Skip to search formSkip to main contentSkip to account menu

Web application security

Web application security is a branch of Information Security that deals specifically with security of websites, web applications and web services. At… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Mobile Ad Hoc Networks (MANETs) are collections of mobile nodes that can communicate with one another using multihop wireless… 
Highly Cited
2014
Highly Cited
2014
tl;dr: it's a scary world out there! Welcome to the OWASP Top 10 2013! This update broadens one of the categories from the 2010… 
2013
2013
– Today’s Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone… 
2012
2012
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read… 
2012
2012
Researchers have devised multiple solutions to cross-site scripting, but vulnerabilities persists in many Web applications due to… 
2010
2010
F  Abstract — A SQL injection attack targets interactive web applications that employ database services. Such application accept… 
2008
2008
With the development of Web application , its security issue calls more and more attention and becomes a hotspot in the area or… 
2007
2007
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 People . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 The Challenges Ahead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 www.mcafee.com Virtualization and Risk—Key Security Considerations for Your Enterprise Architecture Taking a Structured and Systematic View of the Impact of Hardware Virtualization on IT Risk Management 
2002
2002
In this article we will outline the major security vulnerabilities found in modern web applications. This brief discussion is…