Journal articles on the topic 'Secure web-application development'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure web-application development.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Arif Ulla, Sayyad. "Secure Development - Web Application Security." IOSR Journal of Computer Engineering 14, no. 6 (2013): 14–22. http://dx.doi.org/10.9790/0661-1461422.
Full textLee, Junho, Jungwoong Woo, Cheongan Lee, and Kyungsoo Joo. "A Software Development Methodology for Secure Web Application." International Journal on Advanced Science, Engineering and Information Technology 9, no. 1 (February 28, 2019): 336. http://dx.doi.org/10.18517/ijaseit.9.1.5987.
Full textMoon, Jae-Chan, and Seong-Je Cho. "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development." Journal of the Korea Society of Computer and Information 17, no. 2 (February 29, 2012): 127–37. http://dx.doi.org/10.9708/jksci.2012.17.2.127.
Full textKornienko, D. V., S. V. Mishina, and M. O. Melnikov. "The Single Page Application architecture when developing secure Web services." Journal of Physics: Conference Series 2091, no. 1 (November 1, 2021): 012065. http://dx.doi.org/10.1088/1742-6596/2091/1/012065.
Full textPathak, Nitish, B. M. Singh, and Girish Sharma. "UML 2.0 based framework for the development of secure web application." International Journal of Information Technology 9, no. 1 (February 22, 2017): 101–9. http://dx.doi.org/10.1007/s41870-017-0001-3.
Full textNathawat, Mukul Singh. "Development of Ecommerce Web Application: Pick & Buy." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 3683–85. http://dx.doi.org/10.22214/ijraset.2021.35628.
Full textMouratidis, Haralambos, and Miao Kang. "Secure by Design." International Journal of Secure Software Engineering 2, no. 3 (July 2011): 23–41. http://dx.doi.org/10.4018/jsse.2011070102.
Full textKorneva, L. A., and P. B. Khorev. "Development of framework secure application with client-server architecture." Informacionno-technologicheskij vestnik 15, no. 1 (March 30, 2018): 112–19. http://dx.doi.org/10.21499/2409-1650-2018-1-112-119.
Full textQu, Bo, and Zhong Xue Yang. "Design of Web Based Secure Embedded System in C." Applied Mechanics and Materials 347-350 (August 2013): 1635–40. http://dx.doi.org/10.4028/www.scientific.net/amm.347-350.1635.
Full textXu, Hong Feng, and Gui Xian Zhou. "Study on the Trusted Operating Technology for Mobile E-Commerce System Secure." Applied Mechanics and Materials 519-520 (February 2014): 416–21. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.416.
Full textKornienko, D. V., S. V. Mishina, S. V. Shcherbatykh, and M. O. Melnikov. "Principles of securing RESTful API web services developed with python frameworks." Journal of Physics: Conference Series 2094, no. 3 (November 1, 2021): 032016. http://dx.doi.org/10.1088/1742-6596/2094/3/032016.
Full textWATANABE, Hidenobu, Sen UENO, and Ken T. MURATA. "A Method for Cooperation with A Secure Web Application Development by The NICT Science Cloud." Joho Chishiki Gakkaishi 24, no. 3 (2014): 291–96. http://dx.doi.org/10.2964/jsik_2014_029.
Full textBuja, Alya Geogiana, Nurul Syahirah Khairuddin, Noor Afni Deraman, and Khyrina Airin Fariza Abu Samah. "Development of a browser extension for web application vulnerability detection, avoidance, and secure browsing (VDAS)." International Journal of Advanced Technology and Engineering Exploration 8, no. 77 (April 30, 2021): 537–44. http://dx.doi.org/10.19101/ijatee.2020.762187.
Full textAnugrah, Indra Gita, and Muhamad Aldi Rifai Imam Fakhruddin. "Development Authentication and Authorization Systems of Multi Information Systems Based REst API and Auth Token." INNOVATION RESEARCH JOURNAL 1, no. 2 (September 22, 2020): 127. http://dx.doi.org/10.30587/innovation.v1i2.1927.
