A Technical Review on Web Application Security Vulnerabilities

Abstract

 The web is an indispensable part of our lives. Every retrieve information and communicate over the web. Although the web is convenient for many users because it provides anytime, anywhere access to information and services, at for miscreants who attack unsuspecting web users with the aim of a significant rise in the number of web increasing the security of web applications. An an entrusted platform (e.g., a computer that a web application. Solutions that have been expensive) peripheral devices such as aspects of client-side attacks (e.g., Trojan horses) against web applications and present can be used by web applications to enable secure user input. We also conducted two usability studies to examine whether the techniques that we propose are feasible

Authors and Affiliations

Keywords

Related Articles

 Modified Fuzzy C – Means Clustering Scheme for Image Segmentation

 More research and work has been done on Fuzzy C Means (FCM) Clustering scheme to enhance more effectiveness of this method. In this Article we have purposed a scheme of FCM to get enhanced performance. It is more...

A SURVEY ON SUPERVISED METHOD FOR DETECTION OF MALWARE

The Number of Android mobile devices has been increased in recent year. There are so many approaches for detection of android malware has been proposed by using permission or source code analysis or dynamic analysis. In...

 A REVIEW PAPER ON ENERGY CONSUMPTION AND RELIABILITY OF WSN USING GENETIC AND PSO ALGORITHM FOR MOBILE SINK

 Wireless sensor network are formed by small sensor nodes communicating over wireless links without using a fixed network infrastructure. Wireless sensor network (WSN) is a collection of three kinds of nodes: senso...

Development and Testing Of Natural Fiber Reinforced Composites With Polyester Resin

Now --a – days most of the automotive parts are made with different materials which cannot be recycled. Recently European Union (E.U) and Asian countries have released stringent norms concerning automotive end-life req...

 VLSI Implementation of Image Compression And Encryption Using SPIHT And Stream Cipher Method

 This technique is proposed for compression and encryption. Here an image is first compressed using SPIHT compression algorithm combined with Huffman coding and then the compressed image is encrypted using stream...

Download PDF file
  • EP ID EP148619
  • DOI -
  • Views 57
  • Downloads 0

How To Cite

(30).  A Technical Review on Web Application Security Vulnerabilities. International Journal of Engineering Sciences & Research Technology, 2(9), 2407-2419. https://europub.co.uk/articles/-A-148619