ALAHMAD et al., 2022 - Google Patents
SURVEY OF BROKEN AUTHENTICATION AND SESSION MANAGEMENT OF WEB APPLICATIONVULNERABILITY ATTACKALAHMAD et al., 2022
View PDF- Document ID
- 13621241668921084035
- Author
- ALAHMAD M
- ALKANDARI A
- ALAWADHI N
- Publication year
- Publication venue
- Journal of Engineering Science and Technology
External Links
Snippet
Web applications are used in our daily basis every day. In recent years, web applications are exposing to security threats and breaches. Security researchers, corporates and organizations are collaborating together to stop or at least mitigate such attacks and threats …
- 230000002265 prevention 0 abstract description 12
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Panchal et al. | Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures | |
Rani et al. | Cyber security techniques, architectures, and design | |
Hassan et al. | Broken authentication and session management vulnerability: a case study of web application | |
Lackey | E-commerce systems security for small businesses | |
Singh | Review of e-commerce security challenges | |
Khan et al. | NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW. | |
Paquet | Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide | |
Haber et al. | Attack vectors | |
ALAHMAD et al. | SURVEY OF BROKEN AUTHENTICATION AND SESSION MANAGEMENT OF WEB APPLICATIONVULNERABILITY ATTACK | |
Vatsyayan et al. | A detailed investigation of popular attacks on cyber physical systems | |
Buchanan | Introduction to security and network forensics | |
Krit et al. | Review on the IT security: Attack and defense | |
Khantamonthon et al. | Digital forensic analysis of ransomware attacks on virtual private networks: A case study in factories | |
Sadiqui | Computer network security | |
Mack | Cyber security | |
Gomez et al. | Hands-on lab on smart city vulnerability exploitation | |
Ashraf et al. | Ethical Hacking Methodologies: A Comparative Analysis | |
Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
Varshney et al. | Browshing a new way of phishing using a malicious browser extension | |
Paquet | Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide) | |
Reddy et al. | A new compromising security framework for automated smart homes using VAPT | |
Almi | Web Server Security and Survey on Web Application Security | |
Kela et al. | IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS. | |
Rajpure et al. | The Survey Paper on Network Security with Its Thesaurus Attacks and feasible Security Technology | |
Blancaflor et al. | Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study |