Full textPathak, Nitish, B. M. Singh, and Girish Sharma. "An Empirical Perspective of Roundtrip Engineering for the Development of Secure Web Application Using UML 2.0." International Journal of Intelligent Systems and Applications 9, no. 5 (May 8, 2017): 43–54. http://dx.doi.org/10.5815/ijisa.2017.05.06.
Full textAndrian, Rian, and Ahmad Fauzi. "Security Scanner For Web Applications Case Study: Learning Management System." Jurnal Online Informatika 4, no. 2 (February 14, 2020): 63. http://dx.doi.org/10.15575/join.v4i2.394.
Full textHuda, Choirul, Chendra Hudyanto, Sisillia Sisillia, and Revin Kencana Persada. "THE DEVELOPMENT OF A WEB BASED DATABASE APPLICATIONS OF PROCUREMENT, INVENTORY, AND SALES AT PT. INTERJAYA SURYA MEGAH." CommIT (Communication and Information Technology) Journal 5, no. 2 (October 31, 2011): 57. http://dx.doi.org/10.21512/commit.v5i2.560.
Full textLi, Jinfeng. "Vulnerabilities Mapping based on OWASP-SANS: A Survey for Static Application Security Testing (SAST)." Annals of Emerging Technologies in Computing 4, no. 3 (July 1, 2020): 1–8. http://dx.doi.org/10.33166/aetic.2020.03.001.
Full textWang, Cheng, Zhi Guang Huang, Hui Min Liu, Jin Gou, and Li Xiao Zheng. "ASP.NET Websites Longitudinal Security Theoretical System." Applied Mechanics and Materials 513-517 (February 2014): 597–601. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.597.
Full textGutierrez, Amelie Anne. "SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)." International Journal of Computer Science and Information Technology 13, no. 6 (December 31, 2021): 39–57. http://dx.doi.org/10.5121/ijcsit.2021.13604.
Full textAl-Mahrouqi, Rasha, Khalsa Al Siyabi, Amani Al Nabhani, Salma Al-Hashemi, and Shoukath Ali Muhammed. "E-commerce Web App in Azure Cloud: Considerations, Components of Implementation and Schematic Design." Computer and Information Science 14, no. 4 (September 21, 2021): 32. http://dx.doi.org/10.5539/cis.v14n4p32.
Full textAhmed, Hanaa Mohusan, and Ahmed Oday Alazzawi. "User Authentication Secure by Randomly Cubic Spline Curve and Blum Blum Shub Algorithm." Al-Mustansiriyah Journal of Science 30, no. 1 (August 15, 2019): 99. http://dx.doi.org/10.23851/mjs.v30i1.421.
Full textSWAMY, NIKHIL, JUAN CHEN, CÉDRIC FOURNET, PIERRE-YVES STRUB, KARTHIKEYAN BHARGAVAN, and JEAN YANG. "Secure distributed programming with value-dependent types." Journal of Functional Programming 23, no. 4 (July 2013): 402–51. http://dx.doi.org/10.1017/s0956796813000142.
Full textMindila, Agnes N., Joseph M. Wafula, Harriet A. M. Ratemo, Collins Tabu, Joyce Charo, and Catherine Silali. "Requirements elicitation for a blockchain vaccine supply chain management web/mobile application." Gates Open Research 3 (April 26, 2019): 1420. http://dx.doi.org/10.12688/gatesopenres.12877.1.
Full textS, Uppliammal, Stanley D, and S. Sowmiya. "Automated Access Communication System." International Journal on Cybernetics & Informatics 10, no. 2 (May 31, 2021): 309–17. http://dx.doi.org/10.5121/ijci.2021.100234.
Full textJurnal, Redaksi Tim. "PENERAPAN ALGORITMA RIVERT CODE 4 (RC 4) PADA APLIKASI KRIPTOGRAFI DOKUMEN." PETIR 11, no. 1 (November 6, 2018): 38–47. http://dx.doi.org/10.33322/petir.v11i1.6.
