Search

Your search keyword '"Application security"' showing total 1,197 results

Search Constraints

Start Over You searched for: Descriptor "Application security" Remove constraint Descriptor: "Application security"
1,197 results on '"Application security"'

Search Results

1. A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments.

2. Possibilities of Using Fuzz Testing in Smart Cities Applications

3. GenAI Application Level Security

4. Blockchain-Based Application Security Versus Centralized and Distributed Data Management Systems – A Comparative Study

5. Automated Extension-Based Penetration Testing for Web Vulnerabilities.

6. AN EMPIRICAL EXAMINATION OF THE ECONOMICS OF MOBILE APPLICATION SECURITY.

7. Multi-view convolutional neural networks for cybersecurity applications

8. A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments

10. Security of Input for Authentication in Extended Reality Environments

11. Improvisation of Information System Security Posture Through Continuous Vulnerability Assessment

12. An adaptive randomized and secured approach against adversarial attacks.

13. Securing Relational Databases against Security Vulnerabilities: A Case of Microsoft SQL Server and PostgreSQL.

14. Intelligent Detection of Cryptographic Misuse in Android Applications Based on Program Slicing andTransformer-Based Classifier.

15. Open Source Solutions for Vulnerability Assessment: A Comparative Analysis

16. SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security Datasets

17. Identifying Key Activities, Artifacts and Roles in Agile Engineering of Secure Software with Hierarchical Clustering.

18. SECURE SOFTWARE DEVELOPMENT LIFECYCLE: A CASE FOR ADOPTION IN SOFTWARE SMES.

19. Securing Healthcare Data with Healthcare Cloud and Blockchain

20. Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat.

21. Enterprise Security with Endpoint Agents

22. Security Landscape for Private Cloud

23. Assessment of National Crime Reporting System: Detailed Analysis of the Mobile Application

24. Backstabber’s Knife Collection: A Review of Open Source Software Supply Chain Attacks

25. Hubungan Kualitas Informasi dan Keamanan Situs terhadap Niat Pembelian Ulang Pengguna Mobile Commerce Shopee dengan Kepuasan Konsumen sebagai Mediator.

26. Detection of SSL/TLS Implementation Errors in Android Applications

27. Privacy Rating of Mobile Applications Based on Crowdsourcing and Machine Learning.

28. A Review on Web Application Vulnerability Assessment and Penetration Testing.

29. Security versus Compliance: An Empirical Study of the Impact of Industry Standards Compliance on Application Security.

31. Measuring Application Security

32. User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user

33. 25 Years in Application Security: Looking Back, Looking Forward.

34. АНАЛІЗ МЕТОДОЛОГІЇ DEVSECOPS В ПРОЦЕСАХ РОЗРОБКИ ПРОГРАМНОГО ЗАБЕЗПЕЧЕННЯ

35. The Mediating Role of Trust in the Relationship Between Corporate Image, Security, Word of Mouth and Loyalty in M-Banking Using among the Millennial Generation in Indonesia

36. Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface.

37. Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges.

38. MDA Approach for Application Security Integration with Automatic Code Generation from Communication Diagram

39. PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning

40. Security Concerns in MMO Games—Analysis of a Potent Application Layer DDoS Threat

41. Event Tracing for Application Security Monitoring in Linux.

42. Measuring the Sustainable-Security of Web Applications Through a Fuzzy-Based Integrated Approach of AHP and TOPSIS

43. Using the ISO/IEC 27034 as Reference to Develop an Application Security Control Library

44. Detection of SSL/TLS Implementation Errors in Android Applications.

45. CASE STUDY: SECURITY OF SYSTEM FOR REMOTE MANAGEMENT OF WINDOWS.

46. Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice

47. Educational modules and research surveys on critical cybersecurity topics.

48. 国家电网边缘计算应用安全风险评估研究.

49. Integrating security and privacy in software development.

50. The Mediating Role of Trust in the Relationship Between Corporate Image, Security, Word of Mouth and Loyalty in MBanking Using among the Millennial Generation in Indonesia.

Catalog

Books, media, physical & digital resources