Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
To maintain secure web services and IT infrastructure, this has proposed the prototype of a vulnerability reporting system. Among these reporting systems developed to deal with problems of maintenance and analysis report management system which not yet been implemented in the cyber security scannin...
| Main Authors: | Hamid Ali, Firkhan Ali, Mohd Sukri, Mohd Khairul Amin, Jali, Mohd Zalisham, Muhammad AlFatih, Muhammad AlFatih, Mohd Yusof, Mohd Azhari |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
semarak ilmu
2023
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/9333/ http://eprints.uthm.edu.my/9333/1/J15811_9d61cf3bcbd15b9e1c74cb0edd6970fa.pdf |
Similar Items
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)
by: Hamid Ali, Firkhan Ali
Published: (2004)
Two factor authentication by using SMS for web based application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Understanding evolutionary processes in bird species using genome-wide sequence analysis
by: Eltayeb, Muhammad Alfatih, et al.
Published: (2017)
by: Eltayeb, Muhammad Alfatih, et al.
Published: (2017)
Security impact of cross-site scripting vulnerabilities on web applications and their awareness
by: Hydara, Isatou, et al.
Published: (2022)
by: Hydara, Isatou, et al.
Published: (2022)
On the automation of vulnerabilities fixing for web application
by: Umar, Kabir, et al.
Published: (2014)
by: Umar, Kabir, et al.
Published: (2014)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
CyberReach Project Research Report
by: Hyde, Zoe, et al.
Published: (2006)
by: Hyde, Zoe, et al.
Published: (2006)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
Rijndael encryption technique: authentication for computer application
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2020)
Evaluating Cyber Security Awareness Levels For Employees In DRB-Hicom Auto Solutions
by: Mohd Fadli Kasim,
Published: (2021)
by: Mohd Fadli Kasim,
Published: (2021)
Quantitative metric for ranking web accessibility barriers based on their severity
by: Abuaddous, Hayfa Yousef, et al.
Published: (2017)
by: Abuaddous, Hayfa Yousef, et al.
Published: (2017)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Removing cross-site scripting vulnerabilities from web applications using the OWASP ESAPI security guidelines
by: Hydara, Isatou, et al.
Published: (2015)
by: Hydara, Isatou, et al.
Published: (2015)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
The rise of deep learning in cyber security: Bibliometric analysis of deep learning and malware
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
by: Nur Khairani, Kamarudin, et al.
Published: (2024)
Comparing web vulnerability scanners with a new method for SQL injection vulnerabilities detection and removal EPSQLiFix
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
by: Md Sultan, Abu Bakar, et al.
Published: (2018)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
The vulnerability analysis and the security evaluation of block ciphers
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
Similar Items
-
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023) -
Vulnerability analysis on the network security by using Nessus
by: Hamid Ali, Firkhan Ali
Published: (2004)