A Technical Review on Web Application Security Vulnerabilities
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 2, Issue 9
Abstract
The web is an indispensable part of our lives. Every retrieve information and communicate over the web. Although the web is convenient for many users because it provides anytime, anywhere access to information and services, at for miscreants who attack unsuspecting web users with the aim of a significant rise in the number of web increasing the security of web applications. An an entrusted platform (e.g., a computer that a web application. Solutions that have been expensive) peripheral devices such as aspects of client-side attacks (e.g., Trojan horses) against web applications and present can be used by web applications to enable secure user input. We also conducted two usability studies to examine whether the techniques that we propose are feasible
Modified Fuzzy C – Means Clustering Scheme for Image Segmentation
More research and work has been done on Fuzzy C Means (FCM) Clustering scheme to enhance more effectiveness of this method. In this Article we have purposed a scheme of FCM to get enhanced performance. It is more...
A SURVEY ON SUPERVISED METHOD FOR DETECTION OF MALWARE
The Number of Android mobile devices has been increased in recent year. There are so many approaches for detection of android malware has been proposed by using permission or source code analysis or dynamic analysis. In...
A REVIEW PAPER ON ENERGY CONSUMPTION AND RELIABILITY OF WSN USING GENETIC AND PSO ALGORITHM FOR MOBILE SINK
Wireless sensor network are formed by small sensor nodes communicating over wireless links without using a fixed network infrastructure. Wireless sensor network (WSN) is a collection of three kinds of nodes: senso...
Development and Testing Of Natural Fiber Reinforced Composites With Polyester Resin
Now --a – days most of the automotive parts are made with different materials which cannot be recycled. Recently European Union (E.U) and Asian countries have released stringent norms concerning automotive end-life req...
VLSI Implementation of Image Compression And Encryption Using SPIHT And Stream Cipher Method
This technique is proposed for compression and encryption. Here an image is first compressed using SPIHT compression algorithm combined with Huffman coding and then the compressed image is encrypted using stream...