Full textRaj, Gaurav, Manish Mahajan, and Dheerendra Singh. "Trust Decision Model and Trust Evaluation Model for Quality Web Service Identification in Web Service Lifecycle Using QSW Data Analysis." International Journal of Web-Based Learning and Teaching Technologies 15, no. 1 (January 2020): 53–72. http://dx.doi.org/10.4018/ijwltt.2020010103.
Full textRaj, Dr Shaji N. "A Flexible Vulnerability Reduction System Using Machine Learning." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3784–91. http://dx.doi.org/10.47059/revistageintec.v11i4.2407.
Full textDang, Chi Van, Khoat Duc Nguyen, Luc The Nguyen, Dung Ngoc Le, Quan Hong Luu, and Son Thanh Huynh. "Applying AES algorithm for secure data transmission between Sensor node and LoRa Gateway to Web Server." Journal of Mining and Earth Sciences 63, no. 1 (February 28, 2022): 105–14. http://dx.doi.org/10.46326/jmes.2022.63(1).10.
Full textLesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.
Full textLiu, Joyce F., Jung-min Lee, Ellie Strock, Ruth Phillips, Karine Mari, Bill Killiam, Matthew Bonam, Tsveta Milenkova, Elise C. Kohn, and S. Percy Ivy. "Technology Applications: Use of Digital Health Technology to Enable Drug Development." JCO Clinical Cancer Informatics, no. 2 (December 2018): 1–12. http://dx.doi.org/10.1200/cci.17.00153.
Full textBusse, Monica, Julie Latchem-Hastings, Kate Button, Vince Poile, Freya Davies, Rhian O' Halloran, Barbara Stensland, et al. "Web-based physical activity intervention for people with progressive multiple sclerosis: application of consensus-based intervention development guidance." BMJ Open 11, no. 3 (March 2021): e045378. http://dx.doi.org/10.1136/bmjopen-2020-045378.
Full textBolton, Jennifer, and Cristina !Palacios. "The Development of Baby Feed: A Web Application for Health Professionals and Parents to Improve Infant Diets." Current Developments in Nutrition 5, Supplement_2 (June 2021): 963. http://dx.doi.org/10.1093/cdn/nzab051_007.
Full textNorton, Louis, Joseph Ciervo, Victor S. Lobanov, and Dimitris K. Agrafiotis. "Xcellerate Investigator Portal: A New Web-Based Tool for Online Delivery of Central Laboratory Data, Reports, and Communications to Clinical Sites." SLAS TECHNOLOGY: Translating Life Sciences Innovation 25, no. 5 (July 29, 2020): 427–35. http://dx.doi.org/10.1177/2472630320942200.
Full textFasola, G., G. Aprile, V. Della Mea, M. Noselli, and F. Puglisi. "Development of a Web-based model to track patients’ self-reported symptoms related to anticancer treatment toxicities." Journal of Clinical Oncology 25, no. 18_suppl (June 20, 2007): 17021. http://dx.doi.org/10.1200/jco.2007.25.18_suppl.17021.
Full textNewcomb, William L., Amy E. Lincourt, Keith Gersin, Kent Kercher, David Iannitti, Tim Kuwada, Cynthia Lyons, et al. "Development of a Functional, Internet-Accessible Department of Surgery Outcomes Database." American Surgeon 74, no. 6 (June 2008): 548–54. http://dx.doi.org/10.1177/000313480807400615.
Full textSowah, Robert A., Dale E. Boahene, Dalton C. Owoh, Rexford Addo, Godfrey A. Mills, Wiafe Owusu-Banahene, Gifty Buah, and Baffour Sarkodie-Mensah. "Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework." Journal of Sensors 2020 (October 30, 2020): 1–22. http://dx.doi.org/10.1155/2020/8868602.
Full textAl-Fadly, Ahmad. "Development and Implementation of E-Business Strategies Managed and Applied by Kuwait Airways." International Journal of Economics and Finance 8, no. 9 (August 24, 2016): 41. http://dx.doi.org/10.5539/ijef.v8n9p41.
