matoshenko     Pág. 31 - 44
The article discusses the procedure for introducing game mechanisms into the educational process. The main elements of gamification, the concept of the game element "Capture the flag" ("CaptureTheFlag" - CTF) are described, the basic principles of the ar... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali and Noel Crespi    
The growing use of the internet has resulted in an exponential rise in the use of web applications. Businesses, industries, financial and educational institutions, and the general populace depend on web applications. This mammoth rise in their usage has ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Francesc Mateo Tudela, Juan-Ramón Bermejo Higuera, Javier Bermejo Higuera, Juan-Antonio Sicilia Montalvo and Michael I. Argyros    
This document provides a complete comparative study of how different types of security analysis tools, (static, interactive and dynamic) can combine to obtain the best performance results in terms of true and false positive ratios taking into account dif... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Andrei Brazhuk,Evgeny Olizarovich     Pág. 14 - 20
Threat modelling of a computer system is based on the system analysis of its architecture on early development stages (requirements, design) and creation of a threat model that represents security aspects of the system (threats and mitigations). Used in ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Aleksandr ?. Osincev,Olga R. Laponina     Pág. 71 - 79
The paper considers the concept of external entities in the XML language, provides the most popular scenarios for executing attacks on web applications using external XML entities. A brief comparative review of dynamic testing tools for XXE-vulnerabiliti... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Anggi Elanda,Robby Lintang Buana     Pág. 185 - 191
Abstract -- OWASP (Open Web Application Security Project) version 4 issued by a non-profit organization called owasp.org which is dedicated to the security of web-based applications. This systematic review is intended to review whether the Open Web ... ver más

 
en línea
Yudiana Yudiana,Anggi Elanda,Robby Lintang Buana     Pág. 185 - 191
STMIK ROSMA Karawang telah menerapkan pengarsipan dokumen surat di kampus, yang mana kesemuanya diatur secara daring (online) menggunakan sistem informasi e-office berbasis web. Sejak tahun 2020, Sistem Informasi e-office beberapa kali mengalami pengemba... ver más

« Anterior     Página: 1 de 1     Siguiente »