Moth: a hybrid threat model for improving software security testing
As SQL injection attack (SQLIA) continues to threaten web applications despite several techniques recommended to prevent it, a Hybrid Threat Modeling strategy was adopted in this research due to its proactive approach to risk mitigation in web applications. This involved the combination of 3 thre...
| Main Author: | Omotunde, Habeeb Oladapo |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/185/ http://eprints.uthm.edu.my/185/1/24p%20HABEEB%20OLADAPO%20OMOTUNDE.pdf http://eprints.uthm.edu.my/185/2/HABEEB%20OLADAPO%20OMOTUNDE%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/185/3/HABEEB%20OLADAPO%20OMOTUNDE%20WATERMARK.pdf |
Similar Items
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
An optimized attack tree model for security test case planning and generation
by: Omotunde, Habeeb, et al.
Published: (2018)
by: Omotunde, Habeeb, et al.
Published: (2018)
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022)
by: Ng, Alvin Lai Oon *
Published: (2022)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
The Effects of Private Placements Announcement on Shareholders' Wealth and Trading Volume
by: Mohd Noor, Normaziah
Published: (2007)
by: Mohd Noor, Normaziah
Published: (2007)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Blurring public and private security in Indonesia: corporate interests and human rights in a fragile environment
by: White, Nigel D., et al.
Published: (2018)
by: White, Nigel D., et al.
Published: (2018)
Peacekeeping, private security and international human rights law: a review of UN policies
by: White, Nigel D.
Published: (2014)
by: White, Nigel D.
Published: (2014)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
by: Malekzadeh, Mina
Published: (2007)
by: Malekzadeh, Mina
Published: (2007)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Pricing Asset-backed Securities: A Revised Model
by: Bradka, Lukas
Published: (2008)
by: Bradka, Lukas
Published: (2008)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
Ageing in forensic psychiatric secure settings: the voice of older patients
by: Di Lorito, Claudio, et al.
Published: (2018)
by: Di Lorito, Claudio, et al.
Published: (2018)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Improving
Performance
in
Securities
Settlement
Systems
Using
Multithreaded
Transactions
by: Ramos, Jesus S
Published: (2009)
by: Ramos, Jesus S
Published: (2009)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Outsourcing peace. Private military and security companies. A setback to security sector reform in post conflict and transition states?
by: Mehboob, Cynthia
Published: (2017)
by: Mehboob, Cynthia
Published: (2017)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Improved security of Rijndael key expansion function
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
by: Hussien, Al-Abadi Hassan Mansur
Published: (2017)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Modelling crop diseases for food security
by: Al-Azri, Masoud
Published: (2017)
by: Al-Azri, Masoud
Published: (2017)
Secured transactions and IP licenses: comparative observations and reform suggestions
by: Tosato, Andrea
Published: (2018)
by: Tosato, Andrea
Published: (2018)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
Determinants of choice of private hospital by consumers in Malaysia
by: Nasrijal, Neliza Hilmy
Published: (2002)
by: Nasrijal, Neliza Hilmy
Published: (2002)
An improved user authentication model for mobile application systems
by: Mohamed, Kartini
Published: (2017)
by: Mohamed, Kartini
Published: (2017)
A Secure Key Management Model for Wireless Mesh Networks
by: Gao, Li, et al.
Published: (2010)
by: Gao, Li, et al.
Published: (2010)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
The Wealth Effect of the Securities Commission and the Central Bank Announcement
by: Yu, Kee Su
Published: (1997)
by: Yu, Kee Su
Published: (1997)
Similar Items
-
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016) -
An optimized attack tree model for security test case planning and generation
by: Omotunde, Habeeb, et al.
Published: (2018) -
Suicide is a national security threat
by: Ng, Alvin Lai Oon *
Published: (2022) -
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025) -
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)