Vulnerability assessment in Malaysia government web-based application
The web technology provides various benefits of changing the way of life. People of today, computers seem to be accessible everywhere, whenever want and help make lives easier and more entertaining. It also becomes a tool for government sectors to provide information and services to citizens. Today,...
| Main Author: | Lau, Lee Keng |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/4991/ http://eprints.utar.edu.my/4991/1/LAU_LEE_KENG.pdf |
Similar Items
Determination Of Seismic Vulnerability Assessment By Using Rapid Screening Method Through Web-Based Application
by: Ooi, Jun Hao
Published: (2021)
by: Ooi, Jun Hao
Published: (2021)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Quantitative assessment on remote code execution vulnerability in web apps
by: Md. Maruf, Hassan, et al.
Published: (2019)
by: Md. Maruf, Hassan, et al.
Published: (2019)
Towards Vulnerability Prevention Model for Web Browser
using Interceptor Approach
by: Nayeem, Khan, et al.
Published: (2015)
by: Nayeem, Khan, et al.
Published: (2015)
Towards cross-site scripting vulnerability detection in mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web application for lipreading
by: Lau, Yee Lin
Published: (2024)
by: Lau, Yee Lin
Published: (2024)
Towards removing cross-site scripting vulnerabilities from mobile web applications
by: Hydara, Isatou, et al.
Published: (2018)
by: Hydara, Isatou, et al.
Published: (2018)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
An approach for vulnerability detection in web applications using graph neural networks and transformers
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
by: Md Sultan, Abu Bakar, et al.
Published: (2024)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Vulnerability Prevention Model for Web Browser using Interceptor Approach
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
by: Ahmad Khan, Nayeem, et al.
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Assessing the vulnerability of Kota Kinabalu buildings
by: Noor Sheena Herayani, Harith, et al.
Published: (2021)
by: Noor Sheena Herayani, Harith, et al.
Published: (2021)
Web-Based Student Management Systems
by: Lau, Duncan Yin Seang
Published: (2019)
by: Lau, Duncan Yin Seang
Published: (2019)
Vulnerability Assessment Of Telecommunication Steel Tower Subjected To Seismic Excitation
by: Wong, Qi Min
Published: (2021)
by: Wong, Qi Min
Published: (2021)
Vulnerability assessment of vegetation types
by: Mucina, Ladislav, et al.
Published: (2006)
by: Mucina, Ladislav, et al.
Published: (2006)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Worst-input mutation approach to web services vulnerability testing based on SOAP messages
by: Chen, Jinfu, et al.
Published: (2014)
by: Chen, Jinfu, et al.
Published: (2014)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web Based Application of Examination Question Classification
by: Tan, Guan Kheng
Published: (2019)
by: Tan, Guan Kheng
Published: (2019)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Network-based learning and assessment applications on the Semantic Web
by: Gibson, David
Published: (2005)
by: Gibson, David
Published: (2005)
Vulnerability assessment modelling for railway networks
by: Meesit, R., et al.
Published: (2018)
by: Meesit, R., et al.
Published: (2018)
Development of a web based financial application system
by: Hasan, M. R., et al.
Published: (2013)
by: Hasan, M. R., et al.
Published: (2013)
Development of a web-based financial application system
by: Hasan, M R, et al.
Published: (2013)
by: Hasan, M R, et al.
Published: (2013)
Web-based assessment of information systems services quality in Malaysian government agencies
by: M. Masilamani, M. Poobalan
Published: (2005)
by: M. Masilamani, M. Poobalan
Published: (2005)
Torrential floods in Malaysia: assessing the loss and vulnerabilities in three Kelantan villages
by: Karim, A.H.M Zehadul, et al.
Published: (2016)
by: Karim, A.H.M Zehadul, et al.
Published: (2016)
A comprehensive approach of groundwater vulnerability and potentiality assessment of Melaka catchment in Malaysia / Md. Imran Hosen
by: Md. Imran, Hosen
Published: (2012)
by: Md. Imran, Hosen
Published: (2012)
Flood vulnerability assessment in urban areas in Kuala Lumpur, Malaysia
by: Nasiri, Hajar
Published: (2018)
by: Nasiri, Hajar
Published: (2018)
Vulnerability assessment due to wind storm impact
by: Mohamad Hafizi, Baharom
Published: (2014)
by: Mohamad Hafizi, Baharom
Published: (2014)
Similar Items
-
Determination Of Seismic Vulnerability Assessment By Using Rapid Screening Method Through Web-Based Application
by: Ooi, Jun Hao
Published: (2021) -
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014) -
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)