[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

ALAHMAD et al., 2022 - Google Patents

SURVEY OF BROKEN AUTHENTICATION AND SESSION MANAGEMENT OF WEB APPLICATIONVULNERABILITY ATTACK

ALAHMAD et al., 2022

View PDF
Document ID
13621241668921084035
Author
ALAHMAD M
ALKANDARI A
ALAWADHI N
Publication year
Publication venue
Journal of Engineering Science and Technology

External Links

Snippet

Web applications are used in our daily basis every day. In recent years, web applications are exposing to security threats and breaches. Security researchers, corporates and organizations are collaborating together to stop or at least mitigate such attacks and threats …
Continue reading at jestec.taylors.edu.my (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Panchal et al. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
Rani et al. Cyber security techniques, architectures, and design
Hassan et al. Broken authentication and session management vulnerability: a case study of web application
Lackey E-commerce systems security for small businesses
Singh Review of e-commerce security challenges
Khan et al. NETWORK THREATS, ATTACKS AND SECURITY MEASURES: A REVIEW.
Paquet Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide
Haber et al. Attack vectors
ALAHMAD et al. SURVEY OF BROKEN AUTHENTICATION AND SESSION MANAGEMENT OF WEB APPLICATIONVULNERABILITY ATTACK
Vatsyayan et al. A detailed investigation of popular attacks on cyber physical systems
Buchanan Introduction to security and network forensics
Krit et al. Review on the IT security: Attack and defense
Khantamonthon et al. Digital forensic analysis of ransomware attacks on virtual private networks: A case study in factories
Sadiqui Computer network security
Mack Cyber security
Gomez et al. Hands-on lab on smart city vulnerability exploitation
Ashraf et al. Ethical Hacking Methodologies: A Comparative Analysis
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
Varshney et al. Browshing a new way of phishing using a malicious browser extension
Paquet Implementing Cisco IOS network security (IINS):(CCNA security exam 640-553)(authorized self-study guide)
Reddy et al. A new compromising security framework for automated smart homes using VAPT
Almi Web Server Security and Survey on Web Application Security
Kela et al. IMPLEMENTATION OF CYBER SECURITY ATTACKS AND STRATEGIC MITIGATION MECHANISMS.
Rajpure et al. The Survey Paper on Network Security with Its Thesaurus Attacks and feasible Security Technology
Blancaflor et al. Security Assessment and Proposed Controls in a Philippines' Shopping Mall: A Case Study