Full textSchinköthe, Timo, Mariano Rolando Gabri, Manfred Mitterer, Pedro Gouveia, Volker Heinemann, Nadia Harbeck, and Marion Subklewe. "A Web- and App-Based Connected Care Solution for COVID-19 In- and Outpatient Care: Qualitative Study and Application Development." JMIR Public Health and Surveillance 6, no. 2 (June 1, 2020): e19033. http://dx.doi.org/10.2196/19033.
Full textChard, Kyle, Eli Dart, Ian Foster, David Shifflett, Steven Tuecke, and Jason Williams. "The Modern Research Data Portal: a design pattern for networked, data-intensive science." PeerJ Computer Science 4 (January 15, 2018): e144. http://dx.doi.org/10.7717/peerj-cs.144.
Full textRizal, Mohamad Rafi Raihan. "A BLOCKCHAIN-BASED ONLINE REVIEW SYSTEM OF TOURISM PRODUCTS USING ETHEREUM." Jurnal Techno Nusa Mandiri 18, no. 1 (March 15, 2021): 33–38. http://dx.doi.org/10.33480/techno.v18i1.2162.
Full textAnggrawan, Anthony, Raisul Azhar, Bambang Krismono Triwijoyo, and Mayadi Mayadi. "Developing Application in Anticipating DDoS Attacks on Server Computer Machines." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 30, 2021): 427–34. http://dx.doi.org/10.30812/matrik.v20i2.410.
Full textLockhart, Elizabeth, Eric Gutierrez, Padraig Richard Warde, Davin Dubeau, Sophie Huang, Harry Johnson, Saul Melamed, et al. "eOutcomes-H&N: Development of an electronic point-of-care outcomes collection system for head and neck cancer." Journal of Clinical Oncology 31, no. 31_suppl (November 1, 2013): 247. http://dx.doi.org/10.1200/jco.2013.31.31_suppl.247.
Full textFennick, Jacob R., J. Brandon Keith, Robert H. Leonard, Thanh N. Truong, and James P. Lewis. "A cyberenvironment for crystallography and materials science and an integrated user interface to the Crystallography Open Database and Predicted Crystallography Open Database." Journal of Applied Crystallography 41, no. 2 (March 8, 2008): 471–75. http://dx.doi.org/10.1107/s0021889808000381.
Full textMurad, Abdulaziz, Natalie Hyde, Shanton Chang, Reeva Lederman, Rachelle Bosua, Marie Pirotta, Ralph Audehm, et al. "Quantifying Use of a Health Virtual Community of Practice for General Practitioners’ Continuing Professional Development: A Novel Methodology and Pilot Evaluation." Journal of Medical Internet Research 21, no. 11 (November 27, 2019): e14545. http://dx.doi.org/10.2196/14545.
Full textValenzuela, Waldo, Fabian Balsiger, Roland Wiest, and Olivier Scheidegger. "Medical-Blocks―A Platform for Exploration, Management, Analysis, and Sharing of Data in Biomedical Research: System Development and Integration Results." JMIR Formative Research 6, no. 4 (April 11, 2022): e32287. http://dx.doi.org/10.2196/32287.
Full textGu, Li Zhi. "Construction of ASP Platform Based on the Manufacture of Typical Components for the Engineering Machinery." Applied Mechanics and Materials 10-12 (December 2007): 89–93. http://dx.doi.org/10.4028/www.scientific.net/amm.10-12.89.
Full textTekle, Kidane M., Sveinung Gundersen, Kjetil Klepper, Lars Ailo Bongo, Inge Alexander Raknes, Xiaxi Li, Wei Zhang, et al. "Norwegian e-Infrastructure for Life Sciences (NeLS)." F1000Research 7 (June 29, 2018): 968. http://dx.doi.org/10.12688/f1000research.15119.1.
Full textAmin, Amr, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, and Islam Hegazy. "AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach." Information 10, no. 10 (October 22, 2019): 326. http://dx.doi.org/10.3390/info10100326.
Full textNuryasin, Ilyas. "PENGEMBANGAN PROTOTIPE TOMBOL DARURAT PERUMAHAN BERBASIS WEBSITE." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 7, no. 2 (April 15, 2021): 213–18. http://dx.doi.org/10.33330/jurteksi.v7i2.918.
Full text